Revert "November 2021 Patch Tuesday"

This reverts commit df296d9e014bf68ef22c0583c98da3fbe42ea316.
This commit is contained in:
Anthony Singleton 2021-11-17 15:47:33 -05:00
parent 1d8691e58d
commit 938debeed0
1785 changed files with 60082 additions and 3843 deletions

View File

@ -71,6 +71,11 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K21914362",
"url": "https://support.f5.com/csp/article/K21914362"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/7098-security-advisory-40"
}
]
}

View File

@ -1571,6 +1571,11 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005"
}
]
}

View File

@ -1371,6 +1371,11 @@
"refsource": "MLIST",
"name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7"
}
]
}

View File

@ -931,6 +931,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}

View File

@ -621,6 +621,11 @@
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}

View File

@ -876,6 +876,11 @@
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}

View File

@ -156,6 +156,11 @@
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176032"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
}
]
}

View File

@ -156,6 +156,11 @@
"name": "MDVSA-2015:003",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
}
]
}

View File

@ -191,6 +191,11 @@
"name": "http://bugs.ntp.org/show_bug.cgi?id=2669",
"refsource": "CONFIRM",
"url": "http://bugs.ntp.org/show_bug.cgi?id=2669"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
}
]
}

View File

@ -146,6 +146,11 @@
"name": "MDVSA-2015:003",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:003"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1047-security-advisory-8"
}
]
}

View File

@ -496,6 +496,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
"url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9"
}
]
}

View File

@ -0,0 +1,80 @@
{
"CVE_data_meta": {
"ID": "CVE-2015-10001",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "WP-Stats < 2.5.2 - CSRF to Stored Cross-Site Scripting (XSS)"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP-Stats",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.52",
"version_value": "2.52"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The WP-Stats WordPress plugin before 2.52 does not have CSRF check when saving its settings, and did not escape some of them when outputting them, allowing attacker to make logged in high privilege users change them and set Cross-Site Scripting payloads"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734",
"name": "https://wpscan.com/vulnerability/f5c3dfea-7203-4a98-88ff-aa6a24d03734"
},
{
"refsource": "MISC",
"url": "https://www.openwall.com/lists/oss-security/2015/06/17/6",
"name": "https://www.openwall.com/lists/oss-security/2015/06/17/6"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Sebastian Wolfgang Kraemer"
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -321,6 +321,11 @@
"name": "HPSBGN03371",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=143654156615516&w=2"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
}
]
}

View File

@ -311,6 +311,11 @@
"name": "HPSBGN03371",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=143654156615516&w=2"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
}
]
}

View File

@ -296,6 +296,11 @@
"name": "https://www.openssl.org/news/secadv_20150611.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv_20150611.txt"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11"
}
]
}

View File

@ -1,18 +1,85 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2015-20019",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Content text slider on post < 6.9 - Authenticated Stored Cross-Site Scripting (XSS)"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Content text slider on post",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.9",
"version_value": "6.9"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://seclists.org/bugtraq/2015/Dec/124",
"name": "https://seclists.org/bugtraq/2015/Dec/124"
},
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86",
"name": "https://wpscan.com/vulnerability/4f92b211-e09c-4ed0-bc98-27e0b51b1f86"
},
{
"refsource": "CONFIRM",
"url": "https://plugins.trac.wordpress.org/changeset/1393044/content-text-slider-on-post",
"name": "https://plugins.trac.wordpress.org/changeset/1393044/content-text-slider-on-post"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-79 Cross-site Scripting (XSS)",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "ALIREZA_PROMIS"
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -1,18 +1,85 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2015-20067",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "WP Attachment Export < 0.2.4 - Unauthenticated Posts Download"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "WP Attachment Export",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0.2.4",
"version_value": "0.2.4"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://seclists.org/fulldisclosure/2015/Jul/73",
"name": "https://seclists.org/fulldisclosure/2015/Jul/73"
},
{
"refsource": "MISC",
"url": "https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_attachment_export_file_download.rb",
"name": "https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_attachment_export_file_download.rb"
},
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a",
"name": "https://wpscan.com/vulnerability/d1a9ed65-baf3-4c85-b077-1f37d8c7793a"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-862 Missing Authorization",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Nitin Venkatesh"
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -291,6 +291,11 @@
"name": "RHSA-2015:1000",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1000.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2015/09/15/2",
"url": "http://www.openwall.com/lists/oss-security/2015/09/15/2"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
}
]
}

View File

@ -136,6 +136,11 @@
"name": "GLSA-201602-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201602-01"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
}
]
}

View File

@ -206,6 +206,11 @@
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1174-security-advisory-12"
}
]
}

