"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-14 18:01:21 +00:00
parent 28cb177a54
commit 2ae6322bfc
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
100 changed files with 694 additions and 495 deletions

View File

@ -55,7 +55,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -65,7 +65,9 @@
"url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2020/05/04/2",
"url": "http://www.openwall.com/lists/oss-security/2020/05/04/2"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update",
@ -122,13 +112,25 @@
"name": "USN-4391-1",
"url": "https://usn.ubuntu.com/4391-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2020/05/04/2",
"url": "http://www.openwall.com/lists/oss-security/2020/05/04/2"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html",
"url": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -108,7 +108,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -52,16 +52,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://lkml.org/lkml/2020/4/26/87",
"url": "https://lkml.org/lkml/2020/4/26/87"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1062",
@ -113,7 +103,19 @@
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"refsource": "CONFIRM",
"name": "https://lkml.org/lkml/2020/4/26/87",
"url": "https://lkml.org/lkml/2020/4/26/87"
}
]
}

View File

@ -102,6 +102,26 @@
"name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/19"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/20"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/22"
},
{
"refsource": "FULLDISC",
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211843",
@ -122,38 +142,20 @@
"name": "https://support.apple.com/kb/HT211931",
"url": "https://support.apple.com/kb/HT211931"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211952",
"url": "https://support.apple.com/kb/HT211952"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/19"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/20"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/22"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211935",
"url": "https://support.apple.com/kb/HT211935"
},
{
"refsource": "FULLDISC",
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -87,6 +87,26 @@
"name": "FreeBSD-SA-20:22",
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/19"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/20"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/22"
},
{
"refsource": "FULLDISC",
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211843",
@ -107,38 +127,20 @@
"name": "https://support.apple.com/kb/HT211931",
"url": "https://support.apple.com/kb/HT211931"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211952",
"url": "https://support.apple.com/kb/HT211952"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/19"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/20"
},
{
"refsource": "FULLDISC",
"name": "20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0",
"url": "http://seclists.org/fulldisclosure/2020/Nov/22"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT211935",
"url": "https://support.apple.com/kb/HT211935"
},
{
"refsource": "FULLDISC",
"name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1",
"url": "http://seclists.org/fulldisclosure/2020/Dec/32"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -93,7 +93,9 @@
"url": "https://security.netapp.com/advisory/ntap-20200619-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -95,7 +95,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -105,7 +105,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -54,11 +54,6 @@
"name": "[debian-lts-announce] 20201014 [SECURITY] [DLA 2407-1] tomcat8 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201016-0007/",
"url": "https://security.netapp.com/advisory/ntap-20201016-0007/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1799",
@ -75,7 +70,14 @@
"url": "https://www.debian.org/security/2021/dsa-4835"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201016-0007/",
"url": "https://security.netapp.com/advisory/ntap-20201016-0007/"
}
]
},

View File

@ -65,7 +65,9 @@
"url": "https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -113,18 +113,20 @@
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0010/"
},
{
"refsource": "MLIST",
"name": "[syncope-dev] 20210526 [GitHub] [syncope] coheigea opened a new pull request #268: Disable CXF Services Listing",
"url": "https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0010/"
}
]
},

View File

@ -225,7 +225,9 @@
"url": "https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!forum/golang-announce"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w",
"url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1087",
@ -72,11 +67,6 @@
"name": "openSUSE-SU-2020:1095",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00082.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200731-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200731-0005/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1405",
@ -88,7 +78,19 @@
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w",
"url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200731-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200731-0005/"
}
]
}

View File

@ -83,7 +83,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -83,7 +83,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -83,7 +83,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -78,7 +78,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -137,18 +137,20 @@
"name": "https://support.apple.com/kb/HT211931",
"url": "https://support.apple.com/kb/HT211931"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212147",
"url": "https://support.apple.com/kb/HT212147"
},
{
"refsource": "FULLDISC",
"name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/Feb/14"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212147",
"url": "https://support.apple.com/kb/HT212147"
}
]
}

