-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Collect SUSE #62
Comments
Also, not sure this is all up to date but we have https://support.novell.com/security/oval/suse.linux.enterprise.server.11.xml and https://support.novell.com/security/oval/suse.linux.enterprise.server.12.xml |
This is the total data which I am able to get
Which is further filtered to get |
@sbs2001 thanks! Adding the URLs in |
Just discovered http://ftp.suse.com/pub/projects/security/ , specifically http://ftp.suse.com/pub/projects/security/yaml/ is useful, we could populate our db with resolved packages(these yamls basically contains list of backports with fix to vulnerabilities). http://ftp.suse.com/pub/projects/security/oval/ is of limited value as I am not sure what difference will it make compared to using CVRF. http://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml is also interesting considering we might want to collect severity indicators of a particular vulnerability from different sources. Also @haikoschol SUSE folks provide Etags :) in their response headers. |
https://www.suse.com/support/security/cvrf/
The text was updated successfully, but these errors were encountered: