mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
Revert "November 2021 Patch Tuesday"
This reverts commit df296d9e014bf68ef22c0583c98da3fbe42ea316.
This commit is contained in:
parent
1d8691e58d
commit
938debeed0
@ -71,6 +71,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K21914362",
|
||||
"url": "https://support.f5.com/csp/article/K21914362"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1571,6 +1571,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1371,6 +1371,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
|
||||
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -931,6 +931,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -621,6 +621,11 @@
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -876,6 +876,11 @@
|
||||
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,11 @@
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,11 @@
|
||||
"name": "MDVSA-2015:003",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -191,6 +191,11 @@
|
||||
"name": "http://bugs.ntp.org/show_bug.cgi?id=2669",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.ntp.org/show_bug.cgi?id=2669"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -146,6 +146,11 @@
|
||||
"name": "MDVSA-2015:003",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -496,6 +496,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
|
||||
"url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
80
2015/10xxx/CVE-2015-10001.json
Normal file
80
2015/10xxx/CVE-2015-10001.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2015-10001",
|
||||
"ASSIGNER": "contact@wpscan.com",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "WP-Stats < 2.5.2 - CSRF to Stored Cross-Site Scripting (XSS)"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"generator": "WPScan CVE Generator",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Unknown",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "WP-Stats",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "2.52",
|
||||
"version_value": "2.52"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "The WP-Stats WordPress plugin before 2.52 does not have CSRF check when saving its settings, and did not escape some of them when outputting them, allowing attacker to make logged in high privilege users change them and set Cross-Site Scripting payloads"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734",
|
||||
"name": "https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.openwall.com/lists/oss-security/2015/06/17/6",
|
||||
"name": "https://www.openwall.com/lists/oss-security/2015/06/17/6"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Sebastian Wolfgang Kraemer"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
@ -321,6 +321,11 @@
|
||||
"name": "HPSBGN03371",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=143654156615516&w=2"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -311,6 +311,11 @@
|
||||
"name": "HPSBGN03371",
|
||||
"refsource": "HP",
|
||||
"url": "http://marc.info/?l=bugtraq&m=143654156615516&w=2"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -296,6 +296,11 @@
|
||||
"name": "https://www.openssl.org/news/secadv_20150611.txt",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.openssl.org/news/secadv_20150611.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,18 +1,85 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2015-20019",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "contact@wpscan.com",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Content text slider on post < 6.9 - Authenticated Stored Cross-Site Scripting (XSS)"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"generator": "WPScan CVE Generator",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Unknown",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Content text slider on post",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "6.9",
|
||||
"version_value": "6.9"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://seclists.org/bugtraq/2015/Dec/124",
|
||||
"name": "https://seclists.org/bugtraq/2015/Dec/124"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86",
|
||||
"name": "https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/1393044/content-text-slider-on-post",
|
||||
"name": "https://plugins.trac.wordpress.org/changeset/1393044/content-text-slider-on-post"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"value": "CWE-79 Cross-site Scripting (XSS)",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "ALIREZA_PROMIS"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
@ -1,18 +1,85 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2015-20067",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "contact@wpscan.com",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "WP Attachment Export < 0.2.4 - Unauthenticated Posts Download"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"generator": "WPScan CVE Generator",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Unknown",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "WP Attachment Export",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "0.2.4",
|
||||
"version_value": "0.2.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://seclists.org/fulldisclosure/2015/Jul/73",
|
||||
"name": "https://seclists.org/fulldisclosure/2015/Jul/73"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_attachment_export_file_download.rb",
|
||||
"name": "https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_attachment_export_file_download.rb"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a",
|
||||
"name": "https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"value": "CWE-862 Missing Authorization",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Nitin Venkatesh"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
@ -291,6 +291,11 @@
|
||||
"name": "RHSA-2015:1000",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2015-1000.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://www.openwall.com/lists/oss-security/2015/09/15/2",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/09/15/2"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -136,6 +136,11 @@
|
||||
"name": "GLSA-201602-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201602-01"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -206,6 +206,11 @@
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html",
|
||||
"url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,11 @@
|
||||
"name": "GLSA-201602-01",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201602-01"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -146,6 +146,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -226,6 +226,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -206,6 +206,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"name": "https://arxiv.org/pdf/1701.04739.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "https://arxiv.org/pdf/1701.04739.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -233,6 +233,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -236,6 +236,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
|
||||
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -236,6 +236,136 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/9"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
|
||||
"url": "http://www.securityfocus.com/archive/1/540957/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3181-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3181-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K23873366",
|
||||
"url": "https://support.f5.com/csp/article/K23873366"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -231,6 +231,166 @@
|
||||
"name": "http://eprint.iacr.org/2016/594.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://eprint.iacr.org/2016/594.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/8"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/4"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/6"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K53084033",
|
||||
