Search results
Jump to navigation
Jump to search
Page title matches
- '''The User Services Advisory Group (USAG) is formally closed as of 02 October 2012.''' The '''User Services Advisory Group (USAG)''' had representatives from the user communities and from the develo10 KB (1,497 words) - 19:32, 24 December 2014
- #REDIRECT[[Operations Tools Advisory Groups]]45 bytes (5 words) - 18:10, 6 August 2014
- #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]54 bytes (6 words) - 19:32, 24 December 2014
Page text matches
- #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]54 bytes (6 words) - 19:32, 24 December 2014
- #REDIRECT [[EGI-InSPIRE:User Services Advisory Group]]54 bytes (6 words) - 12:45, 5 June 2015
- We will draft an advisory, and would appreciate your input to ensure it is complete and correct. The advisory will be located at3 KB (529 words) - 15:20, 28 April 2016
- *[[Operations Tools Advisory Group|Operations Tools Advisory Group]] *[[GGUS Advisory Board|GGUS Advisory Board]]1 KB (147 words) - 17:30, 15 April 2015
- EGI SVG ADVISORY [EGI-SVG-OpenSSL-CVE-2015] Title: EGI SVG Advisory 'Low' RISK - OpenSSL announcement on 3rd December1 KB (169 words) - 16:54, 7 December 2015
- Each group can have medium-term goals that are not immediately achievable. To set up new Interest group please contact operations@egi.eu6 KB (805 words) - 13:48, 19 June 2015
- ...ty Group, which is documented in SVG advisory [[SVG:Advisory-SVG-2012-4073|Advisory-SVG-2012-4073 ]]1 KB (195 words) - 12:43, 21 January 2015
- EGI SVG ADVISORY [EGI-SVG-2014-8580] Title: EGI SVG Advisory 'High' Risk - Dirac does not check CRLs [EGI-SVG-2015-8585]2 KB (245 words) - 11:51, 13 October 2015
- EGI SVG ADVISORY [EGI-SVG-2013-6052] Title: EGI SVG Advisory 'Moderate' RISK - PerfSONAR web interface vulnerabilities2 KB (328 words) - 16:02, 5 August 2014
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability concerning SLURM CVE-2021-31215 [EGI- This advisory will be placed on the wiki on or after 2021-05-254 KB (515 words) - 17:35, 16 June 2021
- Title: EGI SVG Advisory [TLP:WHITE] Up to 'HIGH' risk Ansible input validation vulnerability [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-95873 KB (460 words) - 15:52, 1 February 2017
- Title: EGI SVG ADVISORY [TLP:WHITE] Up to 'HIGH' risk dnsmasq multiple vulnerabilities [EGI-SVG-CVE URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-144914 KB (570 words) - 11:47, 10 October 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'Moderate' risk DPM SRM Buffer Overflow [EGI-SVG-2017-13915] advisory as 'AMBER' to allow sites to patch before it is exposed publicly.4 KB (579 words) - 16:29, 8 May 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk vulnerability concerning SLURM CVE-2018- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-70333 KB (477 words) - 10:59, 13 April 2018
- Title: EGI SVG Advisory [TLP:WHITE] LOW risk vulnerability - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-118393 KB (430 words) - 12:42, 7 August 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'MODERATE' risk ARC 5.2.1 World Writeable log directory [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-123193 KB (472 words) - 12:37, 7 August 2017
- EGI CSIRT ADVISORY [EGI-ADV-20100628] This advisory is based on publically available information and4 KB (600 words) - 19:48, 26 July 2010
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'CRITICAL' risk. https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-143114 KB (550 words) - 16:28, 23 May 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] UP TO CRITICAL risk Remote Code execution in JupyterLab and Ju URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-327984 KB (619 words) - 18:17, 7 September 2021
- EGI SVG ADVISORY [EGI-SVG-2013-5890] Title: EGI SVG Advisory 'Critical' RISK - CVMFS root exploit3 KB (445 words) - 12:42, 26 September 2013
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Cache Poisoning Squid Vulnerabilities [EGI-SV URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-168405 KB (704 words) - 15:38, 16 September 2020
- Title: EGI SVG 'ADVISORY' **UPDATE 2** [TLP:WHITE] 'CRITICAL' risk processor vulnerabilities - Meltd This advisory is under constant revision, links to detailed public information4 KB (609 words) - 13:03, 2 February 2018
- Title: EGI SVG Advisory [TLP:WHITE] 'LOW' risk - XROOTD potential for remote code execution [EGI-S URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-127283 KB (464 words) - 16:03, 22 August 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk Xen vulnerability CVE-2016-9379, URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-93793 KB (452 words) - 16:16, 6 December 2016
