From 1bb7592b5174b1d18383787dc28777309c227379 Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Tue, 14 Jul 2020 13:55:31 -0700 Subject: [PATCH] Bill Situ On branch cna/Oracle/CPU2020Jul3rdParty Changes to be committed: modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/8xxx/CVE-2015-8607.json modified: 2015/8xxx/CVE-2015-8608.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/1xxx/CVE-2016-1923.json modified: 2016/1xxx/CVE-2016-1924.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2381.json modified: 2016/3xxx/CVE-2016-3183.json modified: 2016/4xxx/CVE-2016-4000.json modified: 2016/4xxx/CVE-2016-4796.json modified: 2016/4xxx/CVE-2016-4797.json modified: 2016/5xxx/CVE-2016-5017.json modified: 2016/5xxx/CVE-2016-5019.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6814.json modified: 2016/8xxx/CVE-2016-8332.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2016/9xxx/CVE-2016-9112.json modified: 2016/9xxx/CVE-2016-9840.json modified: 2016/9xxx/CVE-2016-9841.json modified: 2016/9xxx/CVE-2016-9842.json modified: 2016/9xxx/CVE-2016-9843.json modified: 2017/0xxx/CVE-2017-0861.json modified: 2017/12xxx/CVE-2017-12610.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/12xxx/CVE-2017-12814.json modified: 2017/12xxx/CVE-2017-12837.json modified: 2017/12xxx/CVE-2017-12883.json modified: 2017/15xxx/CVE-2017-15265.json modified: 2017/15xxx/CVE-2017-15708.json modified: 2017/5xxx/CVE-2017-5637.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2018/1000xxx/CVE-2018-1000004.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/10xxx/CVE-2018-10237.json modified: 2018/10xxx/CVE-2018-10675.json modified: 2018/10xxx/CVE-2018-10872.json modified: 2018/10xxx/CVE-2018-10901.json modified: 2018/11xxx/CVE-2018-11039.json modified: 2018/11xxx/CVE-2018-11040.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11776.json modified: 2018/12xxx/CVE-2018-12015.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12207.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17190.json modified: 2018/17xxx/CVE-2018-17196.json modified: 2018/18xxx/CVE-2018-18311.json modified: 2018/18xxx/CVE-2018-18312.json modified: 2018/18xxx/CVE-2018-18313.json modified: 2018/18xxx/CVE-2018-18314.json modified: 2018/1xxx/CVE-2018-1199.json modified: 2018/1xxx/CVE-2018-1257.json modified: 2018/1xxx/CVE-2018-1258.json modified: 2018/1xxx/CVE-2018-1270.json modified: 2018/1xxx/CVE-2018-1271.json modified: 2018/1xxx/CVE-2018-1272.json modified: 2018/1xxx/CVE-2018-1275.json modified: 2018/1xxx/CVE-2018-1288.json modified: 2018/3xxx/CVE-2018-3620.json modified: 2018/3xxx/CVE-2018-3639.json modified: 2018/3xxx/CVE-2018-3646.json modified: 2018/3xxx/CVE-2018-3665.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5390.json modified: 2018/6xxx/CVE-2018-6616.json modified: 2018/6xxx/CVE-2018-6797.json modified: 2018/6xxx/CVE-2018-6798.json modified: 2018/6xxx/CVE-2018-6913.json modified: 2018/7xxx/CVE-2018-7566.json modified: 2018/8xxx/CVE-2018-8012.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0188.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/0xxx/CVE-2019-0220.json modified: 2019/0xxx/CVE-2019-0222.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/10xxx/CVE-2019-10081.json modified: 2019/10xxx/CVE-2019-10082.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10092.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10192.json modified: 2019/10xxx/CVE-2019-10193.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/12xxx/CVE-2019-12973.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14439.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14862.json modified: 2019/14xxx/CVE-2019-14893.json modified: 2019/16xxx/CVE-2019-16056.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16935.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17267.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17560.json modified: 2019/17xxx/CVE-2019-17561.json modified: 2019/17xxx/CVE-2019-17563.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/17xxx/CVE-2019-17573.json modified: 2019/19xxx/CVE-2019-19956.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1551.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/20xxx/CVE-2019-20388.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5489.json modified: 2019/8xxx/CVE-2019-8457.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/13xxx/CVE-2020-13434.json modified: 2020/13xxx/CVE-2020-13435.json modified: 2020/13xxx/CVE-2020-13630.json modified: 2020/13xxx/CVE-2020-13631.json modified: 2020/13xxx/CVE-2020-13632.json modified: 2020/1xxx/CVE-2020-1927.json modified: 2020/1xxx/CVE-2020-1934.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1950.json modified: 2020/1xxx/CVE-2020-1951.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/5xxx/CVE-2020-5258.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/6xxx/CVE-2020-6851.json modified: 2020/7xxx/CVE-2020-7059.json modified: 2020/7xxx/CVE-2020-7060.json modified: 2020/7xxx/CVE-2020-7595.json modified: 2020/8xxx/CVE-2020-8112.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json --- 2015/7xxx/CVE-2015-7501.json | 3 +++ 2015/8xxx/CVE-2015-8607.json | 3 +++ 2015/8xxx/CVE-2015-8608.json | 3 +++ 2015/9xxx/CVE-2015-9251.json | 3 +++ 2016/0xxx/CVE-2016-0701.json | 3 +++ 2016/1000xxx/CVE-2016-1000031.json | 3 +++ 2016/1xxx/CVE-2016-1181.json | 3 +++ 2016/1xxx/CVE-2016-1182.json | 3 +++ 2016/1xxx/CVE-2016-1923.json | 3 +++ 2016/1xxx/CVE-2016-1924.json | 3 +++ 2016/2xxx/CVE-2016-2183.json | 3 +++ 2016/2xxx/CVE-2016-2381.json | 3 +++ 2016/3xxx/CVE-2016-3183.json | 3 +++ 2016/4xxx/CVE-2016-4000.json | 3 +++ 2016/4xxx/CVE-2016-4796.json | 3 +++ 2016/4xxx/CVE-2016-4797.json | 3 +++ 2016/5xxx/CVE-2016-5017.json | 3 +++ 2016/5xxx/CVE-2016-5019.json | 3 +++ 2016/6xxx/CVE-2016-6306.json | 3 +++ 2016/6xxx/CVE-2016-6814.json | 3 +++ 2016/8xxx/CVE-2016-8332.json | 3 +++ 2016/8xxx/CVE-2016-8610.json | 3 +++ 2016/9xxx/CVE-2016-9112.json | 3 +++ 2016/9xxx/CVE-2016-9840.json | 3 +++ 2016/9xxx/CVE-2016-9841.json | 3 +++ 2016/9xxx/CVE-2016-9842.json | 3 +++ 2016/9xxx/CVE-2016-9843.json | 3 +++ 2017/0xxx/CVE-2017-0861.json | 3 +++ 2017/12xxx/CVE-2017-12610.json | 3 +++ 2017/12xxx/CVE-2017-12626.json | 3 +++ 2017/12xxx/CVE-2017-12814.json | 3 +++ 2017/12xxx/CVE-2017-12837.json | 3 +++ 2017/12xxx/CVE-2017-12883.json | 3 +++ 2017/15xxx/CVE-2017-15265.json | 3 +++ 2017/15xxx/CVE-2017-15708.json | 3 +++ 2017/5xxx/CVE-2017-5637.json | 3 +++ 2017/5xxx/CVE-2017-5645.json | 3 +++ 2018/1000xxx/CVE-2018-1000004.json | 3 +++ 2018/1000xxx/CVE-2018-1000632.json | 3 +++ 2018/10xxx/CVE-2018-10237.json | 3 +++ 2018/10xxx/CVE-2018-10675.json | 3 +++ 2018/10xxx/CVE-2018-10872.json | 3 +++ 2018/10xxx/CVE-2018-10901.json | 3 +++ 2018/11xxx/CVE-2018-11039.json | 3 +++ 2018/11xxx/CVE-2018-11040.json | 3 +++ 2018/11xxx/CVE-2018-11054.json | 3 +++ 2018/11xxx/CVE-2018-11055.json | 3 +++ 2018/11xxx/CVE-2018-11056.json | 3 +++ 2018/11xxx/CVE-2018-11057.json | 3 +++ 2018/11xxx/CVE-2018-11058.json | 3 +++ 2018/11xxx/CVE-2018-11776.json | 3 +++ 2018/12xxx/CVE-2018-12015.json | 3 +++ 2018/12xxx/CVE-2018-12023.json | 3 +++ 2018/12xxx/CVE-2018-12207.json | 3 +++ 2018/15xxx/CVE-2018-15756.json | 3 +++ 2018/15xxx/CVE-2018-15769.json | 3 +++ 2018/17xxx/CVE-2018-17190.json | 3 +++ 2018/17xxx/CVE-2018-17196.json | 3 +++ 2018/18xxx/CVE-2018-18311.json | 3 +++ 2018/18xxx/CVE-2018-18312.json | 3 +++ 2018/18xxx/CVE-2018-18313.json | 3 +++ 2018/18xxx/CVE-2018-18314.json | 3 +++ 2018/1xxx/CVE-2018-1199.json | 3 +++ 2018/1xxx/CVE-2018-1257.json | 3 +++ 2018/1xxx/CVE-2018-1258.json | 3 +++ 2018/1xxx/CVE-2018-1270.json | 3 +++ 2018/1xxx/CVE-2018-1271.json | 3 +++ 2018/1xxx/CVE-2018-1272.json | 3 +++ 2018/1xxx/CVE-2018-1275.json | 3 +++ 2018/1xxx/CVE-2018-1288.json | 3 +++ 2018/3xxx/CVE-2018-3620.json | 3 +++ 2018/3xxx/CVE-2018-3639.json | 3 +++ 2018/3xxx/CVE-2018-3646.json | 3 +++ 2018/3xxx/CVE-2018-3665.json | 3 +++ 2018/3xxx/CVE-2018-3693.json | 3 +++ 2018/5xxx/CVE-2018-5390.json | 3 +++ 2018/6xxx/CVE-2018-6616.json | 3 +++ 2018/6xxx/CVE-2018-6797.json | 3 +++ 2018/6xxx/CVE-2018-6798.json | 3 +++ 2018/6xxx/CVE-2018-6913.json | 3 +++ 