"url": "https://support.f5.com/csp/article/K53084033"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/10"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/11"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/5"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/12"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/7"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/06/09/2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,101 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K59298921",
|
||||
"url": "https://support.f5.com/csp/article/K59298921"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92557"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://source.android.com/security/bulletin/2017-03-01",
|
||||
"url": "https://source.android.com/security/bulletin/2017-03-01"
|
||||
},
|
||||
{
|
||||
"name": "1037968",
|
||||
"refsource": "SECTRACK",
|
||||
@ -196,6 +201,111 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K01276005",
|
||||
"url": "https://support.f5.com/csp/article/K01276005"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,16 +62,51 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201612-16",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-16"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3240",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3240"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-16",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-16"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2709",
|
||||
"refsource": "REDHAT",
|
||||
@ -82,21 +117,56 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/92630"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-21",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-21"
|
||||
},
|
||||
{
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:3239",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3239"
|
||||
},
|
||||
{
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"name": "42091",
|
||||
"url": "https://www.exploit-db.com/exploits/42091/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201701-65",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201701-65"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"name": "1036696",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036696"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20160915-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20160915-0001/"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201707-01",
|
||||
"refsource": "GENTOO",
|
||||
@ -112,16 +182,51 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:3114"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa133",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa133"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2017-09",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2017-09"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:1216",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://wiki.opendaylight.org/view/Security_Advisories",
|
||||
"url": "https://wiki.opendaylight.org/view/Security_Advisories"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:2710",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2710"
|
||||
},
|
||||
{
|
||||
"name": "https://security.netapp.com/advisory/ntap-20170119-0001/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984"
|
||||
},
|
||||
{
|
||||
"name": "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections",
|
||||
"refsource": "MLIST",
|
||||
@ -152,11 +257,291 @@
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2017:0462",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://rhn.redhat.com/errata/RHSA-2017-0462.html"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
|
||||
"url": "http://www.securityfocus.com/archive/1/540341/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613",
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3194-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3194-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information",
|
||||
"url": "https://seclists.org/bugtraq/2018/Nov/21"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K13167034",
|
||||
"url": "https://support.f5.com/csp/article/K13167034"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/542005/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3372-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3372-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0460",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0490",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3270-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3270-1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178",
|
||||
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/May/105"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2017:0513",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/539885/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2017:0374",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:0346",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3198-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3198-1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://seclists.org/fulldisclosure/2017/May/105",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/May/105"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
|
||||
"url": "http://www.securityfocus.com/archive/1/541104/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:1444",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3179-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3179-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1245",
|
||||
@ -172,6 +557,11 @@
|
||||
"name": "RHSA-2020:0451",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0451"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
@ -446,6 +836,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,11 @@
|
||||
"name": "https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=f09154d6648eeb4ec5e1ac8a2bacbd2f8c87c14a",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=f09154d6648eeb4ec5e1ac8a2bacbd2f8c87c14a"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[dubbo-notifications] 20211101 [GitHub] [dubbo] AlbumenJ opened a new issue #9177: Upgrade Zookeeper dependency",
|
||||
"url": "https://lists.apache.org/thread.html/r4b743f407244294f316325458ccaabfce9cd70ca3a6423dbe574035c@%3Cnotifications.dubbo.apache.org%3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -292,6 +292,346 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2635",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2659",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2583",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2633",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2638",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2584",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
|
||||
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2658",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2631",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-3",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-3"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2655",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-c3558808cd",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2637",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2596",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2634",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
|
||||
},
|
||||
{
|
||||
"refsource": "CISCO",
|
||||
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
|
||||
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2657",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2614",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3105-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3105-2"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3107-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3107-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3107-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3107-2"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2625",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-1"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3106-4",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3106-4"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2673",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3104-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3104-2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://fortiguard.com/advisory/FG-IR-16-063",
