From afc4b1c1ac11a58adcb058b9df68ecaf6486b1fb Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Fri, 11 Jun 2021 10:44:45 -0700 Subject: [PATCH] Bill Situ On branch cna/Oracle/CPU2021Apr3rdv2 Changes to be committed: modified: 2014/9xxx/CVE-2014-9515.json modified: 2016/2xxx/CVE-2016-2542.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2016/9xxx/CVE-2016-9775.json modified: 2017/1000xxx/CVE-2017-1000061.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/18xxx/CVE-2017-18640.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000632.json modified: 2018/14xxx/CVE-2018-14040.json modified: 2018/14xxx/CVE-2018-14041.json modified: 2018/14xxx/CVE-2018-14042.json modified: 2018/14xxx/CVE-2018-14550.json modified: 2018/14xxx/CVE-2018-14613.json modified: 2018/16xxx/CVE-2018-16884.json modified: 2018/1xxx/CVE-2018-1285.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2019/0xxx/CVE-2019-0219.json modified: 2019/0xxx/CVE-2019-0221.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/0xxx/CVE-2019-0228.json modified: 2019/0xxx/CVE-2019-0230.json modified: 2019/0xxx/CVE-2019-0232.json modified: 2019/0xxx/CVE-2019-0233.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10080.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10098.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10638.json modified: 2019/10xxx/CVE-2019-10639.json modified: 2019/11xxx/CVE-2019-11048.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/11xxx/CVE-2019-11487.json modified: 2019/11xxx/CVE-2019-11599.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12399.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12406.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14898.json modified: 2019/15xxx/CVE-2019-15218.json modified: 2019/16xxx/CVE-2019-16746.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/17xxx/CVE-2019-17075.json modified: 2019/17xxx/CVE-2019-17133.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/17xxx/CVE-2019-17573.json modified: 2019/17xxx/CVE-2019-17632.json modified: 2019/17xxx/CVE-2019-17638.json modified: 2019/18xxx/CVE-2019-18885.json modified: 2019/19xxx/CVE-2019-19052.json modified: 2019/19xxx/CVE-2019-19063.json modified: 2019/19xxx/CVE-2019-19066.json modified: 2019/19xxx/CVE-2019-19073.json modified: 2019/19xxx/CVE-2019-19074.json modified: 2019/19xxx/CVE-2019-19078.json modified: 2019/19xxx/CVE-2019-19535.json modified: 2019/19xxx/CVE-2019-19922.json modified: 2019/1xxx/CVE-2019-1241.json modified: 2019/1xxx/CVE-2019-1551.json modified: 2019/20xxx/CVE-2019-20812.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/3xxx/CVE-2019-3773.json modified: 2019/3xxx/CVE-2019-3874.json modified: 2019/3xxx/CVE-2019-3900.json modified: 2019/5xxx/CVE-2019-5063.json modified: 2019/5xxx/CVE-2019-5064.json modified: 2019/5xxx/CVE-2019-5108.json modified: 2019/7xxx/CVE-2019-7317.json modified: 2019/8xxx/CVE-2019-8331.json modified: 2020/10xxx/CVE-2020-10188.