View File

@ -111,6 +111,11 @@
"refsource": "CONFIRM",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html",
"url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
}
]
}

View File

@ -126,6 +126,11 @@
"name": "GLSA-201602-01",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201602-01"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
}
]
}

View File

@ -146,6 +146,11 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016"
}
]
}

View File

@ -226,6 +226,11 @@
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016"
}
]
}

View File

@ -206,6 +206,11 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://arxiv.org/pdf/1701.04739.pdf",
"refsource": "MISC",
"url": "https://arxiv.org/pdf/1701.04739.pdf"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -141,6 +141,11 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
}
]
}

View File

@ -233,6 +233,11 @@
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
}
]
}

View File

@ -236,6 +236,11 @@
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19"
}
]
}

View File

@ -236,6 +236,136 @@
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/9"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "CISCO",
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "BUGTRAQ",
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
"url": "http://www.securityfocus.com/archive/1/540957/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)",
"url": "http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "UBUNTU",
"name": "USN-3181-1",
"url": "http://www.ubuntu.com/usn/USN-3181-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K23873366",
"url": "https://support.f5.com/csp/article/K23873366"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -231,6 +231,166 @@
"name": "http://eprint.iacr.org/2016/594.pdf",
"refsource": "MISC",
"url": "http://eprint.iacr.org/2016/594.pdf"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "CISCO",
"name": "20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/8"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/4"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/6"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K53084033",
"url": "https://support.f5.com/csp/article/K53084033"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/10"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/11"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/5"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/12"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2496",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/08/7"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations",
"url": "http://www.openwall.com/lists/oss-security/2016/06/09/2"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -156,6 +156,101 @@
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K59298921",
"url": "https://support.f5.com/csp/article/K59298921"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92557"
},
{
"refsource": "CONFIRM",
"name": "https://source.android.com/security/bulletin/2017-03-01",
"url": "https://source.android.com/security/bulletin/2017-03-01"
},
{
"name": "1037968",
"refsource": "SECTRACK",
@ -196,6 +201,111 @@
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K01276005",
"url": "https://support.f5.com/csp/article/K01276005"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -62,16 +62,51 @@
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
},
{
"name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us"
},
{
"name": "GLSA-201612-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-16"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415"
},
{
"name": "RHSA-2017:3240",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3240"
},
{
"name": "https://www.tenable.com/security/tns-2016-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-16"
},
{
"name": "RHSA-2017:2709",
"refsource": "REDHAT",
@ -82,21 +117,56 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92630"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499"
},
{
"name": "https://www.tenable.com/security/tns-2016-21",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-21"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
},
{
"name": "RHSA-2017:3239",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3239"
},
{
"refsource": "EXPLOIT-DB",
"name": "42091",
"url": "https://www.exploit-db.com/exploits/42091/"
},
{
"name": "GLSA-201701-65",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201701-65"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name": "1036696",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036696"
},
{
"name": "https://security.netapp.com/advisory/ntap-20160915-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20160915-0001/"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"
},
{
"name": "GLSA-201707-01",
"refsource": "GENTOO",
@ -112,16 +182,51 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3114"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa133",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa133"
},
{
"name": "https://www.tenable.com/security/tns-2017-09",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2017-09"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116"
},
{
"name": "RHSA-2017:1216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"refsource": "CONFIRM",
"name": "https://wiki.opendaylight.org/view/Security_Advisories",
"url": "https://wiki.opendaylight.org/view/Security_Advisories"
},
{
"name": "RHSA-2017:2710",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2710"
},
{
"name": "https://security.netapp.com/advisory/ntap-20170119-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984"
},
{
"name": "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections",
"refsource": "MLIST",
@ -152,11 +257,291 @@
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name": "RHSA-2017:0462",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0462.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
"url": "http://www.securityfocus.com/archive/1/540341/100/0/threaded"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "BUGTRAQ",
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "BUGTRAQ",
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10197"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10186"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "CONFIRM",
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613",
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "UBUNTU",
"name": "USN-3194-1",
"url": "http://www.ubuntu.com/usn/USN-3194-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "BUGTRAQ",
"name": "20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information",
"url": "https://seclists.org/bugtraq/2018/Nov/21"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K13167034",
"url": "https://support.f5.com/csp/article/K13167034"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722"
},
{
"refsource": "BUGTRAQ",
"name": "20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/542005/100/0/threaded"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3372-1",
"url": "http://www.ubuntu.com/usn/USN-3372-1"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:0460",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:0490",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3270-1",
"url": "http://www.ubuntu.com/usn/USN-3270-1"
},
{
"refsource": "BUGTRAQ",
"name": "20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded"
},
{
"refsource": "CONFIRM",
"name": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178",
"url": "https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "FULLDISC",
"name": "20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/May/105"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2017:0513",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
},
{
"refsource": "BUGTRAQ",
"name": "20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/539885/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2017:0374",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:0346",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2496",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3198-1",
"url": "http://www.ubuntu.com/usn/USN-3198-1"
},
{
"refsource": "MISC",
"name": "http://seclists.org/fulldisclosure/2017/May/105",
"url": "http://seclists.org/fulldisclosure/2017/May/105"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403"
},
{
"refsource": "BUGTRAQ",
"name": "20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information",
"url": "http://www.securityfocus.com/archive/1/541104/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:1444",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities",
"url": "http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded"
},
{
"refsource": "UBUNTU",
"name": "USN-3179-1",
"url": "http://www.ubuntu.com/usn/USN-3179-1"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1245",
@ -172,6 +557,11 @@
"name": "RHSA-2020:0451",
"url": "https://access.redhat.com/errata/RHSA-2020:0451"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
@ -446,6 +836,11 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -106,6 +106,11 @@
"name": "https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=f09154d6648eeb4ec5e1ac8a2bacbd2f8c87c14a",
"refsource": "CONFIRM",
"url": "https://git-wip-us.apache.org/repos/asf?p=zookeeper.git;a=commitdiff;h=f09154d6648eeb4ec5e1ac8a2bacbd2f8c87c14a"
},
{
"refsource": "MLIST",
"name": "[dubbo-notifications] 20211101 [GitHub] [dubbo] AlbumenJ opened a new issue #9177: Upgrade Zookeeper dependency",
"url": "https://lists.apache.org/thread.html/r4b743f407244294f316325458ccaabfce9cd70ca3a6423dbe574035c@%3Cnotifications.dubbo.apache.org%3E"
}
]
}

