cvelist/2016/3xxx/CVE-2016-3092.json

302 lines
12 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2020-04-16 19:01:56 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2016-3092",
"STATE": "PUBLIC"
2019-03-18 04:15:41 +00:00
},
2020-04-16 19:01:56 +00:00
"affects": {
"vendor": {
"vendor_data": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"product": {
"product_data": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"product_name": "n/a",
"version": {
"version_data": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"version_value": "n/a"
2019-03-18 04:15:41 +00:00
}
]
}
}
]
},
2020-04-16 19:01:56 +00:00
"vendor_name": "n/a"
2019-03-18 04:15:41 +00:00
}
2018-07-18 09:04:41 -04:00
]
2019-03-18 04:15:41 +00:00
}
},
2020-04-16 19:01:56 +00:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string."
2019-03-18 04:15:41 +00:00
}
]
},
2020-04-16 19:01:56 +00:00
"problemtype": {
"problemtype_data": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"description": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"lang": "eng",
"value": "n/a"
2019-03-18 04:15:41 +00:00
}
]
}
]
},
2020-04-16 19:01:56 +00:00
"references": {
"reference_data": [
2019-03-18 04:15:41 +00:00
{
2020-04-16 19:01:56 +00:00
"name": "JVNDB-2016-000121",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "https://security.netapp.com/advisory/ntap-20190212-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190212-0001/"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743480",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743480"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "GLSA-201705-09",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201705-09"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743738",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743738"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://tomcat.apache.org/security-9.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-9.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "USN-3024-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3024-1"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2069",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2069.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "1037029",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037029"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2068",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2068.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://tomcat.apache.org/security-7.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-7.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "1036900",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036900"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "91453",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/91453"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://tomcat.apache.org/security-8.html",
"refsource": "CONFIRM",
"url": "http://tomcat.apache.org/security-8.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2072",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2072.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743722",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743722"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "DSA-3611",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3611"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2807",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2807.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "openSUSE-SU-2016:2252",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "JVN#89379547",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN89379547/index.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "1036427",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036427"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2070",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2070.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2017:0457",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2808",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2808.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "1039606",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039606"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://svn.apache.org/viewvc?view=revision&revision=1743742",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?view=revision&revision=1743742"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2599",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2599.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "DSA-3609",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3609"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2017:0455",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0455"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "DSA-3614",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3614"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "[dev] 20160621 CVE-2016-3092: Apache Commons Fileupload information disclosure vulnerability",
"refsource": "MLIST",
"url": "http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2017:0456",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0456"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349468"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "RHSA-2016:2071",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2071.html"