- Title: EGI SVG Advisory [TLP:WHITE] Up to 'High' risk - Singularity container escape vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-123814 KB (509 words) - 14:24, 23 February 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] MODERATE risk - Disk Pool Manager (DPM) logging may contain se URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-168354 KB (580 words) - 16:36, 7 September 2020
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-10021053 KB (481 words) - 12:52, 6 December 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE ] LOW risk vulnerability in dCache xrootd protocol implementati URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2019-160224 KB (569 words) - 13:37, 9 December 2019
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] CRITICAL risk DPM vulnerability allowing file delet When the advisory was sent to sites, it additionally referred to RedHat 6 and its derivatives4 KB (645 words) - 16:05, 23 March 2021
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk vulnerability in Singularity 2.3.2 This advisory will be placed on the wiki on or after 2018-03-194 KB (558 words) - 16:19, 19 March 2018
- EGI SVG ADVISORY [EGI-SVG-2015-8464] Title: EGI SVG Advisory 'Low' RISK Buffer overflow vulnerability in XRootD client [EGI-SVG-2015-8462 KB (259 words) - 11:18, 13 May 2015
- Title: EGI SVG Advisory [TLP:WHITE] Moderate risk - OpenStack sites VM Management permissions - che ...ing OpenStack have been found to use the default configuration where every group3 KB (429 words) - 15:58, 28 April 2016
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-172475 KB (732 words) - 10:49, 3 June 2021
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] HIGH risk - Squid Vulnerability [EGI-SVG-2021-1724 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2021-172475 KB (732 words) - 10:51, 3 June 2021
- Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk SLURM vulnerability CVE-2016-10030 [EGI-SVG-CVE-201 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-100303 KB (474 words) - 11:09, 11 January 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'High' Risk Arbitrary file overwrite vulnerability in WebAppDIR URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-110332 KB (338 words) - 10:42, 8 June 2016
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] 'CRITICAL' risk runc malicious container escape aff From the Red Hat advisory: This vulnerability is mitigated by the use of SELinux in targeted enforcin5 KB (675 words) - 15:05, 1 March 2019
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity - file overwrite vulnerability [EGI-SVG-CVE-2020-1 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2020-152294 KB (596 words) - 12:36, 21 October 2020
- ...<ticket No> concerning <title of issue> to the EGI Software Vulnerability Group. ...d you are the first to report this to us your name will be included in the advisory,6 KB (1,002 words) - 19:57, 27 August 2019
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk Linux Kernel release fixing various software vulnera Additionally, this Advisory acts as an 'UPDATE' to the advisory sent on 6th January 2021 concerning this5 KB (743 words) - 13:31, 6 April 2021
- Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk - sudo local root vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-10003673 KB (503 words) - 15:35, 6 June 2017
- == Software Vulnerability Group (SVG) view and responsibilities concerning issue handling == Issues will be handled according to the OMB approved Software Vulnerability Group issue handling2 KB (313 words) - 10:40, 29 April 2016
- Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' risk vulnerability - VOMS server certificate chain/u URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-114954 KB (532 words) - 16:19, 24 November 2016
- EGI SVG ADVISORY [EGI-SVG-2015-8056] Title: EGI SVG Advisory 'High' RISK - CVE-2015-1195 OpenStack for [EGI-SVG-2015-8056]2 KB (334 words) - 17:02, 11 February 2015
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk use-after-free privilege The EGI Software Vulnerability Group considers this vulnerability 'HIGH' risk if5 KB (668 words) - 18:30, 12 October 2021
- Title: EGI SVG Advisory [TLP:WHITE] VOMS Admin privilege escalation vulnerability [EGI-SVG-2017-132 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-132494 KB (518 words) - 15:54, 5 March 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk vulnerability in dCache macaroon bearer token validat URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-168064 KB (640 words) - 15:40, 17 August 2020
- Title: EGI SVG Advisory [TLP:WHITE] up to 'HIGH' risk Qemu and Xen guest escape issues CVE-2016-960 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-96034 KB (576 words) - 14:35, 1 June 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] LOW risk CREAM command injection attack [EGI-SVG-2018-14321] As this is old and 'LOW' risk this advisory is being placed on the Wiki for completeness, without4 KB (610 words) - 15:57, 27 November 2019