2018/7xxx/CVE-2018-7566.json | 3 +++ 2018/8xxx/CVE-2018-8012.json | 3 +++ 2018/8xxx/CVE-2018-8013.json | 3 +++ 2018/8xxx/CVE-2018-8032.json | 3 +++ 2018/8xxx/CVE-2018-8088.json | 3 +++ 2019/0xxx/CVE-2019-0188.json | 3 +++ 2019/0xxx/CVE-2019-0201.json | 3 +++ 2019/0xxx/CVE-2019-0220.json | 3 +++ 2019/0xxx/CVE-2019-0222.json | 3 +++ 2019/0xxx/CVE-2019-0227.json | 3 +++ 2019/10xxx/CVE-2019-10081.json | 3 +++ 2019/10xxx/CVE-2019-10082.json | 3 +++ 2019/10xxx/CVE-2019-10086.json | 3 +++ 2019/10xxx/CVE-2019-10092.json | 3 +++ 2019/10xxx/CVE-2019-10097.json | 3 +++ 2019/10xxx/CVE-2019-10192.json | 3 +++ 2019/10xxx/CVE-2019-10193.json | 3 +++ 2019/10xxx/CVE-2019-10246.json | 3 +++ 2019/10xxx/CVE-2019-10247.json | 3 +++ 2019/11xxx/CVE-2019-11358.json | 3 +++ 2019/12xxx/CVE-2019-12086.json | 3 +++ 2019/12xxx/CVE-2019-12384.json | 3 +++ 2019/12xxx/CVE-2019-12402.json | 3 +++ 2019/12xxx/CVE-2019-12415.json | 3 +++ 2019/12xxx/CVE-2019-12423.json | 3 +++ 2019/12xxx/CVE-2019-12814.json | 3 +++ 2019/12xxx/CVE-2019-12973.json | 3 +++ 2019/13xxx/CVE-2019-13990.json | 3 +++ 2019/14xxx/CVE-2019-14379.json | 3 +++ 2019/14xxx/CVE-2019-14439.json | 3 +++ 2019/14xxx/CVE-2019-14540.json | 3 +++ 2019/14xxx/CVE-2019-14862.json | 3 +++ 2019/14xxx/CVE-2019-14893.json | 3 +++ 2019/16xxx/CVE-2019-16056.json | 3 +++ 2019/16xxx/CVE-2019-16335.json | 3 +++ 2019/16xxx/CVE-2019-16935.json | 3 +++ 2019/16xxx/CVE-2019-16942.json | 3 +++ 2019/16xxx/CVE-2019-16943.json | 3 +++ 2019/17xxx/CVE-2019-17091.json | 3 +++ 2019/17xxx/CVE-2019-17267.json | 3 +++ 2019/17xxx/CVE-2019-17359.json | 3 +++ 2019/17xxx/CVE-2019-17531.json | 3 +++ 2019/17xxx/CVE-2019-17560.json | 3 +++ 2019/17xxx/CVE-2019-17561.json | 3 +++ 2019/17xxx/CVE-2019-17563.json | 3 +++ 2019/17xxx/CVE-2019-17569.json | 3 +++ 2019/17xxx/CVE-2019-17571.json | 3 +++ 2019/17xxx/CVE-2019-17573.json | 3 +++ 2019/19xxx/CVE-2019-19956.json | 3 +++ 2019/1xxx/CVE-2019-1547.json | 3 +++ 2019/1xxx/CVE-2019-1549.json | 3 +++ 2019/1xxx/CVE-2019-1551.json | 3 +++ 2019/1xxx/CVE-2019-1552.json | 3 +++ 2019/1xxx/CVE-2019-1563.json | 3 +++ 2019/20xxx/CVE-2019-20330.json | 3 +++ 2019/20xxx/CVE-2019-20388.json | 3 +++ 2019/3xxx/CVE-2019-3738.json | 3 +++ 2019/3xxx/CVE-2019-3739.json | 3 +++ 2019/3xxx/CVE-2019-3740.json | 3 +++ 2019/5xxx/CVE-2019-5427.json | 3 +++ 2019/5xxx/CVE-2019-5489.json | 3 +++ 2019/8xxx/CVE-2019-8457.json | 3 +++ 2020/10xxx/CVE-2020-10672.json | 3 +++ 2020/10xxx/CVE-2020-10673.json | 3 +++ 2020/10xxx/CVE-2020-10683.json | 3 +++ 2020/10xxx/CVE-2020-10968.json | 3 +++ 2020/10xxx/CVE-2020-10969.json | 3 +++ 2020/11xxx/CVE-2020-11022.json | 3 +++ 2020/11xxx/CVE-2020-11023.json | 3 +++ 2020/11xxx/CVE-2020-11080.json | 3 +++ 2020/11xxx/CVE-2020-11111.json | 3 +++ 2020/11xxx/CVE-2020-11112.json | 3 +++ 2020/11xxx/CVE-2020-11113.json | 3 +++ 2020/11xxx/CVE-2020-11619.json | 3 +++ 2020/11xxx/CVE-2020-11620.json | 3 +++ 2020/11xxx/CVE-2020-11655.json | 3 +++ 2020/11xxx/CVE-2020-11656.json | 3 +++ 2020/13xxx/CVE-2020-13434.json | 3 +++ 2020/13xxx/CVE-2020-13435.json | 3 +++ 2020/13xxx/CVE-2020-13630.json | 3 +++ 2020/13xxx/CVE-2020-13631.json | 3 +++ 2020/13xxx/CVE-2020-13632.json | 3 +++ 2020/1xxx/CVE-2020-1927.json | 3 +++ 2020/1xxx/CVE-2020-1934.json | 3 +++ 2020/1xxx/CVE-2020-1935.json | 3 +++ 2020/1xxx/CVE-2020-1938.json | 3 +++ 2020/1xxx/CVE-2020-1941.json | 3 +++ 2020/1xxx/CVE-2020-1945.json | 3 +++ 2020/1xxx/CVE-2020-1950.json | 3 +++ 2020/1xxx/CVE-2020-1951.json | 3 +++ 2020/1xxx/CVE-2020-1967.json | 3 +++ 2020/5xxx/CVE-2020-5258.json | 3 +++ 2020/5xxx/CVE-2020-5397.json | 3 +++ 2020/5xxx/CVE-2020-5398.json | 3 +++ 2020/6xxx/CVE-2020-6851.json | 3 +++ 2020/7xxx/CVE-2020-7059.json | 3 +++ 2020/7xxx/CVE-2020-7060.json | 3 +++ 2020/7xxx/CVE-2020-7595.json | 3 +++ 2020/8xxx/CVE-2020-8112.json | 3 +++ 2020/8xxx/CVE-2020-8172.json | 3 +++ 2020/9xxx/CVE-2020-9327.json | 3 +++ 2020/9xxx/CVE-2020-9484.json | 3 +++ 2020/9xxx/CVE-2020-9488.json | 3 +++ 2020/9xxx/CVE-2020-9546.json | 3 +++ 2020/9xxx/CVE-2020-9547.json | 3 +++ 2020/9xxx/CVE-2020-9548.json | 3 +++ 186 files changed, 558 insertions(+) diff --git a/2015/7xxx/CVE-2015-7501.json b/2015/7xxx/CVE-2015-7501.json index e393cb36baf..a2d4b6f9c42 100644 --- a/2015/7xxx/CVE-2015-7501.json +++ b/2015/7xxx/CVE-2015-7501.json @@ -181,6 +181,9 @@ "name": "1037053", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037053" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2015/8xxx/CVE-2015-8607.json b/2015/8xxx/CVE-2015-8607.json index caf0a64d0d0..fd30d581881 100644 --- a/2015/8xxx/CVE-2015-8607.json +++ b/2015/8xxx/CVE-2015-8607.json @@ -111,6 +111,9 @@ "name": "openSUSE-SU-2016:0881", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2015/8xxx/CVE-2015-8608.json b/2015/8xxx/CVE-2015-8608.json index 55dcb49b4dc..6ade33aabb6 100644 --- a/2015/8xxx/CVE-2015-8608.json +++ b/2015/8xxx/CVE-2015-8608.json @@ -66,6 +66,9 @@ "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2015/9xxx/CVE-2015-9251.json b/2015/9xxx/CVE-2015-9251.json index 95f83086a46..45046822a5d 100644 --- a/2015/9xxx/CVE-2015-9251.json +++ b/2015/9xxx/CVE-2015-9251.json @@ -221,6 +221,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/0xxx/CVE-2016-0701.json b/2016/0xxx/CVE-2016-0701.json index 16ab4c153ac..e293cc770a2 100644 --- a/2016/0xxx/CVE-2016-0701.json +++ b/2016/0xxx/CVE-2016-0701.json @@ -156,6 +156,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000031.json b/2016/1000xxx/CVE-2016-1000031.json index 0b0ce8f0a97..b1a17d2c6e4 100644 --- a/2016/1000xxx/CVE-2016-1000031.json +++ b/2016/1000xxx/CVE-2016-1000031.json @@ -146,6 +146,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/1xxx/CVE-2016-1181.json b/2016/1xxx/CVE-2016-1181.json index c12baade424..5ad0f43f6c4 100644 --- a/2016/1xxx/CVE-2016-1181.json +++ b/2016/1xxx/CVE-2016-1181.json @@ -151,6 +151,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/1xxx/CVE-2016-1182.json b/2016/1xxx/CVE-2016-1182.json index b4b4d1f95da..addccc67c67 100644 --- a/2016/1xxx/CVE-2016-1182.json +++ b/2016/1xxx/CVE-2016-1182.json @@ -146,6 +146,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/1xxx/CVE-2016-1923.json b/2016/1xxx/CVE-2016-1923.json index 1534d92fa21..013433998aa 100644 --- a/2016/1xxx/CVE-2016-1923.json +++ b/2016/1xxx/CVE-2016-1923.json @@ -66,6 +66,9 @@ "name": "[oss-security] 20160118 Out-of-bounds Read in the OpenJpeg's opj_j2k_update_image_data and opj_tgt_reset function", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/1xxx/CVE-2016-1924.json b/2016/1xxx/CVE-2016-1924.json index b5a7acacdd3..c4901eb817f 100644 --- a/2016/1xxx/CVE-2016-1924.json +++ b/2016/1xxx/CVE-2016-1924.json @@ -71,6 +71,9 @@ "name": "[oss-security] 20160118 Out-of-bounds Read in the OpenJpeg's opj_j2k_update_image_data and opj_tgt_reset function", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/18/4" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2183.json b/2016/2xxx/CVE-2016-2183.json index 3303da7b261..942f04cdabc 100644 --- a/2016/2xxx/CVE-2016-2183.json +++ b/2016/2xxx/CVE-2016-2183.json @@ -431,6 +431,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2381.json b/2016/2xxx/CVE-2016-2381.json index e9f4650ea58..3250fbb5d4c 100644 --- a/2016/2xxx/CVE-2016-2381.json +++ b/2016/2xxx/CVE-2016-2381.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/3xxx/CVE-2016-3183.json b/2016/3xxx/CVE-2016-3183.json index 56e2696333d..fd1e1cf2d2f 100644 --- a/2016/3xxx/CVE-2016-3183.json +++ b/2016/3xxx/CVE-2016-3183.json @@ -96,6 +96,9 @@ "name": "https://github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767", "refsource": "CONFIRM", "url": "https://github.com/uclouvain/openjpeg/commit/15f081c89650dccee4aa4ae66f614c3fdb268767" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/4xxx/CVE-2016-4000.json b/2016/4xxx/CVE-2016-4000.json index f373d5fb1c1..9856ff21795 100644 --- a/2016/4xxx/CVE-2016-4000.json +++ b/2016/4xxx/CVE-2016-4000.