"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-08-23 21:00:48 +00:00
parent be1bbb512e
commit f6fb793243
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
28 changed files with 456 additions and 60 deletions

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-13367",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2018-13367",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiOS",
"version": {
"version_data": [
{
"version_value": "FortiOS 6.2.0 and below"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/advisory/FG-IR-18-173",
"url": "https://fortiguard.com/advisory/FG-IR-18-173"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An information exposure vulnerability in FortiOS 6.2.0 and below may allow an unauthenticated attacker to gain platform information such as version, models, via parsing a JavaScript file through admin webUI."
}
]
}

View File

@ -71,6 +71,11 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1988",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1989",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html"
}
]
}

View File

@ -56,6 +56,11 @@
"refsource": "MISC",
"name": "https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/",
"url": "https://mayaseven.com/nimble-directory-traversal-in-nimble-streamer-version-3-0-2-2-to-3-5-4-9/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html",
"url": "http://packetstormsecurity.com/files/154196/Nimble-Streamer-3.x-Directory-Traversal.html"
}
]
}

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -111,6 +111,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -111,6 +111,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -116,6 +116,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},

View File

@ -4,14 +4,61 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-12400",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@apache.org",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Apache",
"product": {
"product_data": [
{
"product_name": "Apache Santuario - XML Security for Java",
"version": {
"version_data": [
{
"version_value": "All 2.0.x releases from 2.0.3"
},
{
"version_value": "all 2.1.x releases before 2.1.4."
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Process Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2",
"url": "http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4."
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://github.com/schismtracker/schismtracker/releases/tag/20190805",
"url": "https://github.com/schismtracker/schismtracker/releases/tag/20190805"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1994",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "MISC",
"name": "https://github.com/schismtracker/schismtracker/releases/tag/20190805",
"url": "https://github.com/schismtracker/schismtracker/releases/tag/20190805"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1994",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00072.html"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15092",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The webtoffee \"WordPress Users & WooCommerce Customers Import Export\" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://hackpuntes.com/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection/",
"url": "https://hackpuntes.com/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection/"
}
]
}
}

View File

@ -1,11 +1,11 @@
{
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2019-07-30",
"ID": "CVE-2019-1552",
"STATE": "PUBLIC",
"ASSIGNER": "openssl-security@openssl.org",
"DATE_PUBLIC": "2019-07-30",
"ID": "CVE-2019-1552",
"STATE": "PUBLIC",
"TITLE": "Windows builds with insecure path defaults"
},
},
"affects": {
"vendor": {
"vendor_data": [
@ -13,15 +13,15 @@
"product": {
"product_data": [
{
"product_name": "OpenSSL",
"product_name": "OpenSSL",
"version": {
"version_data": [
{
"version_value": "Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c)"
},
},
{
"version_value": "Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k)"
},
},
{
"version_value": "Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s)"
}
@ -29,74 +29,79 @@
}
}
]
},
},
"vendor_name": "OpenSSL"
}
]
}
},
},
"credit": [
{
"lang": "eng",
"lang": "eng",
"value": "Rich Mirch"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"lang": "eng",
"value": "OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s)."
}
]
},
},
"impact": [
{
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"lang": "eng",
"url": "https://www.openssl.org/policies/secpolicy.html#Low",
"value": "Low"
}
],
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"lang": "eng",
"value": "Insecure defaults"
}
]
}
]
},
},
"references": {
"reference_data": [
{
"name": "https://www.openssl.org/news/secadv/20190730.txt",
"refsource": "CONFIRM",
"name": "https://www.openssl.org/news/secadv/20190730.txt",
"refsource": "CONFIRM",
"url": "https://www.openssl.org/news/secadv/20190730.txt"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=54aa9d51b09d67e90db443f682cface795f5af9e",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=54aa9d51b09d67e90db443f682cface795f5af9e",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=54aa9d51b09d67e90db443f682cface795f5af9e"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e32bc855a81a2d48d215c506bdeb4f598045f7e9",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e32bc855a81a2d48d215c506bdeb4f598045f7e9",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e32bc855a81a2d48d215c506bdeb4f598045f7e9"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b15a19c148384e73338aa7c5b12652138e35ed28",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b15a19c148384e73338aa7c5b12652138e35ed28",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b15a19c148384e73338aa7c5b12652138e35ed28"
},
},
{
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d333ebaf9c77332754a9d5e111e2f53e1de54fdd",
"refsource": "CONFIRM",
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d333ebaf9c77332754a9d5e111e2f53e1de54fdd",
"refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d333ebaf9c77332754a9d5e111e2f53e1de54fdd"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0006/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0006/"
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-5594",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-5594",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiNAC",
"version": {
"version_data": [
{
"version_value": "FortiNAC 8.3.0 to 8.3.6 and 8.5.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/advisory/FG-IR-19-140",
"url": "https://fortiguard.com/advisory/FG-IR-19-140"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An Improper Neutralization of Input During Web Page Generation (\"Cross-site Scripting\") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI."
}
]
}

View File

@ -1,17 +1,61 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-6695",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-6695",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiManager",
"version": {
"version_data": [
{
"version_value": "FortiManager all versions below 6.2.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/advisory/FG-IR-19-017",
"url": "https://fortiguard.com/advisory/FG-IR-19-017"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods."
}
]
}

View File

@ -123,6 +123,16 @@
"refsource": "DEBIAN",
"name": "DSA-4505",
"url": "https://www.debian.org/security/2019/dsa-4505"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -138,6 +138,21 @@
"refsource": "MLIST",
"name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514",
"url": "http://www.openwall.com/lists/oss-security/2019/08/20/1"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0004/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0004/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -123,6 +123,16 @@
"refsource": "DEBIAN",
"name": "DSA-4505",
"url": "https://www.debian.org/security/2019/dsa-4505"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -138,6 +138,21 @@
"refsource": "MLIST",
"name": "[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514",
"url": "http://www.openwall.com/lists/oss-security/2019/08/20/1"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0001/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0004/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0004/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -123,6 +123,11 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K50233772",
"url": "https://support.f5.com/csp/article/K50233772"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -128,6 +128,16 @@
"refsource": "DEBIAN",
"name": "DSA-4505",
"url": "https://www.debian.org/security/2019/dsa-4505"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -123,6 +123,16 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K02591030",
"url": "https://support.f5.com/csp/article/K02591030"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0003/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0003/"
}
]
},

View File

@ -123,6 +123,11 @@
"refsource": "MLIST",
"name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames",
"url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190823-0005/",
"url": "https://security.netapp.com/advisory/ntap-20190823-0005/"
}
]
},

View File

@ -126,6 +126,11 @@
"refsource": "GENTOO",
"name": "GLSA-201908-20",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:1990",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
}
]
},