2019-03-18 04:15:41 +00:00
},
{
2020-04-16 19:01:56 +00:00
"name": "USN-3027-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3027-1"
2019-03-19 15:00:47 +00:00
},
{
2020-04-16 19:01:56 +00:00
"refsource": "MLIST",
"name": "[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
"url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E"
2019-03-25 11:00:46 +00:00
},
{
2020-04-16 19:01:56 +00:00
"refsource": "MLIST",
"name": "[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
"url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E"
Bill Situ <Bill.Situ@oracle.com> This update includes 3rd party CVEs released in Oracle Critical Patch Update 2019 April. On branch cna/Oracle/CPU2019Apr_3rd Changes to be committed: modified: 2014/0xxx/CVE-2014-0107.json modified: 2014/0xxx/CVE-2014-0114.json modified: 2014/7xxx/CVE-2014-7923.json modified: 2014/7xxx/CVE-2014-7926.json modified: 2014/7xxx/CVE-2014-7940.json modified: 2014/8xxx/CVE-2014-8146.json modified: 2014/8xxx/CVE-2014-8147.json modified: 2014/9xxx/CVE-2014-9654.json modified: 2014/9xxx/CVE-2014-9911.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/3xxx/CVE-2015-3253.json modified: 2015/5xxx/CVE-2015-5922.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/2xxx/CVE-2016-2141.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/6xxx/CVE-2016-6293.json modified: 2016/7xxx/CVE-2016-7055.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/7xxx/CVE-2016-7415.json modified: 2016/8xxx/CVE-2016-8735.json modified: 2017/0xxx/CVE-2017-0861.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/14xxx/CVE-2017-14952.json modified: 2017/15xxx/CVE-2017-15265.json modified: 2017/17xxx/CVE-2017-17484.json modified: 2017/3xxx/CVE-2017-3730.json modified: 2017/3xxx/CVE-2017-3731.json modified: 2017/3xxx/CVE-2017-3732.json modified: 2017/3xxx/CVE-2017-3733.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5533.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5753.json modified: 2017/5xxx/CVE-2017-5754.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7867.json modified: 2017/7xxx/CVE-2017-7868.json modified: 2017/8xxx/CVE-2017-8105.json modified: 2017/8xxx/CVE-2017-8287.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/0xxx/CVE-2018-0161.json modified: 2018/0xxx/CVE-2018-0495.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0733.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0735.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/1000xxx/CVE-2018-1000004.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/10xxx/CVE-2018-10901.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11218.json modified: 2018/11xxx/CVE-2018-11219.json modified: 2018/11xxx/CVE-2018-11236.json modified: 2018/11xxx/CVE-2018-11237.json modified: 2018/11xxx/CVE-2018-11761.json modified: 2018/11xxx/CVE-2018-11763.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12539.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/16xxx/CVE-2018-16864.json modified: 2018/16xxx/CVE-2018-16865.json modified: 2018/16xxx/CVE-2018-16890.json modified: 2018/17xxx/CVE-2018-17189.json modified: 2018/17xxx/CVE-2018-17199.json modified: 2018/19xxx/CVE-2018-19360.json modified: 2018/19xxx/CVE-2018-19361.json modified: 2018/19xxx/CVE-2018-19362.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1304.json modified: 2018/1xxx/CVE-2018-1305.json modified: 2018/1xxx/CVE-2018-1656.json modified: 2018/20xxx/CVE-2018-20685.json modified: 2018/3xxx/CVE-2018-3620.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/6xxx/CVE-2018-6485.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/7xxx/CVE-2018-7566.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8034.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0190.json modified: 2019/1xxx/CVE-2019-1559.json modified: 2019/3xxx/CVE-2019-3772.json modified: 2019/3xxx/CVE-2019-3822.json modified: 2019/3xxx/CVE-2019-3823.json
2019-04-23 04:53:58 -07:00
},
{
2020-04-16 19:01:56 +00:00
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
2020-02-13 17:01:10 +00:00
},
{
2020-04-16 19:01:56 +00:00
"refsource": "MLIST",
"name": "[tomcat-dev] 20200213 svn commit: r1873980 [27/34] - /tomcat/site/trunk/docs/",
"url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2020Apr3rdparty Changes to be committed: modified: 2015/0xxx/CVE-2015-0254.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/3xxx/CVE-2015-3253.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/10xxx/CVE-2016-10244.json modified: 2016/10xxx/CVE-2016-10251.json modified: 2016/10xxx/CVE-2016-10328.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2381.json modified: 2016/3xxx/CVE-2016-3092.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/4xxx/CVE-2016-4463.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6489.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/13xxx/CVE-2017-13745.json modified: 2017/14xxx/CVE-2017-14232.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/15xxx/CVE-2017-15706.json modified: 2017/3xxx/CVE-2017-3160.json modified: 2017/5xxx/CVE-2017-5130.json modified: 2017/5xxx/CVE-2017-5529.json modified: 2017/5xxx/CVE-2017-5533.