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/4xxx/CVE-2016-4796.json b/2016/4xxx/CVE-2016-4796.json index 48e67a0ca85..b7c4c780d29 100644 --- a/2016/4xxx/CVE-2016-4796.json +++ b/2016/4xxx/CVE-2016-4796.json @@ -91,6 +91,9 @@ "name": "[oss-security] 20160512 Re: CVE Request - OpenJPEG: Security Fixes", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/05/13/2" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/4xxx/CVE-2016-4797.json b/2016/4xxx/CVE-2016-4797.json index dcc7cf81d92..2921e057b64 100644 --- a/2016/4xxx/CVE-2016-4797.json +++ b/2016/4xxx/CVE-2016-4797.json @@ -91,6 +91,9 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1335483", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335483" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/5xxx/CVE-2016-5017.json b/2016/5xxx/CVE-2016-5017.json index f23ad7f0263..ec84d3299c4 100644 --- a/2016/5xxx/CVE-2016-5017.json +++ b/2016/5xxx/CVE-2016-5017.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/5xxx/CVE-2016-5019.json b/2016/5xxx/CVE-2016-5019.json index 7c0de80ad4e..d1da9da9995 100644 --- a/2016/5xxx/CVE-2016-5019.json +++ b/2016/5xxx/CVE-2016-5019.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/6xxx/CVE-2016-6306.json b/2016/6xxx/CVE-2016-6306.json index 111b826f2a0..e511a16cb27 100644 --- a/2016/6xxx/CVE-2016-6306.json +++ b/2016/6xxx/CVE-2016-6306.json @@ -206,6 +206,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/6xxx/CVE-2016-6814.json b/2016/6xxx/CVE-2016-6814.json index f5c00e852d3..4fcb4ac38ab 100644 --- a/2016/6xxx/CVE-2016-6814.json +++ b/2016/6xxx/CVE-2016-6814.json @@ -127,6 +127,9 @@ "refsource": "GENTOO", "name": "GLSA-202003-01", "url": "https://security.gentoo.org/glsa/202003-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/8xxx/CVE-2016-8332.json b/2016/8xxx/CVE-2016-8332.json index c427b19c138..df33cbcc9f8 100644 --- a/2016/8xxx/CVE-2016-8332.json +++ b/2016/8xxx/CVE-2016-8332.json @@ -76,6 +76,9 @@ "name": "1038623", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038623" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/8xxx/CVE-2016-8610.json b/2016/8xxx/CVE-2016-8610.json index 2c733cb35ac..8aefacd6f68 100644 --- a/2016/8xxx/CVE-2016-8610.json +++ b/2016/8xxx/CVE-2016-8610.json @@ -191,6 +191,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/9xxx/CVE-2016-9112.json b/2016/9xxx/CVE-2016-9112.json index ecd581a7b19..03bfdf88e1b 100644 --- a/2016/9xxx/CVE-2016-9112.json +++ b/2016/9xxx/CVE-2016-9112.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20190710 [SECURITY] [DLA 1851-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00010.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/9xxx/CVE-2016-9840.json b/2016/9xxx/CVE-2016-9840.json index 0302d71c7bf..6d0fee59698 100644 --- a/2016/9xxx/CVE-2016-9840.json +++ b/2016/9xxx/CVE-2016-9840.json @@ -191,6 +191,9 @@ "refsource": "UBUNTU", "name": "USN-4292-1", "url": "https://usn.ubuntu.com/4292-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/9xxx/CVE-2016-9841.json b/2016/9xxx/CVE-2016-9841.json index 80a545890e7..9b8df0bcd66 100644 --- a/2016/9xxx/CVE-2016-9841.json +++ b/2016/9xxx/CVE-2016-9841.json @@ -206,6 +206,9 @@ "refsource": "UBUNTU", "name": "USN-4292-1", "url": "https://usn.ubuntu.com/4292-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/9xxx/CVE-2016-9842.json b/2016/9xxx/CVE-2016-9842.json index bfd3f977667..de8c3ea7017 100644 --- a/2016/9xxx/CVE-2016-9842.json +++ b/2016/9xxx/CVE-2016-9842.json @@ -191,6 +191,9 @@ "refsource": "UBUNTU", "name": "USN-4292-1", "url": "https://usn.ubuntu.com/4292-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2016/9xxx/CVE-2016-9843.json b/2016/9xxx/CVE-2016-9843.json index 7413852ec55..5c35150bad0 100644 --- a/2016/9xxx/CVE-2016-9843.json +++ b/2016/9xxx/CVE-2016-9843.json @@ -206,6 +206,9 @@ "refsource": "UBUNTU", "name": "USN-4292-1", "url": "https://usn.ubuntu.com/4292-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/0xxx/CVE-2017-0861.json b/2017/0xxx/CVE-2017-0861.json index 80cab2834df..a129c6b8913 100644 --- a/2017/0xxx/CVE-2017-0861.json +++ b/2017/0xxx/CVE-2017-0861.json @@ -157,6 +157,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0036", "url": "https://access.redhat.com/errata/RHSA-2020:0036" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12610.json b/2017/12xxx/CVE-2017-12610.json index 4849b102830..fc97245c703 100644 --- a/2017/12xxx/CVE-2017-12610.json +++ b/2017/12xxx/CVE-2017-12610.json @@ -80,6 +80,9 @@ "refsource": "MLIST", "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12626.json b/2017/12xxx/CVE-2017-12626.json index 3c0c3c5fc60..0fbe6886597 100644 --- a/2017/12xxx/CVE-2017-12626.json +++ b/2017/12xxx/CVE-2017-12626.json @@ -87,6 +87,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12814.json b/2017/12xxx/CVE-2017-12814.json index 84500dc7ff7..d6f9ccd936b 100644 --- a/2017/12xxx/CVE-2017-12814.json +++ b/2017/12xxx/CVE-2017-12814.json @@ -76,6 +76,9 @@ "name": "101051", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101051" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12837.json b/2017/12xxx/CVE-2017-12837.json index d27d99d646d..b81ef9bf661 100644 --- a/2017/12xxx/CVE-2017-12837.json +++ b/2017/12xxx/CVE-2017-12837.json @@ -91,6 +91,9 @@ "name": "https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5", "refsource": "CONFIRM", "url": "https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12883.json b/2017/12xxx/CVE-2017-12883.json index 95c1bba114a..506b1b2a3d0 100644 --- a/2017/12xxx/CVE-2017-12883.json +++ b/2017/12xxx/CVE-2017-12883.json @@ -96,6 +96,9 @@ "name": "https://security.netapp.com/advisory/ntap-20180426-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180426-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/15xxx/CVE-2017-15265.json b/2017/15xxx/CVE-2017-15265.json index dad99f7c101..2004ca25a84 100644 --- a/2017/15xxx/CVE-2017-15265.json +++ b/2017/15xxx/CVE-2017-15265.json @@ -156,6 +156,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/15xxx/CVE-2017-15708.json b/2017/15xxx/CVE-2017-15708.json index ed1669472ed..bd261a5890f 100644 --- a/2017/15xxx/CVE-2017-15708.json +++ b/2017/15xxx/CVE-2017-15708.json @@ -82,6 +82,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/5xxx/CVE-2017-5637.json b/2017/5xxx/CVE-2017-5637.json index e20905faa85..239b982324c 100644 --- a/2017/5xxx/CVE-2017-5637.json +++ b/2017/5xxx/CVE-2017-5637.json @@ -105,6 +105,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2017/5xxx/CVE-2017-5645.json b/2017/5xxx/CVE-2017-5645.json index 8ae87d7be25..df541507448 100644 --- a/2017/5xxx/CVE-2017-5645.json +++ b/2017/5xxx/CVE-2017-5645.json @@ -381,6 +381,9 @@ "refsource": "MLIST", "name": "[logging-commits] 20200425 svn commit: r1059809 - /websites/production/logging/content/log4j/2.13.2/security.html", "url": "https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000004.json b/2018/1000xxx/CVE-2018-1000004.json index d14a76baeca..f64ae266411 100644 --- a/2018/1000xxx/CVE-2018-1000004.json +++ b/2018/1000xxx/CVE-2018-1000004.json @@ -128,6 +128,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:1483", "url": "https://access.redhat.com/errata/RHSA-2019:1483" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000632.json b/2018/1000xxx/CVE-2018-1000632.json index 4f95d0cf48a..47794054964 100644 --- a/2018/1000xxx/CVE-2018-1000632.json +++ b/2018/1000xxx/CVE-2018-1000632.json @@ -174,6 +174,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/10xxx/CVE-2018-10237.json b/2018/10xxx/CVE-2018-10237.json index 6ef15a829c4..7a5a8696074 100644 --- a/2018/10xxx/CVE-2018-10237.json +++ b/2018/10xxx/CVE-2018-10237.json @@ -226,6 +226,9 @@ "refsource": "MLIST", "name": "[hadoop-common-dev] 20200623 Update guava to 27.0-jre in hadoop branch-2.10", "url": "https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/10xxx/CVE-2018-10675.json b/2018/10xxx/CVE-2018-10675.json index 8487f375115..3e13bbfce0e 100644 --- a/2018/10xxx/CVE-2018-10675.json +++ b/2018/10xxx/CVE-2018-10675.json @@ -136,6 +136,9 @@ "name": "RHSA-2018:2791", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2791" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/10xxx/CVE-2018-10872.json b/2018/10xxx/CVE-2018-10872.json index 57708e616c3..7f804c225ce 100644 --- a/2018/10xxx/CVE-2018-10872.json +++ b/2018/10xxx/CVE-2018-10872.json @@ -76,6 +76,9 @@ "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10872", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10872" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/10xxx/CVE-2018-10901.json b/2018/10xxx/CVE-2018-10901.json index e95cded88cd..0a561fab56f 100644 --- a/2018/10xxx/CVE-2018-10901.json +++ b/2018/10xxx/CVE-2018-10901.