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10751.json modified: 2020/10xxx/CVE-2020-10769.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11612.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/11xxx/CVE-2020-11987.json modified: 2020/11xxx/CVE-2020-11994.json modified: 2020/11xxx/CVE-2020-11998.json modified: 2020/12xxx/CVE-2020-12114.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/12xxx/CVE-2020-12771.json modified: 2020/13xxx/CVE-2020-13434.json modified: 2020/13xxx/CVE-2020-13435.json modified: 2020/13xxx/CVE-2020-13871.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13943.json modified: 2020/13xxx/CVE-2020-13947.json modified: 2020/13xxx/CVE-2020-13954.json modified: 2020/13xxx/CVE-2020-13956.json modified: 2020/14xxx/CVE-2020-14039.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/15xxx/CVE-2020-15586.json modified: 2020/16xxx/CVE-2020-16166.json modified: 2020/16xxx/CVE-2020-16845.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17527.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1472.json modified: 2020/1xxx/CVE-2020-1927.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/1xxx/CVE-2020-1968.json modified: 2020/1xxx/CVE-2020-1971.json modified: 2020/24xxx/CVE-2020-24394.json modified: 2020/24xxx/CVE-2020-24553.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/25xxx/CVE-2020-25649.json modified: 2020/26xxx/CVE-2020-26217.json modified: 2020/26xxx/CVE-2020-26418.json modified: 2020/26xxx/CVE-2020-26419.json modified: 2020/26xxx/CVE-2020-26420.json modified: 2020/26xxx/CVE-2020-26421.json modified: 2020/26xxx/CVE-2020-26422.json modified: 2020/27xxx/CVE-2020-27193.json modified: 2020/27xxx/CVE-2020-27216.json modified: 2020/27xxx/CVE-2020-27218.json modified: 2020/27xxx/CVE-2020-27223.json modified: 2020/27xxx/CVE-2020-27841.json modified: 2020/27xxx/CVE-2020-27842.json modified: 2020/27xxx/CVE-2020-27843.json modified: 2020/27xxx/CVE-2020-27844.json modified: 2020/27xxx/CVE-2020-27845.json modified: 2020/28xxx/CVE-2020-28052.json modified: 2020/28xxx/CVE-2020-28196.json modified: 2020/35xxx/CVE-2020-35490.json modified: 2020/35xxx/CVE-2020-35491.json modified: 2020/35xxx/CVE-2020-35728.json modified: 2020/36xxx/CVE-2020-36179.json modified: 2020/36xxx/CVE-2020-36180.json modified: 2020/36xxx/CVE-2020-36181.json modified: 2020/36xxx/CVE-2020-36182.json modified: 2020/36xxx/CVE-2020-36183.json modified: 2020/36xxx/CVE-2020-36184.json modified: 2020/36xxx/CVE-2020-36185.json modified: 2020/36xxx/CVE-2020-36186.json modified: 2020/36xxx/CVE-2020-36187.json modified: 2020/36xxx/CVE-2020-36188.json modified: 2020/36xxx/CVE-2020-36189.json modified: 2020/5xxx/CVE-2020-5359.json modified: 2020/5xxx/CVE-2020-5360.