mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-09 16:04:06 +00:00
- Synchronized data.
This commit is contained in:
parent
07327a00e4
commit
e383b4d874
@ -117,6 +117,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03814en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03814en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20090115 MD5 Hashes May Allow for Certificate Spoofing",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -67,6 +67,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBHF02981",
|
||||
"refsource" : "HP",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN02925",
|
||||
"refsource" : "HP",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN02925",
|
||||
"refsource" : "HP",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN02925",
|
||||
"refsource" : "HP",
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03918632"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBGN02925",
|
||||
"refsource" : "HP",
|
||||
|
@ -407,6 +407,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://puppet.com/security/cve/CVE-2015-4000"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03831en_us"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2015-06-30-1",
|
||||
"refsource" : "APPLE",
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name" : "https://security.netapp.com/advisory/ntap-20180215-0001/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20180215-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03784en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03784en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -82,6 +82,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171130-0003/"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03779en_us"
|
||||
},
|
||||
{
|
||||
"name" : "FEDORA-2016-4a3debc3a6",
|
||||
"refsource" : "FEDORA",
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-177"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us"
|
||||
},
|
||||
{
|
||||
"name" : "95695",
|
||||
"refsource" : "BID",
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-178"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us"
|
||||
},
|
||||
{
|
||||
"name" : "95694",
|
||||
"refsource" : "BID",
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-179"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us"
|
||||
},
|
||||
{
|
||||
"name" : "95692",
|
||||
"refsource" : "BID",
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-180"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us"
|
||||
},
|
||||
{
|
||||
"name" : "95691",
|
||||
"refsource" : "BID",
|
||||
|
@ -72,6 +72,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/torvalds/linux/commit/93362fa47fe98b62e4a34ab408c4a418432e7939"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03802en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03802en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3791",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -77,6 +77,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:39",
|
||||
"refsource" : "FREEBSD",
|
||||
|
@ -77,6 +77,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us"
|
||||
},
|
||||
{
|
||||
"name" : "FreeBSD-SA-16:39",
|
||||
"refsource" : "FREEBSD",
|
||||
|
@ -78,6 +78,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10205"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3886",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -97,6 +97,11 @@
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1170"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
},
|
||||
{
|
||||
"name" : "102101",
|
||||
"refsource" : "BID",
|
||||
|
@ -68,6 +68,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.synology.com/support/security/Synology_SA_17_54_Tomcat"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:0465",
|
||||
"refsource" : "REDHAT",
|
||||
|
@ -102,6 +102,16 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:3080",
|
||||
"refsource" : "REDHAT",
|
||||
|
@ -120,6 +120,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -115,6 +115,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -90,6 +90,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -140,6 +140,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -85,6 +85,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us"
|
||||
},
|
||||
{
|
||||
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -92,6 +92,11 @@
|
||||
"name" : "RHSA-2018:1170",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1170"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.synology.com/support/security/Synology_SA_17_72_Samba"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4043",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -67,6 +67,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.synology.com/support/security/Synology_SA_17_72_Samba"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4043",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -127,6 +127,16 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20171024-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03789en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03789en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03801en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03801en_us"
|
||||
},
|
||||
{
|
||||
"name" : "VU#307015",
|
||||
"refsource" : "CERT-VN",
|
||||
|
@ -92,6 +92,16 @@
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4082"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1318",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1318"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1355",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1355"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2018:0011",
|
||||
"refsource" : "SUSE",
|
||||
|
@ -112,6 +112,11 @@
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1170"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3583-1",
|
||||
"refsource" : "UBUNTU",
|
||||
|
@ -107,6 +107,21 @@
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2592"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0300",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0300.html"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2017:0435",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0435.html"
|
||||
},
|
||||
{
|
||||
"name" : "95827",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95827"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,6 +83,11 @@
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2594",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2594"
|
||||
},
|
||||
{
|
||||
"name" : "95793",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95793"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -79,6 +79,11 @@
|
||||
"name" : "https://jenkins.io/security/advisory/2017-02-01/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://jenkins.io/security/advisory/2017-02-01/"
|
||||
},
|
||||
{
|
||||
"name" : "95962",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95962"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -79,6 +79,11 @@
|
||||
"name" : "https://jenkins.io/security/advisory/2017-02-01/",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://jenkins.io/security/advisory/2017-02-01/"
|
||||
},
|
||||
{
|
||||
"name" : "95956",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/95956"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.tenable.com/security/tns-2018-04",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.tenable.com/security/tns-2018-04"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4065",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -63,6 +63,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://issues.apache.org/jira/browse/FLEX-35290"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us"
|
||||
},
|
||||
{
|
||||
"name" : "VU#307983",
|
||||
"refsource" : "CERT-VN",
|
||||
|
@ -86,6 +86,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3891",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -78,6 +78,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us"
|
||||
},
|
||||
{
|
||||
"name" : "101906",
|
||||
"refsource" : "BID",
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.asus.com/News/wzeltG5CjYaIwGJ0"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03798en_us"
|
||||
},
|
||||
{
|
||||
"name" : "101906",
|
||||
"refsource" : "BID",
|
||||
|
@ -173,6 +173,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2018-04-01"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.citrix.com/article/CTX234679",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.citrix.com/article/CTX234679"
|
||||
},
|
||||
{
|
||||
"name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
|
||||
"refsource" : "CISCO",
|
||||
|
@ -57,6 +57,11 @@
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://marc.info/?l=linux-crypto-vger&m=149181655623850&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03800en_us"
|
||||
},
|
||||
{
|
||||
"name" : "97534",
|
||||
"refsource" : "BID",
|
||||
|
@ -92,6 +92,11 @@
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2017:1647"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
},
|
||||
{
|
||||
"name" : "97950",
|
||||
"refsource" : "BID",
|
||||
|
@ -70,6 +70,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208221"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3896",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -72,6 +72,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3974",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -80,6 +80,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.apple.com/HT208221"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-3896",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -112,6 +112,11 @@