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5754.json modified: 2017/7xxx/CVE-2017-7857.json modified: 2017/7xxx/CVE-2017-7858.json modified: 2017/7xxx/CVE-2017-7864.json modified: 2017/8xxx/CVE-2017-8105.json modified: 2017/8xxx/CVE-2017-8287.json modified: 2018/0xxx/CVE-2018-0732.json modified: 2018/0xxx/CVE-2018-0734.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11307.json modified: 2018/11xxx/CVE-2018-11775.json modified: 2018/11xxx/CVE-2018-11784.json modified: 2018/11xxx/CVE-2018-11797.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/14xxx/CVE-2018-14719.json modified: 2018/14xxx/CVE-2018-14720.json modified: 2018/14xxx/CVE-2018-14721.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17197.json modified: 2018/18xxx/CVE-2018-18227.json modified: 2018/18xxx/CVE-2018-18311.json modified: 2018/18xxx/CVE-2018-18873.json modified: 2018/19xxx/CVE-2018-19139.json modified: 2018/19xxx/CVE-2018-19360.json modified: 2018/19xxx/CVE-2018-19361.json modified: 2018/19xxx/CVE-2018-19362.json modified: 2018/19xxx/CVE-2018-19539.json modified: 2018/19xxx/CVE-2018-19540.json modified: 2018/19xxx/CVE-2018-19541.json modified: 2018/19xxx/CVE-2018-19542.json modified: 2018/19xxx/CVE-2018-19543.json modified: 2018/19xxx/CVE-2018-19622.json modified: 2018/19xxx/CVE-2018-19623.json modified: 2018/19xxx/CVE-2018-19624.json modified: 2018/19xxx/CVE-2018-19625.json modified: 2018/19xxx/CVE-2018-19626.json modified: 2018/19xxx/CVE-2018-19627.json modified: 2018/19xxx/CVE-2018-19628.json modified: 2018/1xxx/CVE-2018-1165.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1304.json modified: 2018/1xxx/CVE-2018-1305.json modified: 2018/1xxx/CVE-2018-1320.json modified: 2018/1xxx/CVE-2018-1336.json modified: 2018/20xxx/CVE-2018-20346.json modified: 2018/20xxx/CVE-2018-20506.json modified: 2018/20xxx/CVE-2018-20570.json modified: 2018/20xxx/CVE-2018-20584.json modified: 2018/20xxx/CVE-2018-20622.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/20xxx/CVE-2018-20852.json modified: 2018/5xxx/CVE-2018-5407.json modified: 2018/5xxx/CVE-2018-5711.json modified: 2018/5xxx/CVE-2018-5712.json modified: 2018/6xxx/CVE-2018-6942.json modified: 2018/8xxx/CVE-2018-8014.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8034.json modified: 2018/8xxx/CVE-2018-8036.json modified: 2018/8xxx/CVE-2018-8037.json modified: 2018/8xxx/CVE-2018-8039.json modified: 2018/9xxx/CVE-2018-9055.json modified: 2018/9xxx/CVE-2018-9154.json modified: 2018/9xxx/CVE-2018-9252.json modified: 2019/0xxx/CVE-2019-0196.json modified: 2019/0xxx/CVE-2019-0197.json modified: 2019/0xxx/CVE-2019-0199.json modified: 2019/0xxx/CVE-2019-0211.json modified: 2019/0xxx/CVE-2019-0215.json modified: 2019/0xxx/CVE-2019-0217.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0221.json modified: 2019/0xxx/CVE-2019-0222.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0228.json modified: 2019/0xxx/CVE-2019-0232.json modified: 2019/1010xxx/CVE-2019-1010238.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10088.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10093.json modified: 2019/10xxx/CVE-2019-10094.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10098.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12387.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12406.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12418.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12855.json modified: 2019/13xxx/CVE-2019-13057.json modified: 2019/13xxx/CVE-2019-13565.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14821.json modified: 2019/14xxx/CVE-2019-14889.json modified: 2019/15xxx/CVE-2019-15161.json modified: 2019/15xxx/CVE-2019-15162.json modified: 2019/15xxx/CVE-2019-15163.json modified: 2019/15xxx/CVE-2019-15164.json modified: 2019/15xxx/CVE-2019-15165.json modified: 2019/15xxx/CVE-2019-15601.json modified: 2019/15xxx/CVE-2019-15604.json modified: 2019/15xxx/CVE-2019-15605.json modified: 2019/15xxx/CVE-2019-15606.json modified: 2019/15xxx/CVE-2019-15903.json modified: 2019/16xxx/CVE-2019-16056.json modified: 2019/16xxx/CVE-2019-16168.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/18xxx/CVE-2019-18197.json modified: 2019/19xxx/CVE-2019-19242.json modified: 2019/19xxx/CVE-2019-19244.json modified: 2019/19xxx/CVE-2019-19269.json modified: 2019/19xxx/CVE-2019-19317.json modified: 2019/19xxx/CVE-2019-19553.json modified: 2019/19xxx/CVE-2019-19603.json modified: 2019/19xxx/CVE-2019-19645.json modified: 2019/19xxx/CVE-2019-19646.json modified: 2019/19xxx/CVE-2019-19880.json modified: 2019/19xxx/CVE-2019-19923.json modified: 2019/19xxx/CVE-2019-19924.json modified: 2019/19xxx/CVE-2019-19925.json modified: 2019/19xxx/CVE-2019-19926.json modified: 2019/19xxx/CVE-2019-19959.json modified: 2019/1xxx/CVE-2019-1543.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20218.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/5xxx/CVE-2019-5481.json modified: 2019/5xxx/CVE-2019-5482.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2019/9xxx/CVE-2019-9517.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/7xxx/CVE-2020-7044.json modified: 2020/8xxx/CVE-2020-8840.json
2020-04-14 14:04:09 -07:00
},
{
2020-04-16 19:01:56 +00:00
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
2021-07-17 08:01:03 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202107-39",
"url": "https://security.gentoo.org/glsa/202107-39"
2019-03-18 04:15:41 +00:00
}
]
}
}