View File

@ -292,6 +292,346 @@
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10176"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2635",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2659",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
},
{
"refsource": "UBUNTU",
"name": "USN-3106-2",
"url": "http://www.ubuntu.com/usn/USN-3106-2"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2583",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2633",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2638",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2584",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2658",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2631",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3106-3",
"url": "http://www.ubuntu.com/usn/USN-3106-3"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2655",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2016-c3558808cd",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
},
{
"refsource": "BUGTRAQ",
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2637",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2596",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2634",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
},
{
"refsource": "CISCO",
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
},
{
"refsource": "CISCO",
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
},
{
"refsource": "CONFIRM",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10177"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2657",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2614",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3105-2",
"url": "http://www.ubuntu.com/usn/USN-3105-2"
},
{
"refsource": "UBUNTU",
"name": "USN-3107-1",
"url": "http://www.ubuntu.com/usn/USN-3107-1"
},
{
"refsource": "CONFIRM",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774"
},
{
"refsource": "UBUNTU",
"name": "USN-3107-2",
"url": "http://www.ubuntu.com/usn/USN-3107-2"
},
{
"refsource": "BUGTRAQ",
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2625",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3106-1",
"url": "http://www.ubuntu.com/usn/USN-3106-1"
},
{
"refsource": "UBUNTU",
"name": "USN-3106-4",
"url": "http://www.ubuntu.com/usn/USN-3106-4"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2673",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3104-2",
"url": "http://www.ubuntu.com/usn/USN-3104-2"
},
{
"refsource": "CONFIRM",
"name": "http://fortiguard.com/advisory/FG-IR-16-063",
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
},
{
"refsource": "CONFIRM",
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2629",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
},
{
"refsource": "BUGTRAQ",
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2632",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
},
{
"refsource": "UBUNTU",
"name": "USN-3105-1",
"url": "http://www.ubuntu.com/usn/USN-3105-1"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2630",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2016-db4b75b352",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2016-c8a0c7eece",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2636",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:3069",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10222"
},
{
"refsource": "DEBIAN",
"name": "DSA-3696",
"url": "http://www.debian.org/security/2016/dsa-3696"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2592",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
},
{
"refsource": "BUGTRAQ",
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
},
{
"refsource": "BUGTRAQ",
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
},
{
"refsource": "UBUNTU",
"name": "USN-3104-1",
"url": "http://www.ubuntu.com/usn/USN-3104-1"
},
{
"refsource": "BUGTRAQ",
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2593",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:3304",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
},
{
"refsource": "BUGTRAQ",
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2585",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2649",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
"refsource": "CONFIRM",
@ -301,6 +641,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0554",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
}
]
}

