ETH Library
| {"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2011-02-23T00:00:00.000Z", "descriptions": [{"lang": "en", "value": "The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2011-03-31T09:00:00.000Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco"}, "references": [{"name": "1025112", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1025112"}, {"name": "20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices", "tags": ["vendor-advisory", "x_refsource_CISCO"], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml"} |
| { | |
| "dataType": "CVE_RECORD", | |
| "dataVersion": "5.1", | |
| "cveMetadata": { | |
| "vulnId": "", | |
| "cveId": "CVE-2025-8452", | |
| "vulnId": "GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001", | |
| "assignerOrgId": "00000000-0000-4000-9000-000000000000", | |
| "assignerShortName": "AHA", | |
| "vulnerabilitylookup_history": null, |
This Gist aims to centralise the most relevant public sources of information related to the HTTP/2 Rapid Reset vulnerability. This vulnerability has been disclosed jointly by Google, Amazon AWS, and Cloudflare on 10 October 2023 at 12:00 UTC.
Please help us make this page as comprehensive as possible by contributing relevant references, vendor advisories and statements, mitigations, etc.
| { | |
| "addDynamicDns": [ | |
| { | |
| "ukrainianworldcongress_org.clickip.de": { | |
| "A": [ | |
| "85.215.86.53" | |
| ], | |
| "MX": [ | |
| "100 relay.rzone.de", | |
| "20 clickip.de" |
| import uuid | |
| from pprint import pprint | |
| import json | |
| import requests | |
| # https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide | |
| # https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/ |
From 9:30 to 12:00 CET (a small break is foreseen)
Short url: https://tinyurl.com/BTS-MISP2
adulau@maurer:~$ curl -w "@curl-format.txt" -o /dev/null -s "https://services.nvd.nist.gov/rest/json/cpes/2.0/?resultsPerPage=20&startIndex=0"
time_namelookup: 0,120529s
time_connect: 0,225630s
time_appconnect: 0,386989s
time_pretransfer: 0,387033s
time_redirect: 0,000000s
time_starttransfer: 5,810461s