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/5xxx/CVE-2020-5413.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/7xxx/CVE-2020-7059.json modified: 2020/7xxx/CVE-2020-7060.json modified: 2020/7xxx/CVE-2020-7067.json modified: 2020/7xxx/CVE-2020-7069.json modified: 2020/7xxx/CVE-2020-7760.json modified: 2020/7xxx/CVE-2020-7774.json modified: 2020/7xxx/CVE-2020-7919.json modified: 2020/8xxx/CVE-2020-8203.json modified: 2020/8xxx/CVE-2020-8277.json modified: 2020/8xxx/CVE-2020-8284.json modified: 2020/8xxx/CVE-2020-8285.json modified: 2020/8xxx/CVE-2020-8286.json modified: 2020/8xxx/CVE-2020-8908.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9480.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9489.json modified: 2021/20xxx/CVE-2021-20227.json modified: 2021/21xxx/CVE-2021-21290.json modified: 2021/21xxx/CVE-2021-21345.json modified: 2021/22xxx/CVE-2021-22112.json modified: 2021/22xxx/CVE-2021-22173.json modified: 2021/22xxx/CVE-2021-22174.json modified: 2021/22xxx/CVE-2021-22191.json modified: 2021/22xxx/CVE-2021-22883.json modified: 2021/22xxx/CVE-2021-22884.json modified: 2021/23xxx/CVE-2021-23336.json modified: 2021/23xxx/CVE-2021-23839.json modified: 2021/23xxx/CVE-2021-23840.json modified: 2021/23xxx/CVE-2021-23841.json modified: 2021/26xxx/CVE-2021-26117.json modified: 2021/3xxx/CVE-2021-3449.json modified: 2021/3xxx/CVE-2021-3450.json --- 2014/9xxx/CVE-2014-9515.json | 3 +++ 2016/2xxx/CVE-2016-2542.json | 3 +++ 2016/5xxx/CVE-2016-5725.json | 3 +++ 2016/7xxx/CVE-2016-7103.json | 3 +++ 2016/9xxx/CVE-2016-9775.json | 3 +++ 2017/1000xxx/CVE-2017-1000061.json | 3 +++ 2017/12xxx/CVE-2017-12626.json | 3 +++ 2017/14xxx/CVE-2017-14735.json | 3 +++ 2017/18xxx/CVE-2017-18640.json | 3 +++ 2017/5xxx/CVE-2017-5645.json | 3 +++ 2018/1000xxx/CVE-2018-1000180.json | 3 +++ 2018/1000xxx/CVE-2018-1000613.json | 3 +++ 2018/1000xxx/CVE-2018-1000632.json | 3 +++ 2018/14xxx/CVE-2018-14040.json | 3 +++ 2018/14xxx/CVE-2018-14041.json | 3 +++ 2018/14xxx/CVE-2018-14042.json | 3 +++ 2018/14xxx/CVE-2018-14550.json | 3 +++ 2018/14xxx/CVE-2018-14613.json | 3 +++ 2018/16xxx/CVE-2018-16884.json | 3 +++ 2018/1xxx/CVE-2018-1285.json | 3 +++ 2018/20xxx/CVE-2018-20843.json | 3 +++ 2018/8xxx/CVE-2018-8032.json | 3 +++ 2019/0xxx/CVE-2019-0219.json | 3 +++ 2019/0xxx/CVE-2019-0221.json | 3 +++ 2019/0xxx/CVE-2019-0227.json | 3 +++ 2019/0xxx/CVE-2019-0228.json | 3 +++ 2019/0xxx/CVE-2019-0230.json | 3 +++ 2019/0xxx/CVE-2019-0232.json | 3 +++ 2019/0xxx/CVE-2019-0233.json | 3 +++ 2019/10xxx/CVE-2019-10072.json | 3 +++ 2019/10xxx/CVE-2019-10080.json | 3 +++ 2019/10xxx/CVE-2019-10086.json | 3 +++ 2019/10xxx/CVE-2019-10098.json | 3 +++ 2019/10xxx/CVE-2019-10173.json | 3 +++ 2019/10xxx/CVE-2019-10246.json | 3 +++ 2019/10xxx/CVE-2019-10247.json | 3 +++ 