View File

@ -206,6 +206,11 @@
"name": "https://security.paloaltonetworks.com/CVE-2016-5696",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5696"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23"
}
]
}

View File

@ -112,6 +112,11 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1801"
},
{
"refsource": "CONFIRM",
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name": "1036878",
"refsource": "SECTRACK",
@ -231,6 +236,126 @@
"name": "RHSA-2017:2493",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2493"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "FULLDISC",
"name": "20161012 New OpenSSL double-free and invalid free vulnerabilities in X509 parsing",
"url": "http://seclists.org/fulldisclosure/2016/Oct/62"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "FULLDISC",
"name": "20161214 APPLE-SA-2016-12-13-1 macOS 10.12.2",
"url": "http://seclists.org/fulldisclosure/2016/Dec/47"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html",
"url": "http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2788",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2769",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2496",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/tns-2016-20",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-20"
},
{
"name": "RHSA-2018:2185",
"refsource": "REDHAT",
@ -77,11 +82,36 @@
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201612-16"
},
{
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"refsource": "CONFIRM",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"
},
{
"name": "1036885",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036885"
},
{
"name": "https://www.tenable.com/security/tns-2016-16",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-16"
},
{
"name": "https://www.tenable.com/security/tns-2016-21",
"refsource": "CONFIRM",
"url": "https://www.tenable.com/security/tns-2016-21"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa132",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa132"
},
{
"name": "FreeBSD-SA-16:26",
"refsource": "FREEBSD",
@ -97,6 +127,121 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2187"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10215"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2700",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-1",
"url": "http://www.ubuntu.com/usn/USN-3087-1"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2469",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2537",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3087-2",
"url": "http://www.ubuntu.com/usn/USN-3087-2"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2699",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"
},
{
"refsource": "FULLDISC",
"name": "20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities",
"url": "http://seclists.org/fulldisclosure/2017/Jul/31"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"
},
{
"refsource": "DEBIAN",
"name": "DSA-3673",
"url": "http://www.debian.org/security/2016/dsa-3673"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2391",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0458",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2387",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"
},
{
"refsource": "CONFIRM",
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K90492697",
"url": "https://support.f5.com/csp/article/K90492697"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2468",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2016:2496",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2016:2394",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
@ -216,6 +361,11 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"
}
]
}

View File

@ -73,6 +73,11 @@
"name": "https://github.com/opencv/opencv/issues/9723",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9723"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/9309",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9309"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://github.com/opencv/opencv/issues/9370",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9370"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://github.com/opencv/opencv/issues/9371",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9371"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -66,6 +66,11 @@
"name": "https://github.com/opencv/opencv/issues/9372",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/9372"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -162,6 +162,11 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:2841"
},
{
"refsource": "CONFIRM",
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560",
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4560"
},
{
"name": "openSUSE-SU-2017:2633",
"refsource": "SUSE",
@ -181,6 +186,71 @@
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2017-515264ae24",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2017-24f067299e",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/"
},
{
"refsource": "UBUNTU",
"name": "USN-3430-3",
"url": "http://www.ubuntu.com/usn/USN-3430-3"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html",
"url": "http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2619",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/"
},
{
"refsource": "CONFIRM",
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en"
},
{
"refsource": "CONFIRM",
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449",
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2017-7106a157f5",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2616",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2017:2617",
"url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html"
},
{
"refsource": "DEBIAN",
"name": "DSA-3989",
"url": "https://www.debian.org/security/2017/dsa-3989"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30"
}
]
}

View File

@ -61,6 +61,11 @@
"name": "https://github.com/randombit/botan/issues/1222",
"refsource": "MISC",
"url": "https://github.com/randombit/botan/issues/1222"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211108 [SECURITY] [DLA 2812-1] botan1.10 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00006.html"
}
]
}

View File

@ -76,6 +76,11 @@
"name": "102974",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102974"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -141,6 +141,76 @@
"name": "102367",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102367"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0834",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0848",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0383",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3583-1",
"url": "http://www.ubuntu.com/usn/USN-3583-1"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K18352029",
"url": "https://support.f5.com/csp/article/K18352029"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0555",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2018:0408",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0986",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0416",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0482",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0841",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html"
},
{
"refsource": "UBUNTU",
"name": "USN-3583-2",
"url": "http://www.ubuntu.com/usn/USN-3583-2"
},
{
"refsource": "SUSE",
"name": "SUSE-SU-2018:0660",
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html"
},
{
"refsource": "MISC",
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/4577-security-advisory-34"
}
]
}

View File

@ -67,6 +67,11 @@
"refsource": "UBUNTU",
"name": "USN-4143-1",
"url": "https://usn.ubuntu.com/4143-1/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2803-1] libsdl2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00031.html"
}
]
}