|
||||
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2629",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
|
||||
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
|
||||
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2632",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3105-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3105-1"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
|
||||
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2630",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-db4b75b352",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2016-c8a0c7eece",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2636",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:3069",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3696",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3696"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
|
||||
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2592",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
|
||||
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3104-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3104-1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2593",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:3304",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
|
||||
},
|
||||
{
|
||||
"refsource": "BUGTRAQ",
|
||||
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
|
||||
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2585",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2649",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
|
||||
},
|
||||
{
|
||||
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
|
||||
"refsource": "CONFIRM",
|
||||
@ -301,6 +641,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0554",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -206,6 +206,11 @@
|
||||
"name": "https://security.paloaltonetworks.com/CVE-2016-5696",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2016-5696"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -112,6 +112,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:1801"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "1036878",
|
||||
"refsource": "SECTRACK",
|
||||
@ -231,6 +236,126 @@
|
||||
"name": "RHSA-2017:2493",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2493"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20161012 New OpenSSL double-free and invalid free vulnerabilities in X509 parsing",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Oct/62"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20161214 APPLE-SA-2016-12-13-1 macOS 10.12.2",
|
||||
"url": "http://seclists.org/fulldisclosure/2016/Dec/47"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html",
|
||||
"url": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2788",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2769",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-20",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-20"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:2185",
|
||||
"refsource": "REDHAT",
|
||||
@ -77,11 +82,36 @@
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201612-16"
|
||||
},
|
||||
{
|
||||
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
|
||||
},
|
||||
{
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"name": "1036885",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1036885"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-16",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-16"
|
||||
},
|
||||
{
|
||||
"name": "https://www.tenable.com/security/tns-2016-21",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.tenable.com/security/tns-2016-21"
|
||||
},
|
||||
{
|
||||
"name": "https://bto.bluecoat.com/security-advisory/sa132",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bto.bluecoat.com/security-advisory/sa132"
|
||||
},
|
||||
{
|
||||
"name": "FreeBSD-SA-16:26",
|
||||
"refsource": "FREEBSD",
|
||||
@ -97,6 +127,121 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
|
||||
},
|
||||
{
|
||||
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2700",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-1"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2469",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2537",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3087-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3087-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2699",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2407",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
|
||||
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3673",
|
||||
"url": "http://www.debian.org/security/2016/dsa-3673"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2391",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0458",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2387",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
|
||||
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K90492697",
|
||||
"url": "https://support.f5.com/csp/article/K90492697"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2468",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2016:2496",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2016:2394",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
@ -216,6 +361,11 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9723",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9723"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9309",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9309"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9370",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9370"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9371",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9371"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/9372",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/9372"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -162,6 +162,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2017:2841"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560",
|
||||
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2017:2633",
|
||||
"refsource": "SUSE",
|
||||
@ -181,6 +186,71 @@
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-515264ae24",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-24f067299e",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3430-3",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3430-3"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html",
|
||||
"url": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2619",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/",
|
||||
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en",
|
||||
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449",
|
||||
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2017-7106a157f5",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2616",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2017:2617",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-3989",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3989"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"name": "https://github.com/randombit/botan/issues/1222",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/randombit/botan/issues/1222"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211108 [SECURITY] [DLA 2812-1] botan1.10 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00006.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"name": "102974",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102974"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,76 @@
|
||||
"name": "102367",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/102367"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0834",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0848",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0383",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3583-1",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3583-1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K18352029",