View File

@ -52,21 +52,6 @@
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g",
"url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w",
"url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w"
},
{
"refsource": "CONFIRM",
"name": "https://www.cloudfoundry.org/blog/cve-2020-15586/",
"url": "https://www.cloudfoundry.org/blog/cve-2020-15586/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1087",
@ -87,11 +72,6 @@
"name": "FEDORA-2020-9cd1204ba0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIRVUHD7TJIT7JJ33FKHIVTHPYABYPHR/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200731-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200731-0005/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1405",
@ -118,7 +98,29 @@
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w",
"url": "https://groups.google.com/forum/#!topic/golang-announce/XZNfaiwgt2w"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200731-0005/",
"url": "https://security.netapp.com/advisory/ntap-20200731-0005/"
},
{
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g",
"url": "https://groups.google.com/forum/#!topic/golang-announce/f2c5bqrGH_g"
},
{
"refsource": "CONFIRM",
"name": "https://www.cloudfoundry.org/blog/cve-2020-15586/",
"url": "https://www.cloudfoundry.org/blog/cve-2020-15586/"
}
]
}

View File

@ -72,11 +72,6 @@
"name": "FEDORA-2020-8d634e31c0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200814-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200814-0004/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-2cd6393548",
@ -112,6 +107,16 @@
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200814-0004/",
"url": "https://security.netapp.com/advisory/ntap-20200814-0004/"
},
{
"refsource": "MISC",
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638",
@ -121,9 +126,6 @@
"refsource": "MISC",
"name": "https://arxiv.org/pdf/2012.07432.pdf",
"url": "https://arxiv.org/pdf/2012.07432.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -57,11 +57,6 @@
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1178",
@ -102,11 +97,6 @@
"name": "openSUSE-SU-2020:1407",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200924-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2459-1] golang-1.7 security update",
@ -123,7 +113,19 @@
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo",
"url": "https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200924-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200924-0002/"
}
]
}

View File

@ -84,7 +84,9 @@
"url": "https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -124,11 +124,6 @@
"name": "[tomee-commits] 20201207 [jira] [Assigned] (TOMEE-2936) TomEE plus(7.0.9) is affected by CVE-2020-17527(BDSA-2020-3628) vulnerability.",
"url": "https://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784@%3Ccommits.tomee.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201210-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201210-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201216 [SECURITY] [DLA 2495-1] tomcat8 security update",
@ -175,7 +170,14 @@
"url": "https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201210-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201210-0003/"
}
]
},

View File

@ -70,7 +70,9 @@
"url": "https://security.netapp.com/advisory/ntap-20210115-0005/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -177,11 +177,6 @@
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html",
"url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"
},
{
"refsource": "CERT-VN",
"name": "VU#490028",
@ -197,11 +192,6 @@
"name": "USN-4510-1",
"url": "https://usn.ubuntu.com/4510-1/"
},
{
"refsource": "CONFIRM",
"name": "https://www.synology.com/security/advisory/Synology_SA_20_21",
"url": "https://www.synology.com/security/advisory/Synology_SA_20_21"
},
{
"refsource": "UBUNTU",
"name": "USN-4510-2",
@ -237,11 +227,6 @@
"name": "USN-4559-1",
"url": "https://usn.ubuntu.com/4559-1/"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update",
@ -253,7 +238,24 @@
"url": "https://security.gentoo.org/glsa/202012-24"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html",
"url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.synology.com/security/advisory/Synology_SA_20_21",
"url": "https://www.synology.com/security/advisory/Synology_SA_20_21"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html",
"url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"
}
]
}

View File

@ -165,7 +165,9 @@
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -75,7 +75,9 @@
"url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -280,7 +280,9 @@
"url": "https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -207,13 +207,15 @@
"name": "https://www.tenable.com/security/tns-2020-11",
"url": "https://www.tenable.com/security/tns-2020-11"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -93,7 +93,9 @@
"url": "https://security.netapp.com/advisory/ntap-20200911-0004/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -150,6 +150,16 @@
"name": "[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.",
"url": "https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-09",
@ -159,14 +169,6 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -77,11 +77,6 @@
"name": "openSUSE-SU-2020:1325",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200904-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200904-0003/"
},
{
"refsource": "UBUNTU",
"name": "USN-4483-1",
@ -93,7 +88,14 @@
"url": "https://usn.ubuntu.com/4485-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200904-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200904-0003/"
}
]
}