View File

@ -1,18 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-5123",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-5123",
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient data validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://crbug.com/772848",
"refsource": "MISC",
"name": "https://crbug.com/772848"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51",
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96ca579a1ecc943b75beba58bebb0356f6cc4b51"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux."
}
]
}
}
}

View File

@ -71,6 +71,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190321 [SECURITY] [DLA 1723-1] cron security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00025.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2801-1] cron security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00029.html"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -1,17 +1,17 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10909",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-10909",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
}

View File

@ -127,6 +127,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -96,6 +96,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -101,6 +101,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -89,6 +89,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -91,6 +91,11 @@
"refsource": "GENTOO",
"name": "GLSA-201904-06",
"url": "https://security.gentoo.org/glsa/201904-06"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MLIST",
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
}
]
}

View File

@ -76,6 +76,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/160080/Fuel-CMS-1.4-Remote-Code-Execution.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/164756/Fuel-CMS-1.4.1-Remote-Code-Execution.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "REDHAT",
"name": "RHSA-2019:2197",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
}
]
}

View File

@ -87,6 +87,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0079",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"
}
]
}

View File

@ -63,6 +63,11 @@
"refsource": "DEBIAN",
"name": "DSA-4930",
"url": "https://www.debian.org/security/2021/dsa-4930"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "FULLDISC",
"name": "20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7",
"url": "http://seclists.org/fulldisclosure/2021/Jul/54"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
}
]
},

View File

@ -73,6 +73,11 @@
"refsource": "FULLDISC",
"name": "20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7",
"url": "http://seclists.org/fulldisclosure/2021/Jul/54"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20211104-0004/",
"url": "https://security.netapp.com/advisory/ntap-20211104-0004/"
}
]
},

View File

@ -1,18 +1,88 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-25019",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "LearnDash < 2.5.4 - Unauthenticated Arbitrary File Upload"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "LearnDash LMS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.5.4",
"version_value": "2.5.4"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://lists.openwall.net/full-disclosure/2018/01/10/17",
"name": "https://lists.openwall.net/full-disclosure/2018/01/10/17"
},
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a",
"name": "https://wpscan.com/vulnerability/9444f67b-8e3d-4cf0-b319-ed25e7db383a"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "eng"
}
]
},
{
"description": [
{
"value": "CWE-862 Missing Authorization",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Jerome Bruandet (NinTechNet)"
}
],
"source": {
"discovery": "EXTERNAL"
}
}

View File

@ -71,6 +71,11 @@
"name": "[debian-lts-announce] 20180418 [SECURITY] [DLA 1354-1] opencv security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -71,6 +71,11 @@
"name": "https://github.com/opencv/opencv/issues/10540",
"refsource": "MISC",
"url": "https://github.com/opencv/opencv/issues/10540"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211030 [SECURITY] [DLA 2799-1] opencv security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html"
}
]
}

View File

@ -151,6 +151,11 @@
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211102 [SECURITY] [DLA 2807-1] bind9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html"
}
]
},

View File

@ -1,18 +1,18 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6044",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6044",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-16064. Reason: This candidate is a reservation duplicate of CVE-2018-16064. Notes: All CVE users should reference CVE-2018-16064 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}

View File

@ -1,18 +1,18 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6058",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6058",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11215. Reason: This candidate is a reservation duplicate of CVE-2017-11215. Notes: All CVE users should reference CVE-2017-11215 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}

View File

@ -1,18 +1,18 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6059",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6059",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11225. Reason: This candidate is a reservation duplicate of CVE-2017-11225. Notes: All CVE users should reference CVE-2017-11225 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}

View File

@ -1,17 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6122",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6122",
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_value": "66.0.3359.139",
"version_affected": "<"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Type Confusion"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://crbug.com/836141",
"refsource": "MISC",
"name": "https://crbug.com/836141"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
}

View File

@ -1,17 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-6125",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-6125",
"ASSIGNER": "chrome-cve-admin@google.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Google",
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_value": "67.0.3396.62",
"version_affected": "<"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient policy enforcement"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://crbug.com/818592",
"refsource": "MISC",
"name": "https://crbug.com/818592"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page."
}
]
}

View File

@ -86,6 +86,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190823 [SECURITY] [DLA 1895-1] libmspack security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/08/msg00028.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2805-1] libmspack security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00033.html"
}
]
}

View File

@ -146,6 +146,11 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-13776",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: some publications have used this number when they meant to use CVE-2019-13376."
}
]
}
}

Some files were not shown because too many files have changed in this diff Show More