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/11xxx/CVE-2018-11039.json b/2018/11xxx/CVE-2018-11039.json index afd204ce154..77b608254ac 100644 --- a/2018/11xxx/CVE-2018-11039.json +++ b/2018/11xxx/CVE-2018-11039.json @@ -94,6 +94,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11040.json b/2018/11xxx/CVE-2018-11040.json index 03bde433bfe..16ee5bee7eb 100644 --- a/2018/11xxx/CVE-2018-11040.json +++ b/2018/11xxx/CVE-2018-11040.json @@ -89,6 +89,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11054.json b/2018/11xxx/CVE-2018-11054.json index 29f728f6c28..1c687c50be3 100644 --- a/2018/11xxx/CVE-2018-11054.json +++ b/2018/11xxx/CVE-2018-11054.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11055.json b/2018/11xxx/CVE-2018-11055.json index f952506fafb..19ab23bebd6 100644 --- a/2018/11xxx/CVE-2018-11055.json +++ b/2018/11xxx/CVE-2018-11055.json @@ -92,6 +92,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11056.json b/2018/11xxx/CVE-2018-11056.json index acdb836d10d..8349f6f03a1 100644 --- a/2018/11xxx/CVE-2018-11056.json +++ b/2018/11xxx/CVE-2018-11056.json @@ -106,6 +106,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11057.json b/2018/11xxx/CVE-2018-11057.json index 965883a372e..166373e92f3 100644 --- a/2018/11xxx/CVE-2018-11057.json +++ b/2018/11xxx/CVE-2018-11057.json @@ -92,6 +92,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11058.json b/2018/11xxx/CVE-2018-11058.json index fa5ffaf6744..e328645aab3 100644 --- a/2018/11xxx/CVE-2018-11058.json +++ b/2018/11xxx/CVE-2018-11058.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11776.json b/2018/11xxx/CVE-2018-11776.json index 7b5c21d9203..31c2e8a192e 100644 --- a/2018/11xxx/CVE-2018-11776.json +++ b/2018/11xxx/CVE-2018-11776.json @@ -140,6 +140,9 @@ "refsource": "MLIST", "name": "[announce] 20200131 Apache Software Foundation Security Report: 2019", "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12015.json b/2018/12xxx/CVE-2018-12015.json index 9968aadc348..d02019ce4bd 100644 --- a/2018/12xxx/CVE-2018-12015.json +++ b/2018/12xxx/CVE-2018-12015.json @@ -106,6 +106,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:2097", "url": "https://access.redhat.com/errata/RHSA-2019:2097" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12023.json b/2018/12xxx/CVE-2018-12023.json index 4262b260759..e2e5a32757c 100644 --- a/2018/12xxx/CVE-2018-12023.json +++ b/2018/12xxx/CVE-2018-12023.json @@ -226,6 +226,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12207.json b/2018/12xxx/CVE-2018-12207.json index 298d911b49f..4213d64ef5e 100644 --- a/2018/12xxx/CVE-2018-12207.json +++ b/2018/12xxx/CVE-2018-12207.json @@ -118,6 +118,9 @@ "refsource": "GENTOO", "name": "GLSA-202003-56", "url": "https://security.gentoo.org/glsa/202003-56" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/15xxx/CVE-2018-15756.json b/2018/15xxx/CVE-2018-15756.json index f2639123dc4..8ef004c0ce7 100644 --- a/2018/15xxx/CVE-2018-15756.json +++ b/2018/15xxx/CVE-2018-15756.json @@ -161,6 +161,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/15xxx/CVE-2018-15769.json b/2018/15xxx/CVE-2018-15769.json index 8d5a2604090..4431738494a 100644 --- a/2018/15xxx/CVE-2018-15769.json +++ b/2018/15xxx/CVE-2018-15769.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/17xxx/CVE-2018-17190.json b/2018/17xxx/CVE-2018-17190.json index 5aaed3dc766..25586a3aea9 100644 --- a/2018/17xxx/CVE-2018-17190.json +++ b/2018/17xxx/CVE-2018-17190.json @@ -66,6 +66,9 @@ "refsource": "GENTOO", "name": "GLSA-201903-21", "url": "https://security.gentoo.org/glsa/201903-21" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/17xxx/CVE-2018-17196.json b/2018/17xxx/CVE-2018-17196.json index 477955c9b8d..4cfbaf282d9 100644 --- a/2018/17xxx/CVE-2018-17196.json +++ b/2018/17xxx/CVE-2018-17196.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[druid-commits] 20200406 [GitHub] [druid] ccaominh commented on issue #9579: Add Apache Ranger Authorization", "url": "https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/18xxx/CVE-2018-18311.json b/2018/18xxx/CVE-2018-18311.json index c136778457b..687d1ec8a18 100644 --- a/2018/18xxx/CVE-2018-18311.json +++ b/2018/18xxx/CVE-2018-18311.json @@ -186,6 +186,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/18xxx/CVE-2018-18312.json b/2018/18xxx/CVE-2018-18312.json index bae8a7a4bd2..0bb210d7ee4 100644 --- a/2018/18xxx/CVE-2018-18312.json +++ b/2018/18xxx/CVE-2018-18312.json @@ -116,6 +116,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/18xxx/CVE-2018-18313.json b/2018/18xxx/CVE-2018-18313.json index a4a1e9bc7d5..a9f48c89a2c 100644 --- a/2018/18xxx/CVE-2018-18313.json +++ b/2018/18xxx/CVE-2018-18313.json @@ -131,6 +131,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/18xxx/CVE-2018-18314.json b/2018/18xxx/CVE-2018-18314.json index 82430e62b57..ab53ce3a600 100644 --- a/2018/18xxx/CVE-2018-18314.json +++ b/2018/18xxx/CVE-2018-18314.json @@ -116,6 +116,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1199.json b/2018/1xxx/CVE-2018-1199.json index 052af2fa6af..ed9e0a17cd7 100644 --- a/2018/1xxx/CVE-2018-1199.json +++ b/2018/1xxx/CVE-2018-1199.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar", "url": "https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1257.json b/2018/1xxx/CVE-2018-1257.json index ae52e2a6422..a7e05f16ea4 100644 --- a/2018/1xxx/CVE-2018-1257.json +++ b/2018/1xxx/CVE-2018-1257.json @@ -97,6 +97,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1258.json b/2018/1xxx/CVE-2018-1258.json index a3cd77190b6..50a55f3c7f4 100644 --- a/2018/1xxx/CVE-2018-1258.json +++ b/2018/1xxx/CVE-2018-1258.json @@ -118,6 +118,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1270.json b/2018/1xxx/CVE-2018-1270.json index 69a54bbb134..0013f3c4674 100644 --- a/2018/1xxx/CVE-2018-1270.json +++ b/2018/1xxx/CVE-2018-1270.json @@ -112,6 +112,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.", "url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1271.json b/2018/1xxx/CVE-2018-1271.json index ec56397b2ed..c8ba5d7fdfe 100644 --- a/2018/1xxx/CVE-2018-1271.json +++ b/2018/1xxx/CVE-2018-1271.json @@ -97,6 +97,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1272.json b/2018/1xxx/CVE-2018-1272.json index e57c5a5eb7a..5a29c202be8 100644 --- a/2018/1xxx/CVE-2018-1272.json +++ b/2018/1xxx/CVE-2018-1272.json @@ -92,6 +92,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1275.json b/2018/1xxx/CVE-2018-1275.json index 9e8b51449b8..4fad5d4a8c1 100644 --- a/2018/1xxx/CVE-2018-1275.json +++ b/2018/1xxx/CVE-2018-1275.json @@ -112,6 +112,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar", "url": "https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/1xxx/CVE-2018-1288.json b/2018/1xxx/CVE-2018-1288.json index 2d5a8fac532..ad809eda9cd 100644 --- a/2018/1xxx/CVE-2018-1288.json +++ b/2018/1xxx/CVE-2018-1288.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[flink-issues] 20200402 [GitHub] [flink] zentol opened a new pull request #11617: [FLINK-16389][kafka] Bump kafka version to 0.10.2.2", "url": "https://lists.apache.org/thread.html/r07e1bbd1643847d599feb34c707906a4fdcc81e3a6ab01a10c451d40@%3Cissues.flink.