|
||||
"url": "https://support.f5.com/csp/article/K18352029"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0555",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2018:0408",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0986",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0416",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0482",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0841",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-3583-2",
|
||||
"url": "http://www.ubuntu.com/usn/USN-3583-2"
|
||||
},
|
||||
{
|
||||
"refsource": "SUSE",
|
||||
"name": "SUSE-SU-2018:0660",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34",
|
||||
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,6 +67,11 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4143-1",
|
||||
"url": "https://usn.ubuntu.com/4143-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2803-1] libsdl2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00031.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,18 +1,67 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2017-5123",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-5123",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "n/a",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name": "n/a"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Insufficient data validation"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/772848",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/772848"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51",
|
||||
"refsource": "MISC",
|
||||
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190321 [SECURITY] [DLA 1723-1] cron security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00025.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2801-1] cron security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00029.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,17 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-10909",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-10909",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -127,6 +127,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -89,6 +89,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,11 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-201904-06",
|
||||
"url": "https://security.gentoo.org/glsa/201904-06"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2197",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
|
||||
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2197",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2197",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,11 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:2197",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,11 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0079",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,6 +63,11 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4930",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4930"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Jul/54"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7",
|
||||
"url": "http://seclists.org/fulldisclosure/2021/Jul/54"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,18 +1,88 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-25019",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "contact@wpscan.com",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "LearnDash < 2.5.4 - Unauthenticated Arbitrary File Upload"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"generator": "WPScan CVE Generator",
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Unknown",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "LearnDash LMS",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "2.5.4",
|
||||
"version_value": "2.5.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server"
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://lists.openwall.net/full-disclosure/2018/01/10/17",
|
||||
"name": "https://lists.openwall.net/full-disclosure/2018/01/10/17"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"url": "https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a",
|
||||
"name": "https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"value": "CWE-862 Missing Authorization",
|
||||
"lang": "eng"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Jerome Bruandet (NinTechNet)"
|
||||
}
|
||||
],
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
@ -71,6 +71,11 @@
|
||||
"name": "[debian-lts-announce] 20180418 [SECURITY] [DLA 1354-1] opencv security update",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name": "https://github.com/opencv/opencv/issues/10540",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/opencv/opencv/issues/10540"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,11 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211102 [SECURITY] [DLA 2807-1] bind9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -1,18 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-6044",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-6044",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-16064. Reason: This candidate is a reservation duplicate of CVE-2018-16064. Notes: All CVE users should reference CVE-2018-16064 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-6058",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-6058",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11215. Reason: This candidate is a reservation duplicate of CVE-2017-11215. Notes: All CVE users should reference CVE-2017-11215 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,18 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-6059",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-6059",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11225. Reason: This candidate is a reservation duplicate of CVE-2017-11225. Notes: All CVE users should reference CVE-2017-11225 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -1,17 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-6122",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-6122",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Google",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Chrome",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "66.0.3359.139",
|
||||
"version_affected": "<"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Type Confusion"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/836141",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/836141"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,62 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2018-6125",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2018-6125",
|
||||
"ASSIGNER": "chrome-cve-admin@google.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Google",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Chrome",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "67.0.3396.62",
|
||||
"version_affected": "<"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Insufficient policy enforcement"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://crbug.com/818592",
|
||||
"refsource": "MISC",
|
||||
"name": "https://crbug.com/818592"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20190823 [SECURITY] [DLA 1895-1] libmspack security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00028.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2805-1] libmspack security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00033.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -146,6 +146,11 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2019/13xxx/CVE-2019-13776.json
Normal file
18
2019/13xxx/CVE-2019-13776.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-13776",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: some publications have used this number when they meant to use CVE-2019-13376."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user