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1216"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2018:0011",
|
||||
"refsource" : "SUSE",
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03797en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03797en_us"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03797en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03797en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "44601",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/44601/"
|
||||
},
|
||||
{
|
||||
"name" : "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd",
|
||||
"refsource" : "MISC",
|
||||
@ -72,6 +77,11 @@
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4195",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4195"
|
||||
},
|
||||
{
|
||||
"name" : "1040838",
|
||||
"refsource" : "SECTRACK",
|
||||
|
@ -82,6 +82,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20180330-0002/"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.tenable.com/security/tns-2018-04",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.tenable.com/security/tns-2018-04"
|
||||
},
|
||||
{
|
||||
"name" : "103517",
|
||||
"refsource" : "BID",
|
||||
|
@ -100,6 +100,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.tenable.com/security/tns-2018-04",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.tenable.com/security/tns-2018-04"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4157",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -55,6 +55,11 @@
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"name" : "[debian-lts-announce] 20180504 [SECURITY] [DLA 1370-1] quassel security update",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "https://lists.debian.org/debian-lts-announce/2018/05/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://i.imgur.com/JJ4QcNq.png",
|
||||
"refsource" : "MISC",
|
||||
@ -64,6 +69,11 @@
|
||||
"name" : "https://github.com/quassel/quassel/blob/master/src/common/protocols/datastream/datastreampeer.cpp#L62",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/quassel/quassel/blob/master/src/common/protocols/datastream/datastreampeer.cpp#L62"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4189",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4189"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,11 @@
|
||||
"name" : "https://github.com/quassel/quassel/blob/master/src/core/coreauthhandler.cpp#L236",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://github.com/quassel/quassel/blob/master/src/core/coreauthhandler.cpp#L236"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4189",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4189"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"name" : "https://github.com/LibRaw/LibRaw/issues/144",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/LibRaw/LibRaw/issues/144"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3639-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3639-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"name" : "https://github.com/LibRaw/LibRaw/issues/144",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/LibRaw/LibRaw/issues/144"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3639-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3639-1/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,11 @@
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://security.netapp.com/advisory/ntap-20180313-0001/"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4135",
|
||||
"refsource" : "DEBIAN",
|
||||
|
@ -93,6 +93,16 @@
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4188"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1318",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1318"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1355",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1355"
|
||||
},
|
||||
{
|
||||
"name" : "103459",
|
||||
"refsource" : "BID",
|
||||
|
@ -86,6 +86,11 @@
|
||||
"name" : "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.5"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1318",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1318"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "20180503 DSA-2018-063: Dell EMC Unity Family OS Command Injection Vulnerability",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/May/15"
|
||||
},
|
||||
{
|
||||
"name" : "104092",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104092"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "20180504 DSA-2018-086: RSA Authentication Manager Multiple Vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/May/18"
|
||||
},
|
||||
{
|
||||
"name" : "1040835",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040835"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "20180504 DSA-2018-086: RSA Authentication Manager Multiple Vulnerabilities",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://seclists.org/fulldisclosure/2018/May/18"
|
||||
},
|
||||
{
|
||||
"name" : "1040835",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040835"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,11 @@
|
||||
"name" : "USN-3632-1",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3632-1/"
|
||||
},
|
||||
{
|
||||
"name" : "1040749",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040749"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,11 @@
|
||||
"name" : "104061",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104061"
|
||||
},
|
||||
{
|
||||
"name" : "1040842",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040842"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-123-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-123-01"
|
||||
},
|
||||
{
|
||||
"name" : "104098",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104098"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,6 +57,11 @@
|
||||
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-123-01",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-123-01"
|
||||
},
|
||||
{
|
||||
"name" : "104098",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104098"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,96 @@
|
||||
"name" : "https://xenbits.xen.org/xsa/advisory-260.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://xenbits.xen.org/xsa/advisory-260.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.citrix.com/article/CTX234679",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.citrix.com/article/CTX234679"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.synology.com/support/security/Synology_SA_18_21",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://www.synology.com/support/security/Synology_SA_18_21"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1318",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1318"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1319",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1319"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1345",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1345"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1346",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1346"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1347",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1347"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1348",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1348"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1349",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1349"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1350",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1350"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1351",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1351"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1352",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1352"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1353",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1353"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1354",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1354"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:1355",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:1355"
|
||||
},
|
||||
{
|
||||
"name" : "USN-3641-2",
|
||||
"refsource" : "UBUNTU",
|
||||
"url" : "https://usn.ubuntu.com/3641-2/"
|
||||
},
|
||||
{
|
||||
"name" : "104071",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/104071"
|
||||
},
|
||||
{
|
||||
"name" : "1040849",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1040849"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name" : "https://safefirmware.com/amdflaws_whitepaper.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://safefirmware.com/amdflaws_whitepaper.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03841en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03841en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,11 @@
|
||||
"name" : "https://safefirmware.com/amdflaws_whitepaper.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://safefirmware.com/amdflaws_whitepaper.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03841en_us",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03841en_us"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user