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3620.json b/2018/3xxx/CVE-2018-3620.json index 1b4589d4be4..20e7a4e8ee5 100644 --- a/2018/3xxx/CVE-2018-3620.json +++ b/2018/3xxx/CVE-2018-3620.json @@ -312,6 +312,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3639.json b/2018/3xxx/CVE-2018-3639.json index 744c034e9fc..a6e14e640a4 100644 --- a/2018/3xxx/CVE-2018-3639.json +++ b/2018/3xxx/CVE-2018-3639.json @@ -777,6 +777,9 @@ "refsource": "MLIST", "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3646.json b/2018/3xxx/CVE-2018-3646.json index c6b3e5c94a6..522a4d73327 100644 --- a/2018/3xxx/CVE-2018-3646.json +++ b/2018/3xxx/CVE-2018-3646.json @@ -327,6 +327,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3665.json b/2018/3xxx/CVE-2018-3665.json index 72334d416d1..2657191e4e7 100644 --- a/2018/3xxx/CVE-2018-3665.json +++ b/2018/3xxx/CVE-2018-3665.json @@ -172,6 +172,9 @@ "refsource": "CONFIRM", "name": "https://security.paloaltonetworks.com/CVE-2018-3665", "url": "https://security.paloaltonetworks.com/CVE-2018-3665" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3693.json b/2018/3xxx/CVE-2018-3693.json index c38b198ea55..cc9015e60a1 100644 --- a/2018/3xxx/CVE-2018-3693.json +++ b/2018/3xxx/CVE-2018-3693.json @@ -96,6 +96,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0174", "url": "https://access.redhat.com/errata/RHSA-2020:0174" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/5xxx/CVE-2018-5390.json b/2018/5xxx/CVE-2018-5390.json index 954fc480d83..d33aaeeb343 100644 --- a/2018/5xxx/CVE-2018-5390.json +++ b/2018/5xxx/CVE-2018-5390.json @@ -259,6 +259,9 @@ "refsource": "CONFIRM", "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2018/6xxx/CVE-2018-6616.json b/2018/6xxx/CVE-2018-6616.json index 4d7ee9c44fe..f2e69a306bf 100644 --- a/2018/6xxx/CVE-2018-6616.json +++ b/2018/6xxx/CVE-2018-6616.json @@ -71,6 +71,9 @@ "refsource": "UBUNTU", "name": "USN-4109-1", "url": "https://usn.ubuntu.com/4109-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/6xxx/CVE-2018-6797.json b/2018/6xxx/CVE-2018-6797.json index 826b1011e18..ca802c457f8 100644 --- a/2018/6xxx/CVE-2018-6797.json +++ b/2018/6xxx/CVE-2018-6797.json @@ -86,6 +86,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/6xxx/CVE-2018-6798.json b/2018/6xxx/CVE-2018-6798.json index 678214441d4..9058a488df2 100644 --- a/2018/6xxx/CVE-2018-6798.json +++ b/2018/6xxx/CVE-2018-6798.json @@ -81,6 +81,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/6xxx/CVE-2018-6913.json b/2018/6xxx/CVE-2018-6913.json index 67bef4d5410..87e4e7c14da 100644 --- a/2018/6xxx/CVE-2018-6913.json +++ b/2018/6xxx/CVE-2018-6913.json @@ -91,6 +91,9 @@ "refsource": "GENTOO", "name": "GLSA-201909-01", "url": "https://security.gentoo.org/glsa/201909-01" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/7xxx/CVE-2018-7566.json b/2018/7xxx/CVE-2018-7566.json index ea8db4783f6..d746a9304d4 100644 --- a/2018/7xxx/CVE-2018-7566.json +++ b/2018/7xxx/CVE-2018-7566.json @@ -151,6 +151,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:1487", "url": "https://access.redhat.com/errata/RHSA-2019:1487" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8012.json b/2018/8xxx/CVE-2018-8012.json index 27da4f875f6..ad35d2ac105 100644 --- a/2018/8xxx/CVE-2018-8012.json +++ b/2018/8xxx/CVE-2018-8012.json @@ -87,6 +87,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8013.json b/2018/8xxx/CVE-2018-8013.json index 04872e20abc..a5e04ab6f5d 100644 --- a/2018/8xxx/CVE-2018-8013.json +++ b/2018/8xxx/CVE-2018-8013.json @@ -122,6 +122,9 @@ "refsource": "MLIST", "name": "[xmlgraphics-commits] 20200615 svn commit: r1878850 - /xmlgraphics/site/trunk/content/security.mdtext", "url": "https://lists.apache.org/thread.html/rc0a31867796043fbe59113fb654fe8b13309fe04f8935acb8d0fab19@%3Ccommits.xmlgraphics.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8032.json b/2018/8xxx/CVE-2018-8032.json index 6b7703d67fd..a1171309164 100644 --- a/2018/8xxx/CVE-2018-8032.json +++ b/2018/8xxx/CVE-2018-8032.json @@ -87,6 +87,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json index 85811dfdcd7..f9ebb6b09a7 100644 --- a/2018/8xxx/CVE-2018-8088.json +++ b/2018/8xxx/CVE-2018-8088.json @@ -216,6 +216,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:3140", "url": "https://access.redhat.com/errata/RHSA-2019:3140" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/0xxx/CVE-2019-0188.json b/2019/0xxx/CVE-2019-0188.json index f9b15272ebe..dfe70fbb31b 100644 --- a/2019/0xxx/CVE-2019-0188.json +++ b/2019/0xxx/CVE-2019-0188.json @@ -113,6 +113,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0201.json b/2019/0xxx/CVE-2019-0201.json index 1942cf00db7..3dfb2c5485d 100644 --- a/2019/0xxx/CVE-2019-0201.json +++ b/2019/0xxx/CVE-2019-0201.json @@ -126,6 +126,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0220.json b/2019/0xxx/CVE-2019-0220.json index d86a2952483..4b0fa641ee3 100644 --- a/2019/0xxx/CVE-2019-0220.json +++ b/2019/0xxx/CVE-2019-0220.json @@ -188,6 +188,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0222.json b/2019/0xxx/CVE-2019-0222.json index 977e803ba19..cdf84487a8a 100644 --- a/2019/0xxx/CVE-2019-0222.json +++ b/2019/0xxx/CVE-2019-0222.json @@ -113,6 +113,9 @@ "refsource": "MLIST", "name": "[activemq-commits] 20200514 [activemq-website] branch master updated: Publish CVE-2020-1941 security advisory", "url": "https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0227.json b/2019/0xxx/CVE-2019-0227.json index d8b9a34262a..d7f1f7eb0d4 100644 --- a/2019/0xxx/CVE-2019-0227.json +++ b/2019/0xxx/CVE-2019-0227.json @@ -68,6 +68,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10081.json b/2019/10xxx/CVE-2019-10081.json index 19f7a7baf4a..082d0f85231 100644 --- a/2019/10xxx/CVE-2019-10081.json +++ b/2019/10xxx/CVE-2019-10081.json @@ -103,6 +103,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10082.json b/2019/10xxx/CVE-2019-10082.json index 0a7a15b9a8c..6ed92b2fbed 100644 --- a/2019/10xxx/CVE-2019-10082.json +++ b/2019/10xxx/CVE-2019-10082.json @@ -68,6 +68,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10086.json b/2019/10xxx/CVE-2019-10086.json index da44c61f0ee..29d44c68f9b 100644 --- a/2019/10xxx/CVE-2019-10086.json +++ b/2019/10xxx/CVE-2019-10086.json @@ -178,6 +178,9 @@ "refsource": "MLIST", "name": "[brooklyn-dev] 20200420 [GitHub] [brooklyn-server] duncangrant opened a new pull request #1091: Update library versions due to CVEs", "url": "https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json index fa73472037e..3f3d36df70c 100644 --- a/2019/10xxx/CVE-2019-10092.json +++ b/2019/10xxx/CVE-2019-10092.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json index 5f6b874055b..0ac1f1c1166 100644 --- a/2019/10xxx/CVE-2019-10097.json +++ b/2019/10xxx/CVE-2019-10097.json @@ -73,6 +73,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10192.json b/2019/10xxx/CVE-2019-10192.json index 0c5f116a328..a3f967f94c6 100644 --- a/2019/10xxx/CVE-2019-10192.json +++ b/2019/10xxx/CVE-2019-10192.json @@ -129,6 +129,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:2630", "url": "https://access.redhat.com/errata/RHSA-2019:2630" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10193.json b/2019/10xxx/CVE-2019-10193.json index 2c88f1f0a9d..ebe21c88e2a 100644 --- a/2019/10xxx/CVE-2019-10193.json +++ b/2019/10xxx/CVE-2019-10193.json @@ -104,6 +104,9 @@ "refsource": "GENTOO", "name": "GLSA-201908-04", "url": "https://security.gentoo.org/glsa/201908-04" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10246.json b/2019/10xxx/CVE-2019-10246.json index d819045bdc7..c73f8c89c72 100644 --- a/2019/10xxx/CVE-2019-10246.json +++ b/2019/10xxx/CVE-2019-10246.json @@ -95,6 +95,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/10xxx/CVE-2019-10247.json b/2019/10xxx/CVE-2019-10247.json index d6c1fbadd57..49d7265dd6c 100644 --- a/2019/10xxx/CVE-2019-10247.json +++ b/2019/10xxx/CVE-2019-10247.json @@ -123,6 +123,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/11xxx/CVE-2019-11358.json b/2019/11xxx/CVE-2019-11358.json index 6955670dab3..accdb50f269 100644 --- a/2019/11xxx/CVE-2019-11358.json +++ b/2019/11xxx/CVE-2019-11358.json @@ -366,6 +366,9 @@ "refsource": "MLIST", "name": "[storm-dev] 20200708 [GitHub] [storm] Crim opened a new pull request #3305: [STORM-3553] Upgrade jQuery from 1.11.1 to 3.5.1", "url": "https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12086.json b/2019/12xxx/CVE-2019-12086.json index 072f600aaa5..b026950f052 100644 --- a/2019/12xxx/CVE-2019-12086.json +++ b/2019/12xxx/CVE-2019-12086.json @@ -231,6 +231,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12384.json b/2019/12xxx/CVE-2019-12384.json index f32c9110c68..6dab528a593 100644 --- a/2019/12xxx/CVE-2019-12384.json +++ b/2019/12xxx/CVE-2019-12384.json @@ -271,6 +271,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12402.json