- Title: EGI SVG Advisory/Alert [TLP:WHITE] Attacks on Hadoop installations URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-129313 KB (491 words) - 15:42, 13 February 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'HIGH' risk - MySQL server compromise [EGI-SVG-CVE-2018- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-25624 KB (541 words) - 16:49, 23 October 2018
- Title: EGI SVG Advisory [TLP:WHITE] 'LOW' risk Remote authenticated DoS on CREAM-CE URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-124334 KB (527 words) - 11:53, 14 December 2018
- Title: EGI SVG Advisory [TLP:WHITE] OpenStack Nova Metadata leak URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-122313 KB (519 words) - 16:08, 11 January 2017
- EGI SVG ADVISORY [EGI-SVG-2014-7159] Title: EGI SVG Advisory 'Low' RISK - VOMs Potential DoS [EGI-SVG-2014-7159]3 KB (408 words) - 10:26, 18 August 2015
- Title: EGI SVG 'ADVISORY' [TLP:AMBER] **UPDATE** CRITICAL risk - Updated: 2018-07-09 , 2018-09-20 (advisory placed on wiki)5 KB (677 words) - 10:01, 23 July 2018
- <Most cases 'ADVISORY' > < ‘ADVISORY’ – Sites normally instructed to do something10 KB (1,455 words) - 12:33, 24 February 2021
- Title: EGI SVG ADVISORY [TLP:WHITE] CRITICAL risk vulnerability concerning SLURM URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-155664 KB (541 words) - 16:02, 2 November 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'High' risk - Linux kernel's IPv6 implementation - mishandled s URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2016-38413 KB (505 words) - 12:00, 20 December 2016
- EGI SVG ADVISORY [EGI-SVG-2014-7191] Title: EGI SVG Advisory "High" Risk CVE-2014-5261, CVE-2014-52624 KB (535 words) - 15:50, 14 January 2015
- Title: EGI SVG ADVISORY [TLP:WHITE] 'CRITICAL' risk vulnerability concerning VOMS Admin An advisory will be placed on the wiki after sites have had at least 2 weeks to upgrade5 KB (666 words) - 15:39, 4 July 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk linux kernel privilege escalation vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-26364 KB (611 words) - 12:19, 27 April 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk Sequoia Privilege escalation in See the Qualys Security Advisory [R 5] for further details.5 KB (696 words) - 12:44, 6 October 2021
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk glibc vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-10000015 KB (663 words) - 14:05, 24 May 2018
- EGI SVG ADVISORY [EGI-SVG-2014-7553] Title: EGI SVG Advisory 'High' Risk - Dirac SQL injection vulnerability [EGI-SVG-2014-7553]2 KB (294 words) - 14:41, 13 August 2015
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk. Microarchitectural Store Buffer Data vulnerability URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-121265 KB (660 words) - 16:34, 16 May 2019
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Up to 'CRITICAL' risk systemd-journald vulnerabilities Updated: 2019-01-15 Updates available therefore Advisory issued.4 KB (620 words) - 14:44, 14 May 2019
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] CRITICAL risk Vulnerability concerning dCache [EGI- The other merely allows a user in some circumstances to change the group ownership of a file or directory they are authorized5 KB (747 words) - 17:13, 14 January 2021
- Title: EGI-SVG Advisory [TLP:WHITE] 'HEADS-UP' on the escalation of privilege vulnerability in Inte5 KB (681 words) - 10:55, 17 May 2017
- Title: EGI SVG ADVISORY [TLP:WHITE] 'HIGH' risk Linux kernel local root vulnerability CVE-2017-1000 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-10002534 KB (627 words) - 14:13, 28 September 2017
- Title: EGI SVG Advisory [TLP:WHITE] 'HIGH' risk NSS out of bounds write flaw URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-54614 KB (555 words) - 15:18, 6 June 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk L1TF - Speculative Execution Side Channel Intel has issued an advisory INTEL-SA-00161 [R 1], concerning Speculative Execution side channel5 KB (746 words) - 10:57, 4 September 2018
- **NOTE** This is a separate issue from our "ADVISORY HIGH risk vulnerability in Singularity 2.3.2 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-139994 KB (633 words) - 16:10, 19 March 2018
- Title: EGI SVG 'ADVISORY' [TLP:AMBER] HIGH risk VOMS-Admin vulnerability [EGI-SVG-2020-17010] This advisory will be placed on the wiki on or after 2021-06-225 KB (726 words) - 14:12, 22 June 2021
- EGI SVG ADVISORY [EGI-SVG-2012-3765] Title: EGI SVG Advisory 'Low' RISK - Gridftp CVE-2012032923 KB (378 words) - 11:05, 20 December 2012
