mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
fc6d54634a
commit
1bfc7e9395
@ -65,7 +65,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,21 +71,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-bdcc8ffc24",
|
||||
@ -102,7 +87,24 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,21 +71,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-bdcc8ffc24",
|
||||
@ -102,7 +87,24 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,21 +71,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/github/advisory-review/pull/14604",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/github/advisory-review/pull/14604"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-bdcc8ffc24",
|
||||
@ -102,7 +87,24 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
"url": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/github/advisory-review/pull/14604",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/github/advisory-review/pull/14604"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"name": "https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes",
|
||||
"refsource": "MISC",
|
||||
@ -85,9 +90,6 @@
|
||||
"name": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,7 +128,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -600,7 +600,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202105-34",
|
||||
"url": "https://security.gentoo.org/glsa/202105-34"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.youtube.com/watch?v=-wGtxJ8opa8",
|
||||
@ -71,19 +86,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200430-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200430-0003/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202105-34",
|
||||
"url": "https://security.gentoo.org/glsa/202105-34"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -103,7 +103,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -83,7 +83,9 @@
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -72,11 +72,6 @@
|
||||
"name": "FEDORA-2021-6e581c051a",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210205-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210205-0004/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
@ -128,7 +123,14 @@
|
||||
"url": "https://security.gentoo.org/glsa/202107-07"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210205-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210205-0004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -97,7 +97,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -92,7 +92,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -92,7 +92,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -3,7 +3,7 @@
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "security_alert@emc.com",
|
||||
"ASSIGNER": "secure@dell.com",
|
||||
"DATE_PUBLIC": "2019-04-17T00:00:00.000Z",
|
||||
"ID": "CVE-2019-3799",
|
||||
"STATE": "PUBLIC",
|
||||
@ -69,13 +69,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://pivotal.io/security/cve-2019-3799",
|
||||
"name": "https://pivotal.io/security/cve-2019-3799"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,31 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "107160",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107160"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-04",
|
||||
"url": "https://security.gentoo.org/glsa/202006-04"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4416-1",
|
||||
"url": "https://usn.ubuntu.com/4416-1/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +87,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190315-0002/"
|
||||
},
|
||||
{
|
||||
"name": "107160",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/107160"
|
||||
},
|
||||
{
|
||||
"name": "https://sourceware.org/bugzilla/show_bug.cgi?id=24114",
|
||||
"refsource": "MISC",
|
||||
@ -82,28 +102,10 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10278"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K54823184",
|
||||
"url": "https://support.f5.com/csp/article/K54823184"
|
||||
},
|
||||
{
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202006-04",
|
||||
"url": "https://security.gentoo.org/glsa/202006-04"
|
||||
},
|
||||
{
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4416-1",
|
||||
"url": "https://usn.ubuntu.com/4416-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -138,7 +138,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,7 +118,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -44,11 +44,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693",
|
||||
"refsource": "CONFIRM"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219",
|
||||
@ -65,7 +60,14 @@
|
||||
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693",
|
||||
"refsource": "CONFIRM"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -123,7 +123,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -270,7 +270,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -380,7 +380,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -130,7 +130,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -273,7 +273,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -115,7 +115,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -151,7 +151,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -108,7 +108,9 @@
|
||||
"url": "https://support.apple.com/kb/HT211289"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -128,7 +128,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -158,7 +158,9 @@
|
||||
"url": "https://support.apple.com/kb/HT211935"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,7 +55,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/202012-10"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -125,7 +125,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -181,7 +181,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -139,7 +139,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -349,13 +349,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220210-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220210-0002/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -62,16 +62,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.pcre.org/original/changelog.txt"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/",
|
||||
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT211931",
|
||||
"url": "https://support.apple.com/kb/HT211931"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
|
||||
@ -79,8 +69,8 @@
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212147",
|
||||
"url": "https://support.apple.com/kb/HT212147"
|
||||
"name": "https://support.apple.com/kb/HT211931",
|
||||
"url": "https://support.apple.com/kb/HT211931"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
@ -93,7 +83,19 @@
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT212147",
|
||||
"url": "https://support.apple.com/kb/HT212147"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/",
|
||||
"url": "https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,7 +55,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -260,7 +260,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -152,13 +152,15 @@
|
||||
"name": "https://support.apple.com/kb/HT212147",
|
||||
"url": "https://support.apple.com/kb/HT212147"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,13 +77,15 @@
|
||||
"name": "openSUSE-SU-2020:1459",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"url": "https://security.gentoo.org/glsa/202011-05"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -104,7 +104,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -190,7 +190,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -95,7 +95,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/04/12/6"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -108,7 +108,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -185,13 +185,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,7 +98,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,7 +98,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -153,7 +153,9 @@
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -75,7 +75,9 @@
|
||||
"url": "https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -85,7 +85,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -390,7 +390,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -50,7 +50,9 @@
|
||||