View File

@ -57,6 +57,26 @@
"name": "20200902 [RT-SA-2020-004] Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to Cross-Site Scripting",
"url": "http://seclists.org/fulldisclosure/2020/Sep/5"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-741cfa13d0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1584",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1587",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs",
@ -76,24 +96,6 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200924-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200924-0003/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-741cfa13d0",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1584",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1587",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -78,7 +78,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -78,7 +78,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -124,11 +124,6 @@
"name": "[kafka-jira] 20201215 [GitHub] [kafka] ijuma edited a comment on pull request #9702: CVE-2020-25649: bumping jackson to patched version 2.10.5.1",
"url": "https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-issues] 20210105 [jira] [Created] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
@ -199,11 +194,6 @@
"name": "[zookeeper-commits] 20210106 [zookeeper] branch master updated: ZOOKEEPER-4045: CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
"url": "https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210108-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210108-0007/"
},
{
"refsource": "MLIST",
"name": "[zookeeper-issues] 20210116 [jira] [Commented] (ZOOKEEPER-4045) CVE-2020-25649 - Upgrade jackson databind to 2.10.5.1",
@ -335,7 +325,19 @@
"url": "https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210108-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210108-0007/"
}
]
},

View File

@ -109,13 +109,15 @@
"name": "[activemq-issues] 20210104 [jira] [Resolved] (AMQ-8107) Does ActiveMQ use the affected functionality within Xstream libraries for CVE-2020-26217",
"url": "https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210409-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210409-0004/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -83,7 +83,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -75,7 +75,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -78,7 +78,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -83,7 +83,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -65,7 +65,9 @@
"url": "https://security.gentoo.org/glsa/202101-12"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -57,6 +57,11 @@
"refsource": "MISC",
"name": "https://ckeditor.com/ckeditor-4/download/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://ckeditor.com/cke4/release/CKEditor-4.15.1",
@ -66,9 +71,6 @@
"refsource": "CONFIRM",
"name": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/",
"url": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -742,7 +742,9 @@
"url": "https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -168,11 +168,6 @@
"name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
"url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201218-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201218-0003/"
},
{
"refsource": "MLIST",
"name": "[zookeeper-notifications] 20201224 [GitHub] [zookeeper] ztzg closed pull request #1552: ZOOKEEPER-4023: dependency-check:check failing - Jetty 9.4.34.v20201102 - CVE-2020-27218",
@ -548,11 +543,6 @@
"name": "[kafka-jira] 20210222 [GitHub] [kafka] ijuma commented on pull request #10177: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218",
"url": "https://lists.apache.org/thread.html/r391d20ab6ec03d6becc7a9f0c5e0f45a7ad8af6b996ae0a49839f6bd@%3Cjira.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[kafka-jira] 20210222 [GitHub] [kafka] omkreddy closed pull request #10177: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218",
@ -583,21 +573,6 @@
"name": "[kafka-commits] 20210222 [kafka] branch 2.6 updated: KAFKA-12324: Upgrade jetty to fix CVE-2020-27218",
"url": "https://lists.apache.org/thread.html/r66456df852de06a0eed2c0a50252a2c8d360b8a5c005f63c0b1e3d25@%3Ccommits.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[nifi-commits] 20210222 svn commit: r1886814 - /nifi/site/trunk/security.html",
@ -619,7 +594,34 @@
"url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201218-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201218-0003/"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r769e1ba36c607772f7403e7ef2a8ae14d9ddcab4a844f9b28bcf7959@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rc2b603b7fa7f8dbfe0b3b59a6140b4d66868db3bf4b29d69a772d72a@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/ra1c234f045871827f73e4d68326b067e72d3139e109207345fa57d9e@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E"
}
]
}