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk polkit vulnerability - RHEL/CentOS 8 and derivat URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-35604 KB (553 words) - 17:26, 30 June 2021
- Title: EGI SVG 'ADVISORY’ [TLP:WHITE] ‘CRITICAL’ risk. Local privilege escalation using URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2018-143114 KB (538 words) - 16:21, 21 May 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] (up to critical) vulnerabilities concerning Squid [EGI-SVG-202 This advisory will be placed on the wiki on or after 2020-02-256 KB (821 words) - 17:19, 29 April 2020
- Title: EGI SVG Advisory [TLP:WHITE] 'Moderate' Risk: XSS in DIRAC Webapp and Web portal [EGI-SVG-20 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2016-111072 KB (325 words) - 10:56, 21 October 2016
- Title: EGI SVG Advisory 'HIGH' risk canl-c impersonation vulnerability [EGI-SVG-2017-12276] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2017-122764 KB (635 words) - 16:12, 1 June 2017
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk vulnerability in Singularity on CentOS/EL7 CVE-2 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-192955 KB (689 words) - 13:30, 3 January 2019
- EGI SVG ADVISORY [EGI-SVG-Xen-CVE-2015-7835] Title: EGI SVG Advisory 'Critical' Risk 'Breakout' vulnerability for sites running3 KB (468 words) - 16:02, 3 November 2015
- Title: **UPDATE - re-introduction** EGI SVG Advisory [TLP:WHITE] "Moderate" RISK - dCache [EGI-SVG-2015-9323] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2015-93234 KB (515 words) - 15:53, 22 August 2017
- == Operations Tools Advisory Group - OTAG == == Policy Group ==7 KB (1,043 words) - 15:31, 19 December 2012
- Title: EGI SVG Advisory [TLP:WHITE] 'Low' Risk - Panda Pilot factory payload verification URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2014-74302 KB (321 words) - 15:12, 25 May 2016
- EGI SVG ADVISORY [EGI-SVG-2011-342] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-3422 KB (270 words) - 15:32, 28 July 2011
- ...ware of any impacted site. Hence we are sending an 'ALERT' rather than an advisory. URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-146493 KB (481 words) - 16:28, 3 October 2018
- Title: EGI SVG 'ADVISORY' **UPDATE** [TLP:WHITE] 'HIGH' risk - 2 HTCondor Security Vulnerabilities [ ...03 [R 1] was NOT fully resolved in the previous release referred to in the advisory on 2021-07-29,6 KB (885 words) - 18:11, 7 September 2021
- URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-12611 the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 3]3 KB (492 words) - 18:38, 8 February 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'CRITICAL' risk vulnerability - URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-11114 KB (587 words) - 15:11, 16 May 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] 'HIGH' risk Kernel Side-Channel Attack using Speculative Store URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-36395 KB (660 words) - 11:31, 24 May 2018
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] CRITICAL risk Local Privilege Escalation via iSCSI URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2021-273655 KB (813 words) - 17:35, 1 June 2021
- In addition, CVE-2017-5689 (INTEL-SA-00075) about which SVG issued an advisory [R 4] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2017-57124 KB (569 words) - 12:02, 7 December 2017
- EGI SVG ADVISORY [EGI-SVG-2013-5268] Title: EGI SVG Advisory 'High' RISK - CREAM BUpdater improperly validated input / arbitrary command3 KB (393 words) - 12:32, 14 June 2013
- EGI CSIRT ADVISORY [EGI-ADV-20130322] EGI SVG ADVISORY [EGI-SVG-2013-5244]4 KB (595 words) - 14:51, 29 April 2013
- EGI CSIRT ADVISORY [EGI-ADV-20150330] Title: EGI Advisory 'CRITICAL' RISK CVE-2015-1815 RedHat setroubleshoot [EGI-ADV-20150330]2 KB (279 words) - 15:22, 30 March 2015
- EGI SVG ADVISORY [EGI-SVG-2014-7472] Title: EGI SVG Advisory 'High' RISK - Users have possibility of introducing rogue VMs -3 KB (473 words) - 11:24, 12 November 2014
- Title: EGI SVG Advisory [TLP:WHITE] 'Low' Risk - Dirac Pilot factory payload verification URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2014-74403 KB (376 words) - 15:13, 25 May 2016
- EGI SVG ADVISORY [EGI-SVG-2011-1414] URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2011-14144 KB (631 words) - 18:00, 15 November 2011
- Title: EGI SVG 'ADVISORY' [TLP:WHITE] Singularity and unprivileged user namespaces [EGI-SVG-2020-16 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2020-166486 KB (902 words) - 12:05, 12 May 2020
- Title: EGI SVG Advisory [TLP:White] 'Low' risk STORM WebDAV interface XXE vulnerability [EGI-SVG-20 URL: https://wiki.egi.eu/wiki/SVG:Advisory-SVG-2015-101343 KB (423 words) - 15:54, 20 June 2016