b/2019/12xxx/CVE-2019-12402.json index 8ab94cb9f9c..a80f72252c7 100644 --- a/2019/12xxx/CVE-2019-12402.json +++ b/2019/12xxx/CVE-2019-12402.json @@ -153,6 +153,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12415.json b/2019/12xxx/CVE-2019-12415.json index 55b9d294117..4151dfee5e8 100644 --- a/2019/12xxx/CVE-2019-12415.json +++ b/2019/12xxx/CVE-2019-12415.json @@ -78,6 +78,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12423.json b/2019/12xxx/CVE-2019-12423.json index a52aea6d3db..1f4e6b324c7 100644 --- a/2019/12xxx/CVE-2019-12423.json +++ b/2019/12xxx/CVE-2019-12423.json @@ -63,6 +63,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12814.json b/2019/12xxx/CVE-2019-12814.json index 23b26a60bc9..435dfd8fde3 100644 --- a/2019/12xxx/CVE-2019-12814.json +++ b/2019/12xxx/CVE-2019-12814.json @@ -316,6 +316,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12973.json b/2019/12xxx/CVE-2019-12973.json index d14db8d5291..5be26941247 100644 --- a/2019/12xxx/CVE-2019-12973.json +++ b/2019/12xxx/CVE-2019-12973.json @@ -81,6 +81,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2277-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/13xxx/CVE-2019-13990.json b/2019/13xxx/CVE-2019-13990.json index e454abd5ba4..7896823c285 100644 --- a/2019/13xxx/CVE-2019-13990.json +++ b/2019/13xxx/CVE-2019-13990.json @@ -86,6 +86,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14379.json b/2019/14xxx/CVE-2019-14379.json index 5b854dae1f3..f6d276fabe1 100644 --- a/2019/14xxx/CVE-2019-14379.json +++ b/2019/14xxx/CVE-2019-14379.json @@ -311,6 +311,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14439.json b/2019/14xxx/CVE-2019-14439.json index f5e8facc873..3169b5d08c8 100644 --- a/2019/14xxx/CVE-2019-14439.json +++ b/2019/14xxx/CVE-2019-14439.json @@ -191,6 +191,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14540.json b/2019/14xxx/CVE-2019-14540.json index aca4c17c339..2dccc7320bd 100644 --- a/2019/14xxx/CVE-2019-14540.json +++ b/2019/14xxx/CVE-2019-14540.json @@ -206,6 +206,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200421 svn commit: r1876802 - /nifi/site/trunk/registry-security.html", "url": "https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14862.json b/2019/14xxx/CVE-2019-14862.json index 87b8bf53fdd..56ed6c72c95 100644 --- a/2019/14xxx/CVE-2019-14862.json +++ b/2019/14xxx/CVE-2019-14862.json @@ -53,6 +53,9 @@ "url": "https://snyk.io/vuln/npm:knockout:20180213", "refsource": "MISC", "name": "https://snyk.io/vuln/npm:knockout:20180213" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14893.json b/2019/14xxx/CVE-2019-14893.json index b95beae79c4..5d1151a0725 100644 --- a/2019/14xxx/CVE-2019-14893.json +++ b/2019/14xxx/CVE-2019-14893.json @@ -74,6 +74,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200327-0006/", "url": "https://security.netapp.com/advisory/ntap-20200327-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/16xxx/CVE-2019-16056.json b/2019/16xxx/CVE-2019-16056.json index b7e4ab11ddf..19bfecdc6ca 100644 --- a/2019/16xxx/CVE-2019-16056.json +++ b/2019/16xxx/CVE-2019-16056.json @@ -201,6 +201,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16335.json b/2019/16xxx/CVE-2019-16335.json index eb76094df9c..9de292f9723 100644 --- a/2019/16xxx/CVE-2019-16335.json +++ b/2019/16xxx/CVE-2019-16335.json @@ -191,6 +191,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16935.json b/2019/16xxx/CVE-2019-16935.json index cd8ac3ab338..144a0b579f2 100644 --- a/2019/16xxx/CVE-2019-16935.json +++ b/2019/16xxx/CVE-2019-16935.json @@ -151,6 +151,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0086", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16942.json b/2019/16xxx/CVE-2019-16942.json index 353d9867acf..b1f9398be17 100644 --- a/2019/16xxx/CVE-2019-16942.json +++ b/2019/16xxx/CVE-2019-16942.json @@ -166,6 +166,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16943.json b/2019/16xxx/CVE-2019-16943.json index 0f1bdf2484b..2489896de7f 100644 --- a/2019/16xxx/CVE-2019-16943.json +++ b/2019/16xxx/CVE-2019-16943.json @@ -161,6 +161,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17091.json b/2019/17xxx/CVE-2019-17091.json index 16458c6bc84..f10103e59fe 100644 --- a/2019/17xxx/CVE-2019-17091.json +++ b/2019/17xxx/CVE-2019-17091.json @@ -116,6 +116,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17267.json b/2019/17xxx/CVE-2019-17267.json index e509d2c8503..0605e4f8be8 100644 --- a/2019/17xxx/CVE-2019-17267.json +++ b/2019/17xxx/CVE-2019-17267.json @@ -131,6 +131,9 @@ "refsource": "MLIST", "name": "[skywalking-dev] 20200324 [CVE-2019-17267] Upgrade jackson-databind version to 2.9.10", "url": "https://lists.apache.org/thread.html/r9d727fc681fb3828794acbefcaee31393742b4d73a29461ccd9597a8@%3Cdev.skywalking.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17359.json b/2019/17xxx/CVE-2019-17359.json index cf5bf293489..b6b2c07f860 100644 --- a/2019/17xxx/CVE-2019-17359.json +++ b/2019/17xxx/CVE-2019-17359.json @@ -116,6 +116,9 @@ "refsource": "MLIST", "name": "[tomee-commits] 20200519 [jira] [Resolved] (TOMEE-2788) TomEE plus is affected by CVE-2019-17359 (BDSA-2019-3168) vulnerability", "url": "https://lists.apache.org/thread.html/r79b6a6aa0dd1aeb57bd253d94794bc96f1ec005953c4bd5414cc0db0@%3Ccommits.tomee.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17531.json b/2019/17xxx/CVE-2019-17531.json index 9abe9765a38..474220310ca 100644 --- a/2019/17xxx/CVE-2019-17531.json +++ b/2019/17xxx/CVE-2019-17531.json @@ -121,6 +121,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17560.json b/2019/17xxx/CVE-2019-17560.json index fb3879a33ed..0171f9fea79 100644 --- a/2019/17xxx/CVE-2019-17560.json +++ b/2019/17xxx/CVE-2019-17560.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r354d7654efa1050539fe56a3257696d1faeea4f3f9b633c29ec89609%40%3Cdev.netbeans.apache.org%3E", "url": "https://lists.apache.org/thread.html/r354d7654efa1050539fe56a3257696d1faeea4f3f9b633c29ec89609%40%3Cdev.netbeans.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17561.json b/2019/17xxx/CVE-2019-17561.json index d9da9628c86..8cb096640b8 100644 --- a/2019/17xxx/CVE-2019-17561.json +++ b/2019/17xxx/CVE-2019-17561.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/rb218aa720fc525f63d91761fbf67854f454ce7a697dbbee2001ae8b1%40%3Cdev.netbeans.apache.org%3E", "url": "https://lists.apache.org/thread.html/rb218aa720fc525f63d91761fbf67854f454ce7a697dbbee2001ae8b1%40%3Cdev.netbeans.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17563.json b/2019/17xxx/CVE-2019-17563.json index 2938591fb61..961368cc51a 100644 --- a/2019/17xxx/CVE-2019-17563.json +++ b/2019/17xxx/CVE-2019-17563.json @@ -134,6 +134,9 @@ "refsource": "MLIST", "name": "[cxf-issues] 20200618 [jira] [Created] (FEDIZ-249) Relying party rejects a valid security token and redirects back to ADFS when using Fediz 1.4.6 with Tomcat 8.5.56", "url": "https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17569.json b/2019/17xxx/CVE-2019-17569.json index 1472947220b..84df60c4c68 100644 --- a/2019/17xxx/CVE-2019-17569.json +++ b/2019/17xxx/CVE-2019-17569.json @@ -89,6 +89,9 @@ "refsource": "DEBIAN", "name": "DSA-4680", "url": "https://www.debian.org/security/2020/dsa-4680" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index b35d9d0869f..dd03abd3ea8 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -353,6 +353,9 @@ "refsource": "MLIST", "name": "[kafka-jira] 20200625 [GitHub] [kafka] dongjinleekr commented on pull request #7898: KAFKA-9366: please consider upgrade log4j to log4j2 due to critical security problem CVE-2019-17571", "url": "https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17573.json b/2019/17xxx/CVE-2019-17573.json index 6a4f3b48a5d..212a47d201e 100644 --- a/2019/17xxx/CVE-2019-17573.json +++ b/2019/17xxx/CVE-2019-17573.json @@ -63,6 +63,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/19xxx/CVE-2019-19956.json b/2019/19xxx/CVE-2019-19956.json index 81f3de97d63..5f785090ed0 100644 --- a/2019/19xxx/CVE-2019-19956.json +++ b/2019/19xxx/CVE-2019-19956.json @@ -91,6 +91,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0781", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1547.json