View File

@ -48,7 +48,6 @@
{
"lang": "eng",
"value": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of \u201cquality\u201d (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values."
}
]
},
@ -368,11 +367,6 @@
"name": "[spark-reviews] 20210316 [GitHub] [spark] xkrogen commented on pull request #31846: [SPARK-34752][BUILD] Bump Jetty to 9.4.37 to address CVE-2020-27223",
"url": "https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210401-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210401-0005/"
},
{
"refsource": "MLIST",
"name": "[solr-issues] 20210407 [jira] [Created] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)",
@ -384,7 +378,14 @@
"url": "https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210401-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210401-0005/"
}
]
}

View File

@ -70,7 +70,9 @@
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -65,7 +65,9 @@
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -65,7 +65,9 @@
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -60,7 +60,9 @@
"url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -70,7 +70,9 @@
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -57,16 +57,6 @@
"refsource": "MISC",
"name": "https://www.bouncycastle.org/releasenotes.html"
},
{
"refsource": "MISC",
"name": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052"
},
{
"refsource": "MISC",
"name": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/",
"url": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/"
},
{
"refsource": "MLIST",
"name": "[druid-commits] 20210107 [GitHub] [druid] jon-wei opened a new pull request #10733: Update deps for CVE-2020-28168 and CVE-2020-28052",
@ -103,7 +93,19 @@
"url": "https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2020-28052"
},
{
"refsource": "MISC",
"name": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/",
"url": "https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd",
"url": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201107 [SECURITY] [DLA 2437-1] krb5 security update",
@ -88,9 +83,9 @@
"url": "https://www.debian.org/security/2020/dsa-4795"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201202-0001/",
"url": "https://security.netapp.com/advisory/ntap-20201202-0001/"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
@ -98,7 +93,14 @@
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"refsource": "CONFIRM",
"name": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd",
"url": "https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201202-0001/",
"url": "https://security.netapp.com/advisory/ntap-20201202-0001/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2986"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2986"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2999"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210129-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210129-0007/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210129-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210129-0007/"
}
]
}

View File

@ -67,18 +67,20 @@
"name": "[spark-issues] 20210115 [jira] [Created] (SPARK-34124) Upgrade jackson version to fix CVE-2020-36179 in Spark 2.4",
"url": "https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/3004"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/3004"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/3004"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/3003"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2998"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2998"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2997"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2997"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2996"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -62,18 +62,20 @@
"refsource": "MISC",
"name": "https://github.com/FasterXML/jackson-databind/issues/2996"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210205-0005/",
"url": "https://security.netapp.com/advisory/ntap-20210205-0005/"
}
]
}

View File

@ -68,7 +68,9 @@
"name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -68,7 +68,9 @@
"name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -244,6 +244,16 @@
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"refsource": "MLIST",
"name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398",
"url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E",
@ -258,14 +268,6 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398",
"url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -95,7 +95,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -80,7 +80,9 @@
"name": "https://tanzu.vmware.com/security/cve-2020-5413"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -164,13 +164,15 @@
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0009/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0009/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -152,7 +152,9 @@
"url": "https://seclists.org/bugtraq/2021/Jan/3"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -152,7 +152,9 @@
"url": "https://seclists.org/bugtraq/2021/Jan/3"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -116,7 +116,9 @@
"url": "https://security.netapp.com/advisory/ntap-20200504-0001/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -111,11 +111,6 @@
"name": "FEDORA-2020-94763cb98b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2J3ZZDHCSX65T5QWV4AHBN7MOJXBEKG/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201016-0001/",
"url": "https://security.netapp.com/advisory/ntap-20201016-0001/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1703",
@ -142,7 +137,14 @@
"url": "https://www.debian.org/security/2021/dsa-4856"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201016-0001/",
"url": "https://security.netapp.com/advisory/ntap-20201016-0001/"
}
]
},