"url": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -140,7 +140,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -634,7 +634,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -78,7 +78,9 @@
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210401-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -173,7 +173,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,7 +118,9 @@
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -89,7 +89,9 @@
|
||||
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-28895"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,18 +57,20 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/p11-glue/p11-kit/releases"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x",
|
||||
"url": "https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4822",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4822"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x",
|
||||
"url": "https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -78,7 +78,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,7 +63,9 @@
|
||||
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-35198"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,7 +98,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,7 +93,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,7 +66,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,7 +66,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,7 +66,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,7 +66,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,7 +66,9 @@
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -95,7 +95,9 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,13 +54,15 @@
|
||||
"name": "https://hackerone.com/reports/1431042",
|
||||
"url": "https://hackerone.com/reports/1431042"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220325-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220325-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,11 +79,6 @@
|
||||
"name": "[oss-security] 20220314 CVE-2022-22719: Apache HTTP Server: mod_lua Use of uninitialized value of in r:parsebody",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/03/14/4"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-b4103753e9",
|
||||
@ -105,7 +100,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,11 +79,6 @@
|
||||
"name": "[oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/03/14/3"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-b4103753e9",
|
||||
@ -105,7 +100,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -79,11 +79,6 @@
|
||||
"name": "[oss-security] 20220314 CVE-2022-22721: Apache HTTP Server: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/03/14/2"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-b4103753e9",
|
||||
@ -105,7 +100,14 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -49,13 +49,15 @@
|
||||
"name": "https://tanzu.vmware.com/security/cve-2022-22947",
|
||||
"url": "https://tanzu.vmware.com/security/cve-2022-22947"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,13 +54,15 @@
|
||||
"name": "20220401 Vulnerability in Spring Cloud Function Framework Affecting Cisco Products: March 2022",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005",
|
||||
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -54,6 +54,11 @@
|
||||
"name": "20220401 Vulnerability in Spring Framework Affecting Cisco Products: March 2022",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005",
|
||||
@ -68,9 +73,6 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,13 +83,15 @@
|
||||
"url": "https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9",
|
||||
"name": "https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0010/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0010/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,26 +57,11 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/h2database/h2database/security/advisories"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/h2database/h2database/releases/tag/version-2.1.210",
|
||||
"url": "https://github.com/h2database/h2database/releases/tag/version-2.1.210"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/d0nkey_man/status/1483824727936450564",
|
||||
"url": "https://twitter.com/d0nkey_man/status/1483824727936450564"
|
||||
},
|
||||
{
|
||||
"refsource": "FULLDISC",
|
||||
"name": "20220124 Unauthenticated RCE vuln in the H2 Database console: CVE-2022-23221.",
|
||||
"url": "http://seclists.org/fulldisclosure/2022/Jan/39"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220215 [SECURITY] [DLA 2923-1] h2database security update",
|
||||
@ -88,7 +73,24 @@
|
||||
"url": "https://www.debian.org/security/2022/dsa-5076"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://github.com/h2database/h2database/releases/tag/version-2.1.210",
|
||||
"url": "https://github.com/h2database/h2database/releases/tag/version-2.1.210"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://twitter.com/d0nkey_man/status/1483824727936450564",
|
||||
"url": "https://twitter.com/d0nkey_man/status/1483824727936450564"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,13 +87,15 @@
|
||||
"name": "[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/3"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -87,13 +87,15 @@
|
||||
"name": "[oss-security] 20220118 CVE-2022-23305: SQL injection in JDBC Appender in Apache Log4j V1",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/01/18/4"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,7 +83,9 @@
|
||||
"name": "https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -80,7 +80,9 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/01/24/3"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,28 +57,30 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/libexpat/libexpat/pull/550"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-05",
|
||||
"url": "https://www.tenable.com/security/tns-2022-05"
|
||||
},
|
||||
{
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-5073",
|
||||
"url": "https://www.debian.org/security/2022/dsa-5073"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-05",
|
||||
"url": "https://www.tenable.com/security/tns-2022-05"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220217-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220217-0001/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,11 +87,6 @@
|
||||
"name": "[oss-security] 20220314 CVE-2022-23943: Apache HTTP Server: mod_sed: Read/write beyond bounds",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/03/14/1"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-b4103753e9",
|
||||
@ -112,13 +107,20 @@
|
||||
"name": "FEDORA-2022-78e3211c55",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-08",
|
||||
"url": "https://www.tenable.com/security/tns-2022-08"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220321-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220321-0001/"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/libexpat/libexpat/pull/551"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-05",
|
||||
"url": "https://www.tenable.com/security/tns-2022-05"
|
||||
},
|
||||
{
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2022-d2abd0858e",
|
||||
@ -78,7 +73,14 @@
|
||||
"url": "https://www.debian.org/security/2022/dsa-5073"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2022-05",
|
||||
"url": "https://www.tenable.com/security/tns-2022-05"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,13 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.jetbrains.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/",
|
||||
"url": "https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,18 +77,20 @@
|
||||
"name": "FEDORA-2022-3d9d67f558",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,18 +77,20 @@
|
||||
"name": "FEDORA-2022-3d9d67f558",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,18 +77,20 @@
|
||||
"name": "FEDORA-2022-3d9d67f558",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,13 +77,15 @@
|
||||
"name": "FEDORA-2022-3d9d67f558",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -77,18 +77,20 @@
|
||||
"name": "FEDORA-2022-3d9d67f558",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
},
|
||||
{
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220303-0008/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220303-0008/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user