b/2019/1xxx/CVE-2019-1547.json index 18dad567b07..71058710bcc 100644 --- a/2019/1xxx/CVE-2019-1547.json +++ b/2019/1xxx/CVE-2019-1547.json @@ -217,6 +217,9 @@ "refsource": "UBUNTU", "name": "USN-4376-1", "url": "https://usn.ubuntu.com/4376-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1549.json b/2019/1xxx/CVE-2019-1549.json index 8895e977377..2fdcf1043df 100644 --- a/2019/1xxx/CVE-2019-1549.json +++ b/2019/1xxx/CVE-2019-1549.json @@ -131,6 +131,9 @@ "refsource": "UBUNTU", "name": "USN-4376-1", "url": "https://usn.ubuntu.com/4376-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1551.json b/2019/1xxx/CVE-2019-1551.json index 9d7914ce801..9b28a8d20a6 100644 --- a/2019/1xxx/CVE-2019-1551.json +++ b/2019/1xxx/CVE-2019-1551.json @@ -149,6 +149,9 @@ "refsource": "UBUNTU", "name": "USN-4376-1", "url": "https://usn.ubuntu.com/4376-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1552.json b/2019/1xxx/CVE-2019-1552.json index 7d869a69051..62e6b003e3e 100644 --- a/2019/1xxx/CVE-2019-1552.json +++ b/2019/1xxx/CVE-2019-1552.json @@ -152,6 +152,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1563.json b/2019/1xxx/CVE-2019-1563.json index 975c50e9904..4c3dc810431 100644 --- a/2019/1xxx/CVE-2019-1563.json +++ b/2019/1xxx/CVE-2019-1563.json @@ -197,6 +197,9 @@ "refsource": "UBUNTU", "name": "USN-4376-1", "url": "https://usn.ubuntu.com/4376-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/20xxx/CVE-2019-20330.json b/2019/20xxx/CVE-2019-20330.json index 357f26d3580..bd007596246 100644 --- a/2019/20xxx/CVE-2019-20330.json +++ b/2019/20xxx/CVE-2019-20330.json @@ -191,6 +191,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/20xxx/CVE-2019-20388.json b/2019/20xxx/CVE-2019-20388.json index bb05004d5f1..a60fb65a5c0 100644 --- a/2019/20xxx/CVE-2019-20388.json +++ b/2019/20xxx/CVE-2019-20388.json @@ -81,6 +81,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0005/", "url": "https://security.netapp.com/advisory/ntap-20200702-0005/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3738.json b/2019/3xxx/CVE-2019-3738.json index 7e6d6b69040..d9258b1c98b 100644 --- a/2019/3xxx/CVE-2019-3738.json +++ b/2019/3xxx/CVE-2019-3738.json @@ -65,6 +65,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities", "name": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3739.json b/2019/3xxx/CVE-2019-3739.json index 678d5b77631..4dd3af81752 100644 --- a/2019/3xxx/CVE-2019-3739.json +++ b/2019/3xxx/CVE-2019-3739.json @@ -65,6 +65,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities", "name": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3740.json b/2019/3xxx/CVE-2019-3740.json index 4600a1edc03..fd80a5fb1a0 100644 --- a/2019/3xxx/CVE-2019-3740.json +++ b/2019/3xxx/CVE-2019-3740.json @@ -65,6 +65,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities", "name": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/5xxx/CVE-2019-5427.json b/2019/5xxx/CVE-2019-5427.json index 7bc1ab38638..3fc5b7f13b5 100644 --- a/2019/5xxx/CVE-2019-5427.json +++ b/2019/5xxx/CVE-2019-5427.json @@ -63,6 +63,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5489.json b/2019/5xxx/CVE-2019-5489.json index 77d45637682..6d982ce29a8 100644 --- a/2019/5xxx/CVE-2019-5489.json +++ b/2019/5xxx/CVE-2019-5489.json @@ -206,6 +206,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0204", "url": "https://access.redhat.com/errata/RHSA-2020:0204" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2019/8xxx/CVE-2019-8457.json b/2019/8xxx/CVE-2019-8457.json index 3a78ff0f1ce..c1377b1912d 100644 --- a/2019/8xxx/CVE-2019-8457.json +++ b/2019/8xxx/CVE-2019-8457.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10672.json b/2020/10xxx/CVE-2020-10672.json index 593c1fd3234..6f8ba41f045 100644 --- a/2020/10xxx/CVE-2020-10672.json +++ b/2020/10xxx/CVE-2020-10672.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200403-0002/", "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10673.json b/2020/10xxx/CVE-2020-10673.json index 5907becc083..a00b1f8150b 100644 --- a/2020/10xxx/CVE-2020-10673.json +++ b/2020/10xxx/CVE-2020-10673.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200403-0002/", "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index 7ee6afcf4ed..0350926a843 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -81,6 +81,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0719", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10968.json b/2020/10xxx/CVE-2020-10968.json index e2c7a6ab0ab..650c8b115fb 100644 --- a/2020/10xxx/CVE-2020-10968.json +++ b/2020/10xxx/CVE-2020-10968.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10969.json b/2020/10xxx/CVE-2020-10969.json index 28e8fb0011a..dd2bf96179f 100644 --- a/2020/10xxx/CVE-2020-10969.json +++ b/2020/10xxx/CVE-2020-10969.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json index fcdb4c8ca57..43b3488d23f 100644 --- a/2020/11xxx/CVE-2020-11022.json +++ b/2020/11xxx/CVE-2020-11022.json @@ -113,6 +113,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-36d2db5f51", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json index 0c3ba7f2450..e965a033bdd 100644 --- a/2020/11xxx/CVE-2020-11023.json +++ b/2020/11xxx/CVE-2020-11023.json @@ -103,6 +103,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-36d2db5f51", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11080.json b/2020/11xxx/CVE-2020-11080.json index 629799e8c14..66a0d80b7a3 100644 --- a/2020/11xxx/CVE-2020-11080.json +++ b/2020/11xxx/CVE-2020-11080.json @@ -98,6 +98,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-f7d15c8b77", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAC2AA36OTRHKSVM5OV7TTVB3CZIGEFL/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11111.json b/2020/11xxx/CVE-2020-11111.json index 5ffbc18bf54..fee55be2535 100644 --- a/2020/11xxx/CVE-2020-11111.json +++ b/2020/11xxx/CVE-2020-11111.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11112.json b/2020/11xxx/CVE-2020-11112.json index c7bdb9d9be3..2025eca7658 100644 --- a/2020/11xxx/CVE-2020-11112.json +++ b/2020/11xxx/CVE-2020-11112.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11113.json b/2020/11xxx/CVE-2020-11113.json index 7bc9d38c951..06347be131c 100644 --- a/2020/11xxx/CVE-2020-11113.json +++ b/2020/11xxx/CVE-2020-11113.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200417 [SECURITY] [DLA 2179-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11619.json b/2020/11xxx/CVE-2020-11619.json index fcb88c33f24..fe96ba41c85 100644 --- a/2020/11xxx/CVE-2020-11619.json +++ b/2020/11xxx/CVE-2020-11619.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200511-0004/", "url": "https://security.netapp.com/advisory/ntap-20200511-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11620.json b/2020/11xxx/CVE-2020-11620.json index 5f9110338c7..cd4c96c4937 100644 --- a/2020/11xxx/CVE-2020-11620.json +++ b/2020/11xxx/CVE-2020-11620.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200511-0004/", "url": "https://security.netapp.com/advisory/ntap-20200511-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11655.json b/2020/11xxx/CVE-2020-11655.json index d05d2356d13..3d8349a7d29 100644 --- a/2020/11xxx/CVE-2020-11655.json +++ b/2020/11xxx/CVE-2020-11655.json @@ -76,6 +76,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11656.json b/2020/11xxx/CVE-2020-11656.json index 9c78d92c48b..9ba562e3552 100644 --- a/2020/11xxx/CVE-2020-11656.json +++ b/2020/11xxx/CVE-2020-11656.json @@ -66,6 +66,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200416-0001/", "url": "https://security.netapp.com/advisory/ntap-20200416-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13434.json b/2020/13xxx/CVE-2020-13434.json index 1b28015f886..fa5c4207be6 100644 --- a/2020/13xxx/CVE-2020-13434.json +++ b/2020/13xxx/CVE-2020-13434.json @@ -81,6 +81,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13435.json b/2020/13xxx/CVE-2020-13435.json index ea4318c45b5..1aa32f9ed84 100644 --- a/2020/13xxx/CVE-2020-13435.json +++ b/2020/13xxx/CVE-2020-13435.json @@ -71,6 +71,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13630.json b/2020/13xxx/CVE-2020-13630.json