View File

@ -111,7 +111,9 @@
"url": "https://www.debian.org/security/2020/dsa-4789"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -68,7 +68,9 @@
"name": "https://github.com/yargs/y18n/issues/96"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -52,11 +52,26 @@
},
"references": {
"reference_data": [
{
"refsource": "FEDORA",
"name": "FEDORA-2020-12bc5b5597",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/"
},
{
"url": "https://groups.google.com/forum/#!forum/golang-announce",
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!forum/golang-announce"
},
{
"refsource": "DEBIAN",
"name": "DSA-4848",
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA",
@ -71,19 +86,6 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200327-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200327-0001/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2020-12bc5b5597",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4848",
"url": "https://www.debian.org/security/2021/dsa-4848"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -49,6 +49,11 @@
"name": "https://hackerone.com/reports/712065",
"url": "https://hackerone.com/reports/712065"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200724-0006/",
@ -58,9 +63,6 @@
"refsource": "MISC",
"name": "https://github.com/lodash/lodash/issues/4874",
"url": "https://github.com/lodash/lodash/issues/4874"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -90,7 +90,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -74,16 +74,21 @@
"name": "GLSA-202012-14",
"url": "https://security.gentoo.org/glsa/202012-14"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4881",
"url": "https://www.debian.org/security/2021/dsa-4881"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212325",
@ -98,9 +103,6 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -79,16 +79,26 @@
"name": "GLSA-202012-14",
"url": "https://security.gentoo.org/glsa/202012-14"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4881",
"url": "https://www.debian.org/security/2021/dsa-4881"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212325",
@ -103,14 +113,6 @@
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
"url": "http://seclists.org/fulldisclosure/2021/Apr/51"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -74,31 +74,11 @@
"name": "GLSA-202012-14",
"url": "https://security.gentoo.org/glsa/202012-14"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4881",
"url": "https://www.debian.org/security/2021/dsa-4881"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212325",
"url": "https://support.apple.com/kb/HT212325"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212326",
"url": "https://support.apple.com/kb/HT212326"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "FULLDISC",
"name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina",
@ -114,13 +94,35 @@
"name": "20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave",
"url": "http://seclists.org/fulldisclosure/2021/Apr/54"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210122-0007/",
"url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212325",
"url": "https://support.apple.com/kb/HT212325"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212326",
"url": "https://support.apple.com/kb/HT212326"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT212327",
"url": "https://support.apple.com/kb/HT212327"
},
{
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -148,7 +148,9 @@
"url": "https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -83,7 +83,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -98,7 +98,9 @@
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -70,7 +70,9 @@
"url": "https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -210,7 +210,9 @@
"url": "https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -260,7 +260,9 @@
"url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -60,7 +60,9 @@
"url": "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -59,13 +59,15 @@
"name": "GLSA-202103-04",
"url": "https://security.gentoo.org/glsa/202103-04"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210423-0010/",
"url": "https://security.netapp.com/advisory/ntap-20210423-0010/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -147,11 +147,6 @@
"name": "[kafka-jira] 20210302 [GitHub] [kafka] dongjinleekr commented on pull request #10235: KAFKA-12389: Upgrade of netty-codec due to CVE-2021-21290",
"url": "https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache.org%3E"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E"
},
{
"refsource": "MLIST",
"name": "[zookeeper-issues] 20210311 [jira] [Created] (ZOOKEEPER-4242) Upgrade Netty library to > 4.1.59 due to security vulnerability",
@ -238,7 +233,14 @@
"url": "https://www.debian.org/security/2021/dsa-4885"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r0053443ce19ff125981559f8c51cf66e3ab4350f47812b8cf0733a05@%3Cdev.kafka.apache.org%3E"
}
]
},

View File

@ -112,13 +112,15 @@
"name": "[activemq-users] 20210427 Release date for ActiveMQ v5.16.2 to fix CVEs",
"url": "https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210430-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210430-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -49,18 +49,20 @@
"name": "[oss-security] 20210219 Vulnerability in Jenkins",
"url": "http://www.openwall.com/lists/oss-security/2021/02/19/7"
},
{
"refsource": "MISC",
"name": "https://tanzu.vmware.com/security/cve-2021-22112",
"url": "https://tanzu.vmware.com/security/cve-2021-22112"
},
{
"refsource": "MLIST",
"name": "[nifi-issues] 20210510 [GitHub] [nifi] exceptionfactory opened a new pull request #5066: NIFI-8502 Upgrade Spring Framework to 5.3.6",
"url": "https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"refsource": "MISC",
"name": "https://tanzu.vmware.com/security/cve-2021-22112",
"url": "https://tanzu.vmware.com/security/cve-2021-22112"
}
]
},

View File

@ -70,7 +70,9 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},