{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T09:52:40.970","vulnerabilities":[{"cve":{"id":"CVE-2007-0779","sourceIdentifier":"secalert@redhat.com","published":"2007-02-26T20:28:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor."},{"lang":"es","value":"Vulnerabilidad de superposición del IGU (Interfaz Gráfica de Usuario) en Mozilla Firefox 1.5.x anterior a 1.5.0.10 y 2.x anterior a 2.0.0.2, y SeaMonkey anterior a 1.0.8 permite a atacantes remotos suplantar determinados elementos de la interfaz de usuario, tales como el nombre de anfitrión o los indicadores de seguridad, mediante la propiedad hotspot de CSS3 con un cursor personalizado grande y transparente."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*","matchCriteriaId":"93C142C5-3A85-432B-80D6-2E7B1B4694F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*","matchCriteriaId":"429ECA02-DBCD-45FB-942C-CA4BC1BC8A72"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*","matchCriteriaId":"B5F0DC80-5473-465C-9D7F-9589F1B78E12"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*","matchCriteriaId":"567FF916-7DE0-403C-8528-7931A43E0D18"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*","matchCriteriaId":"E15536D0-B6A3-4106-8196-021724324CAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*","matchCriteriaId":"010B34F4-910E-4515-990B-8E72DF009578"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*","matchCriteriaId":"8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*","matchCriteriaId":"5A545A77-2198-4685-A87F-E0F2DAECECF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"778FAE0C-A5CF-4B67-93A9-1A803E3E699F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"E7447185-7509-449D-8907-F30A42CF7EB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"0EDBAC37-9D08-44D1-B279-BC6ACF126CAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"3FFF89FA-2020-43CC-BACD-D66117B3DD26"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"834BB391-5EB5-43A8-980A-D305EDAE6FA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"9A38AD88-BAA6-4FBE-885B-69E951BD1EFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"B500EE6C-99DB-49A3-A1F1-AFFD7FE28068"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*","matchCriteriaId":"4F2938F2-A801-45E5-8E06-BE03DE03C8A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*","matchCriteriaId":"ABB88E86-6E83-4A59-9266-8B98AA91774D"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*","matchCriteriaId":"E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*","matchCriteriaId":"66BE50FE-EA21-4633-A181-CD35196DF06E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"7D6BF5B1-86D1-47FE-9D9C-735718F94874"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"84D15CE0-69DF-4EFD-801E-96A4D6AABEDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"CEE203DE-6C0E-4FDE-9C3A-0E73430F17DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"F2F38886-C25A-4C6B-93E7-36461405BA99"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"C65D2670-F37F-48CB-804A-D35BB1C27D9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"DE8E5194-7B34-4802-BDA6-6A86EB5EDE05"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"FABA5F56-99F7-4F8F-9CC1-5B0B2EB72922"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"2917BD67-CE81-4B94-B241-D4A9DDA60319"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"A524A94E-F19B-42B9-AA8E-171751C339AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*","matchCriteriaId":"CA97C80E-17FA-4866-86CE-29886145ED80"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*","matchCriteriaId":"04198E04-CE1D-4A5A-A20C-D1E135B45F94"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*","matchCriteriaId":"3487FA64-BE04-42CA-861E-3DAC097D7D32"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*","matchCriteriaId":"F61EA4A1-1916-48A5-8196-E3CDEF3108F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*","matchCriteriaId":"F5AA254D-D41E-464F-9E2A-A950F08C6946"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*","matchCriteriaId":"B05D2655-6641-42BE-9793-30005AC9D40D"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F3D956DC-C73B-439F-8D79-8239207CC76F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*","matchCriteriaId":"09E18FC0-0C8C-4FA1-85B9-B868D00F002F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*","matchCriteriaId":"D62F740C-706B-4290-AD92-3ECBC3D30768"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*","matchCriteriaId":"55344F76-1C42-4DD8-A28B-1C33626C6FD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*","matchCriteriaId":"CB01A97F-ACE1-4A99-8939-6DF8FE5B5E8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"6521C877-63C9-4B6E-9FC9-1263FFBB7950"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"D949DF0A-CBC2-40E1-AE6C-60E6F58D2481"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"3C5CDA57-1A50-4EDB-80E2-D3EBB44EA653"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"22D33486-4956-4E2C-BA16-FA269A9D02BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"3104343E-93B6-4D4A-BC95-ED9F7E91FB6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"381313EF-DF84-4F66-9962-DE8F45029D79"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"A0228476-14E4-443C-BBAE-2C9CD8594DC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*","matchCriteriaId":"E1E99882-786F-455F-BAC4-30716120964A"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","source":"secalert@redhat.com"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","source":"secalert@redhat.com"},{"url":"http://fedoranews.org/cms/node/2713","source":"secalert@redhat.com"},{"url":"http://fedoranews.org/cms/node/2728","source":"secalert@redhat.com"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","source":"secalert@redhat.com"},{"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","source":"secalert@redhat.com"},{"url":"http://osvdb.org/32109","source":"secalert@redhat.com"},{"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","source":"secalert@redhat.com"},{"url":"http://secunia.com/advisories/24205","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24238","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24287","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24290","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24293","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24320","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24328","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24333","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24342","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24343","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24384","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24393","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24395","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24437","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24455","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24457","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24650","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","source":"secalert@redhat.com"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","source":"secalert@redhat.com"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","source":"secalert@redhat.com"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","source":"secalert@redhat.com"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","source":"secalert@redhat.com"},{"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-04.html","source":"secalert@redhat.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","source":"secalert@redhat.com"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","source":"secalert@redhat.com"},{"url":"http://www.securityfocus.com/bid/22694","source":"secalert@redhat.com","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1017700","source":"secalert@redhat.com"},{"url":"http://www.ubuntu.com/usn/usn-428-1","source":"secalert@redhat.com"},{"url":"http://www.vupen.com/english/advisories/2007/0718","source":"secalert@redhat.com"},{"url":"http://www.vupen.com/english/advisories/2008/0083","source":"secalert@redhat.com"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=361298","source":"secalert@redhat.com"},{"url":"https://issues.rpath.com/browse/RPL-1081","source":"secalert@redhat.com"},{"url":"https://issues.rpath.com/browse/RPL-1103","source":"secalert@redhat.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757","source":"secalert@redhat.com"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://fedoranews.org/cms/node/2713","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://fedoranews.org/cms/node/2728","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/32109","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://rhn.redhat.com/errata/RHSA-2007-0077.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/24205","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24238","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24287","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24290","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24320","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24328","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24333","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24342","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24343","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24384","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24393","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24395","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24437","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24455","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24457","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/24650","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200703-04.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200703-08.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:050","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.novell.com/linux/security/advisories/2007_22_mozilla.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0079.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0097.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/461336/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/461809/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/22694","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securitytracker.com/id?1017700","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/usn-428-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2007/0718","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2008/0083","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=361298","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://issues.rpath.com/browse/RPL-1081","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://issues.rpath.com/browse/RPL-1103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8757","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}