index cdb36eafcb0..71328b16dc4 100644 --- a/2020/13xxx/CVE-2020-13630.json +++ b/2020/13xxx/CVE-2020-13630.json @@ -76,6 +76,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13631.json b/2020/13xxx/CVE-2020-13631.json index aca010d57f9..62c7550d0b5 100644 --- a/2020/13xxx/CVE-2020-13631.json +++ b/2020/13xxx/CVE-2020-13631.json @@ -76,6 +76,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13632.json b/2020/13xxx/CVE-2020-13632.json index 0188c68442a..70ffca2bfad 100644 --- a/2020/13xxx/CVE-2020-13632.json +++ b/2020/13xxx/CVE-2020-13632.json @@ -76,6 +76,9 @@ "refsource": "UBUNTU", "name": "USN-4394-1", "url": "https://usn.ubuntu.com/4394-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json index 7be72978900..4cd88cb7529 100644 --- a/2020/1xxx/CVE-2020-1927.json +++ b/2020/1xxx/CVE-2020-1927.json @@ -88,6 +88,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0597", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json index c7aafa9687c..2c4cecb2835 100644 --- a/2020/1xxx/CVE-2020-1934.json +++ b/2020/1xxx/CVE-2020-1934.json @@ -73,6 +73,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0597", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1935.json b/2020/1xxx/CVE-2020-1935.json index 779fd9f13cc..2fe8521d176 100644 --- a/2020/1xxx/CVE-2020-1935.json +++ b/2020/1xxx/CVE-2020-1935.json @@ -94,6 +94,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1938.json b/2020/1xxx/CVE-2020-1938.json index fd037b8d99d..47228407f51 100644 --- a/2020/1xxx/CVE-2020-1938.json +++ b/2020/1xxx/CVE-2020-1938.json @@ -259,6 +259,9 @@ "refsource": "MLIST", "name": "[ofbiz-notifications] 20200628 [jira] [Created] (OFBIZ-11847) CLONE - Upgrade Tomcat from 9.0.34 to 9.0.36 (CVE-2020-11996)", "url": "https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1941.json b/2020/1xxx/CVE-2020-1941.json index 84fb4fee0db..0612a6f5b84 100644 --- a/2020/1xxx/CVE-2020-1941.json +++ b/2020/1xxx/CVE-2020-1941.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt", "url": "http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1945.json b/2020/1xxx/CVE-2020-1945.json index 641b080d175..397768a3a81 100644 --- a/2020/1xxx/CVE-2020-1945.json +++ b/2020/1xxx/CVE-2020-1945.json @@ -128,6 +128,9 @@ "refsource": "MLIST", "name": "[creadur-dev] 20200703 [jira] [Commented] (RAT-269) Fix CVE-2020-1945: Apache Ant insecure temporary file vulnerability by updating to latest ANT", "url": "https://lists.apache.org/thread.html/r2704fb14ce068c64759a986f81d5b5e42ab434fa13d0f444ad52816b@%3Cdev.creadur.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1950.json b/2020/1xxx/CVE-2020-1950.json index 80b81d83aef..735175d0d77 100644 --- a/2020/1xxx/CVE-2020-1950.json +++ b/2020/1xxx/CVE-2020-1950.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200328 [SECURITY] [DLA 2161-1] tika security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1951.json b/2020/1xxx/CVE-2020-1951.json index d91f185ee35..89a89d04fa0 100644 --- a/2020/1xxx/CVE-2020-1951.json +++ b/2020/1xxx/CVE-2020-1951.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200328 [SECURITY] [DLA 2161-1] tika security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00035.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1967.json b/2020/1xxx/CVE-2020-1967.json index dd6dfc268d9..1e8f7e65552 100644 --- a/2020/1xxx/CVE-2020-1967.json +++ b/2020/1xxx/CVE-2020-1967.json @@ -181,6 +181,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0945", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/5xxx/CVE-2020-5258.json b/2020/5xxx/CVE-2020-5258.json index 1cad6f59157..0762b77c3fc 100644 --- a/2020/5xxx/CVE-2020-5258.json +++ b/2020/5xxx/CVE-2020-5258.json @@ -95,6 +95,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200311 [SECURITY] [DLA 2139-1] dojo security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5397.json b/2020/5xxx/CVE-2020-5397.json index 87cb13f892e..c598f8d8480 100644 --- a/2020/5xxx/CVE-2020-5397.json +++ b/2020/5xxx/CVE-2020-5397.json @@ -68,6 +68,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index 0c7ec58fcf7..21702c73c7d 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -203,6 +203,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E", "url": "https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/6xxx/CVE-2020-6851.json b/2020/6xxx/CVE-2020-6851.json index 273add28bda..c66f1278324 100644 --- a/2020/6xxx/CVE-2020-6851.json +++ b/2020/6xxx/CVE-2020-6851.json @@ -91,6 +91,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2277-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/7xxx/CVE-2020-7059.json b/2020/7xxx/CVE-2020-7059.json index 18de7d027f3..1d02fa35de2 100644 --- a/2020/7xxx/CVE-2020-7059.json +++ b/2020/7xxx/CVE-2020-7059.json @@ -140,6 +140,9 @@ "refsource": "GENTOO", "name": "GLSA-202003-57", "url": "https://security.gentoo.org/glsa/202003-57" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7060.json b/2020/7xxx/CVE-2020-7060.json index 72af16e6558..74a808b01ea 100644 --- a/2020/7xxx/CVE-2020-7060.json +++ b/2020/7xxx/CVE-2020-7060.json @@ -140,6 +140,9 @@ "refsource": "GENTOO", "name": "GLSA-202003-57", "url": "https://security.gentoo.org/glsa/202003-57" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7595.json b/2020/7xxx/CVE-2020-7595.json index ecfb939caf1..de38fbcc654 100644 --- a/2020/7xxx/CVE-2020-7595.json +++ b/2020/7xxx/CVE-2020-7595.json @@ -86,6 +86,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0005/", "url": "https://security.netapp.com/advisory/ntap-20200702-0005/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/8xxx/CVE-2020-8112.json b/2020/8xxx/CVE-2020-8112.json index 4b84d86136c..8104556739a 100644 --- a/2020/8xxx/CVE-2020-8112.json +++ b/2020/8xxx/CVE-2020-8112.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2277-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/8xxx/CVE-2020-8172.json b/2020/8xxx/CVE-2020-8172.json index 021047ee45a..a815b6d020b 100644 --- a/2020/8xxx/CVE-2020-8172.json +++ b/2020/8xxx/CVE-2020-8172.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200625-0002/", "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9327.json b/2020/9xxx/CVE-2020-9327.json index 2fa10e075bd..68b0abe154f 100644 --- a/2020/9xxx/CVE-2020-9327.json +++ b/2020/9xxx/CVE-2020-9327.json @@ -81,6 +81,9 @@ "refsource": "UBUNTU", "name": "USN-4298-1", "url": "https://usn.ubuntu.com/4298-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index dce4907cc6a..d75098edb68 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -118,6 +118,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200712 [SECURITY] [DLA 2279-1] tomcat8 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9488.json b/2020/9xxx/CVE-2020-9488.json index 2ac9b559c7e..db3f92585b9 100644 --- a/2020/9xxx/CVE-2020-9488.json +++ b/2020/9xxx/CVE-2020-9488.json @@ -143,6 +143,9 @@ "refsource": "MLIST", "name": "[kafka-jira] 20200515 [jira] [Commented] (KAFKA-9997) upgrade log4j lib to address CVE-2020-9488", "url": "https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9546.json b/2020/9xxx/CVE-2020-9546.json index b99d7ef611b..7abf1dbe1f5 100644 --- a/2020/9xxx/CVE-2020-9546.json +++ b/2020/9xxx/CVE-2020-9546.json @@ -106,6 +106,9 @@ "refsource": "MLIST", "name": "[zookeeper-issues] 20200430 [jira] [Resolved] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546", "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9547.json b/2020/9xxx/CVE-2020-9547.json index 84b5932a360..411d2b61532 100644 --- a/2020/9xxx/CVE-2020-9547.json +++ b/2020/9xxx/CVE-2020-9547.json @@ -136,6 +136,9 @@ "refsource": "MLIST", "name": "[zookeeper-issues] 20200430 [jira] [Resolved] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546", "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9548.json b/2020/9xxx/CVE-2020-9548.json index 30ee5300485..b05ab4e2019 100644 --- a/2020/9xxx/CVE-2020-9548.json +++ b/2020/9xxx/CVE-2020-9548.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[zookeeper-issues] 20200430 [jira] [Resolved] (ZOOKEEPER-3750) update jackson-databind to address CVE-2020-9547, CVE-2020-9548, CVE-2020-9546", "url": "https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ] }