mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
bb12b9f44b
commit
6f52ebca20
@ -71,6 +71,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K21914362",
|
||||
"url": "https://support.f5.com/csp/article/K21914362"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -236,6 +236,136 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/9"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
|
||||
"url": "http://www.securityfocus.com/archive/1/540957/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3181-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3181-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K23873366",
|
||||
"url": "https://support.f5.com/csp/article/K23873366"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -231,6 +231,166 @@
|
||||
"name": "http://eprint.iacr.org/2016/594.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://eprint.iacr.org/2016/594.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/8"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/4"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/6"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K53084033",
|
||||
"url": "https://support.f5.com/csp/article/K53084033"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/10"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/11"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/5"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/12"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/7"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/09/2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,101 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K59298921",
|
||||
"url": "https://support.f5.com/csp/article/K59298921"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92557"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
@ -196,6 +201,111 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K01276005",
|
||||
"url": "https://support.f5.com/csp/article/K01276005"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,16 +62,51 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-16",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-16"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3240",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3240"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-16",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-16"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2709",
|
||||
"refsource": "REDHAT",
|
||||
@ -82,21 +117,56 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92630"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-21",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-21"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3239",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3239"
|
||||
},
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "42091",
|
||||
"url": "https://www.exploit-db.com/exploits/42091/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-65",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-65"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "1036696",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036696"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20160915-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20160915-0001/"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201707-01",
|
||||
"refsource": "GENTOO",
|
||||
@ -112,16 +182,51 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3114"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa133",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa133"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2017-09",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2017-09"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1216",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://wiki.opendaylight.org/view/Security_Advisories",
|
||||
"url": "https://wiki.opendaylight.org/view/Security_Advisories"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2710",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2710"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20170119-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections",
|
||||
"refsource": "MLIST",
|
||||
@ -152,11 +257,291 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0462",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0462.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
|
||||
"url": "http://www.securityfocus.com/archive/1/540341/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613",
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3194-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3194-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information",
|
||||
"url": "https://seclists.org/bugtraq/2018/Nov/21"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K13167034",
|
||||
"url": "https://support.f5.com/csp/article/K13167034"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/542005/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3372-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3372-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0460",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0490",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3270-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3270-1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178",
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/May/105"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2017:0513",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/539885/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2017:0374",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0346",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3198-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3198-1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/May/105",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/May/105"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/541104/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:1444",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3179-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3179-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1245",
|
||||
@ -172,6 +557,11 @@
|
||||
"name": "RHSA-2020:0451",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0451"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
@ -446,6 +836,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -292,6 +292,346 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2635",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2659",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2583",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2633",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2638",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2584",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2658",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2631",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-3",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-3"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2655",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-c3558808cd",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2637",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2596",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2634",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2657",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2614",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3105-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3105-2"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3107-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3107-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3107-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3107-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2625",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-1"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-4",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-4"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2673",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3104-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3104-2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://fortiguard.com/advisory/FG-IR-16-063",
|
||||
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2629",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
|
||||
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2632",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3105-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3105-1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
|
||||
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2630",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-db4b75b352",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-c8a0c7eece",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2636",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:3069",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3696",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3696"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
|
||||
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2592",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3104-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3104-1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2593",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:3304",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2585",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2649",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
|
||||
},
|
||||
{
|
||||
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
|
||||
"refsource": "CONFIRM",
|
||||
@ -301,6 +641,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0554",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -112,6 +112,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1801"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "1036878",
|
||||
"refsource": "SECTRACK",
|
||||
@ -231,6 +236,126 @@
|
||||
"name": "RHSA-2017:2493",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2493"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20161012 New OpenSSL double-free and invalid free vulnerabilities in X509 parsing",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Oct/62"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20161214 APPLE-SA-2016-12-13-1 macOS 10.12.2",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Dec/47"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html",
|
||||
"url": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2788",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2769",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2185",
|
||||
"refsource": "REDHAT",
|
||||
@ -77,11 +82,36 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-16"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"name": "1036885",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036885"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-16",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-16"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-21",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-21"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa132",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa132"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-16:26",
|
||||
"refsource": "FREEBSD",
|
||||
@ -97,6 +127,121 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K90492697",
|
||||
"url": "https://support.f5.com/csp/article/K90492697"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
@ -216,6 +361,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -162,6 +162,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2841"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560",
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:2633",
|
||||
"refsource": "SUSE",
|
||||
@ -181,6 +186,71 @@
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-515264ae24",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-24f067299e",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3430-3",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-3"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html",
|
||||
"url": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2619",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/",
|
||||
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449",
|
||||
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-7106a157f5",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2616",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2617",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3989",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3989"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,76 @@
|
||||
"name": "102367",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102367"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0834",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0848",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0383",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3583-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3583-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K18352029",
|
||||
"url": "https://support.f5.com/csp/article/K18352029"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0555",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0408",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0986",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0416",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0482",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0841",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3583-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3583-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0660",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"url": "https://github.com/krb5/krb5-appl/blob/d00cd671dfe945791b33d4f1f6a5c57ae1667ef8/telnet/telnetd/utility.c#L205-L216",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/krb5/krb5-appl/blob/d00cd671dfe945791b33d4f1f6a5c57ae1667ef8/telnet/telnetd/utility.c#L205-L216"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/10702-security-advisory-48",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/10702-security-advisory-48"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://bugs.launchpad.net/mahara/+bug/1944979",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.launchpad.net/mahara/+bug/1944979"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://mahara.org/interaction/forum/topic.php?id=8954",
|
||||
"url": "https://mahara.org/interaction/forum/topic.php?id=8954"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://bugs.launchpad.net/mahara/+bug/1944633",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.launchpad.net/mahara/+bug/1944633"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://mahara.org/interaction/forum/topic.php?id=8953",
|
||||
"url": "https://mahara.org/interaction/forum/topic.php?id=8953"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,11 @@
|
||||
"url": "https://bugs.launchpad.net/mahara/+bug/1942903",
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugs.launchpad.net/mahara/+bug/1942903"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://mahara.org/interaction/forum/topic.php?id=8952",
|
||||
"url": "https://mahara.org/interaction/forum/topic.php?id=8952"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user