2019/10xxx/CVE-2019-10638.json | 3 +++ 2019/10xxx/CVE-2019-10639.json | 3 +++ 2019/11xxx/CVE-2019-11048.json | 3 +++ 2019/11xxx/CVE-2019-11358.json | 3 +++ 2019/11xxx/CVE-2019-11487.json | 3 +++ 2019/11xxx/CVE-2019-11599.json | 3 +++ 2019/12xxx/CVE-2019-12086.json | 3 +++ 2019/12xxx/CVE-2019-12399.json | 3 +++ 2019/12xxx/CVE-2019-12402.json | 3 +++ 2019/12xxx/CVE-2019-12406.json | 3 +++ 2019/12xxx/CVE-2019-12415.json | 3 +++ 2019/12xxx/CVE-2019-12419.json | 3 +++ 2019/12xxx/CVE-2019-12423.json | 3 +++ 2019/14xxx/CVE-2019-14379.json | 3 +++ 2019/14xxx/CVE-2019-14898.json | 3 +++ 2019/15xxx/CVE-2019-15218.json | 3 +++ 2019/16xxx/CVE-2019-16746.json | 3 +++ 2019/16xxx/CVE-2019-16942.json | 3 +++ 2019/17xxx/CVE-2019-17075.json | 3 +++ 2019/17xxx/CVE-2019-17133.json | 3 +++ 2019/17xxx/CVE-2019-17195.json | 3 +++ 2019/17xxx/CVE-2019-17495.json | 3 +++ 2019/17xxx/CVE-2019-17566.json | 3 +++ 2019/17xxx/CVE-2019-17571.json | 3 +++ 2019/17xxx/CVE-2019-17573.json | 3 +++ 2019/17xxx/CVE-2019-17632.json | 3 +++ 2019/17xxx/CVE-2019-17638.json | 3 +++ 2019/18xxx/CVE-2019-18885.json | 3 +++ 2019/19xxx/CVE-2019-19052.json | 3 +++ 2019/19xxx/CVE-2019-19063.json | 3 +++ 2019/19xxx/CVE-2019-19066.json | 3 +++ 2019/19xxx/CVE-2019-19073.json | 3 +++ 2019/19xxx/CVE-2019-19074.json | 3 +++ 2019/19xxx/CVE-2019-19078.json | 3 +++ 2019/19xxx/CVE-2019-19535.json | 3 +++ 2019/19xxx/CVE-2019-19922.json | 3 +++ 2019/1xxx/CVE-2019-1241.json | 3 +++ 2019/1xxx/CVE-2019-1551.json | 3 +++ 2019/20xxx/CVE-2019-20812.json | 3 +++ 2019/3xxx/CVE-2019-3738.json | 3 +++ 2019/3xxx/CVE-2019-3739.json | 3 +++ 2019/3xxx/CVE-2019-3740.json | 3 +++ 2019/3xxx/CVE-2019-3773.json | 3 +++ 2019/3xxx/CVE-2019-3874.json | 3 +++ 2019/3xxx/CVE-2019-3900.json | 3 +++ 2019/5xxx/CVE-2019-5063.json | 3 +++ 2019/5xxx/CVE-2019-5064.json | 3 +++ 2019/5xxx/CVE-2019-5108.json | 3 +++ 2019/7xxx/CVE-2019-7317.json | 3 +++ 2019/8xxx/CVE-2019-8331.json | 3 +++ 2020/10xxx/CVE-2020-10188.json | 3 +++ 2020/10xxx/CVE-2020-10543.json | 3 +++ 2020/10xxx/CVE-2020-10683.json | 3 +++ 2020/10xxx/CVE-2020-10751.json | 3 +++ 2020/10xxx/CVE-2020-10769.json | 3 +++ 2020/10xxx/CVE-2020-10878.json | 3 +++ 2020/11xxx/CVE-2020-11022.json | 3 +++ 2020/11xxx/CVE-2020-11023.json | 3 +++ 2020/11xxx/CVE-2020-11612.json | 3 +++ 2020/11xxx/CVE-2020-11655.json | 3 +++ 2020/11xxx/CVE-2020-11656.json | 3 +++ 2020/11xxx/CVE-2020-11973.json | 3 +++ 2020/11xxx/CVE-2020-11979.json | 3 +++ 2020/11xxx/CVE-2020-11987.json | 3 +++ 2020/11xxx/CVE-2020-11994.json | 3 +++ 2020/11xxx/CVE-2020-11998.json | 3 +++ 2020/12xxx/CVE-2020-12114.json | 3 +++ 2020/12xxx/CVE-2020-12723.json | 3 +++ 2020/12xxx/CVE-2020-12771.json | 3 +++ 2020/13xxx/CVE-2020-13434.json | 3 +++ 2020/13xxx/CVE-2020-13435.json | 3 +++ 2020/13xxx/CVE-2020-13871.json | 3 +++ 2020/13xxx/CVE-2020-13934.json | 3 +++ 2020/13xxx/CVE-2020-13935.json | 3 +++ 2020/13xxx/CVE-2020-13943.json | 3 +++ 2020/13xxx/CVE-2020-13947.json | 3 +++ 2020/13xxx/CVE-2020-13954.json | 3 +++ 2020/13xxx/CVE-2020-13956.json | 3 +++ 2020/14xxx/CVE-2020-14039.json | 3 +++ 2020/14xxx/CVE-2020-14060.json | 3 +++ 2020/14xxx/CVE-2020-14061.json | 3 +++ 2020/14xxx/CVE-2020-14062.json | 3 +++ 2020/14xxx/CVE-2020-14195.json | 3 +++ 2020/15xxx/CVE-2020-15358.json | 3 +++ 2020/15xxx/CVE-2020-15586.json | 3 +++ 2020/16xxx/CVE-2020-16166.json | 3 +++ 2020/16xxx/CVE-2020-16845.json | 3 +++ 2020/17xxx/CVE-2020-17521.json | 3 +++ 2020/17xxx/CVE-2020-17527.json | 3 +++ 2020/17xxx/CVE-2020-17530.json | 3 +++ 2020/1xxx/CVE-2020-1472.json | 3 +++ 2020/1xxx/CVE-2020-1927.json | 3 +++ 2020/1xxx/CVE-2020-1941.json | 3 +++ 2020/1xxx/CVE-2020-1945.json | 3 +++ 2020/1xxx/CVE-2020-1967.json | 3 +++ 2020/1xxx/CVE-2020-1968.json | 3 +++ 2020/1xxx/CVE-2020-1971.json | 3 +++ 2020/24xxx/CVE-2020-24394.json | 3 +++ 2020/24xxx/CVE-2020-24553.json | 3 +++ 2020/24xxx/CVE-2020-24616.json | 3 +++ 2020/24xxx/CVE-2020-24750.json | 3 +++ 2020/25xxx/CVE-2020-25649.json | 3 +++ 2020/26xxx/CVE-2020-26217.json | 3 +++ 2020/26xxx/CVE-2020-26418.json | 3 +++ 2020/26xxx/CVE-2020-26419.json | 3 +++ 2020/26xxx/CVE-2020-26420.json | 3 +++ 2020/26xxx/CVE-2020-26421.json | 3 +++ 2020/26xxx/CVE-2020-26422.json | 3 +++ 2020/27xxx/CVE-2020-27193.json | 3 +++ 2020/27xxx/CVE-2020-27216.json | 3 +++ 2020/27xxx/CVE-2020-27218.json | 3 +++ 2020/27xxx/CVE-2020-27223.json | 4 ++++ 2020/27xxx/CVE-2020-27841.json | 3 +++ 2020/27xxx/CVE-2020-27842.json | 3 +++ 2020/27xxx/CVE-2020-27843.json | 3 +++ 2020/27xxx/CVE-2020-27844.json | 3 +++ 2020/27xxx/CVE-2020-27845.json | 3 +++ 2020/28xxx/CVE-2020-28052.json | 3 +++ 2020/28xxx/CVE-2020-28196.json | 3 +++ 2020/35xxx/CVE-2020-35490.json | 3 +++ 2020/35xxx/CVE-2020-35491.json | 3 +++ 2020/35xxx/CVE-2020-35728.json | 3 +++ 2020/36xxx/CVE-2020-36179.json | 3 +++ 2020/36xxx/CVE-2020-36180.json | 3 +++ 2020/36xxx/CVE-2020-36181.json | 3 +++ 2020/36xxx/CVE-2020-36182.json | 3 +++ 2020/36xxx/CVE-2020-36183.json | 3 +++ 2020/36xxx/CVE-2020-36184.json | 3 +++ 2020/36xxx/CVE-2020-36185.json | 3 +++ 2020/36xxx/CVE-2020-36186.json | 3 +++ 2020/36xxx/CVE-2020-36187.json | 3 +++ 2020/36xxx/CVE-2020-36188.json | 3 +++ 2020/36xxx/CVE-2020-36189.json | 3 +++ 2020/5xxx/CVE-2020-5359.json | 3 +++ 2020/5xxx/CVE-2020-5360.json | 3 +++ 2020/5xxx/CVE-2020-5398.json | 3 +++ 2020/5xxx/CVE-2020-5407.json | 3 +++ 2020/5xxx/CVE-2020-5408.json | 3 +++ 2020/5xxx/CVE-2020-5413.json | 3 +++ 2020/5xxx/CVE-2020-5421.json | 3 +++ 2020/7xxx/CVE-2020-7059.json | 3 +++ 2020/7xxx/CVE-2020-7060.json | 3 +++ 2020/7xxx/CVE-2020-7067.json | 3 +++ 2020/7xxx/CVE-2020-7069.json | 3 +++ 2020/7xxx/CVE-2020-7760.json | 3 +++ 2020/7xxx/CVE-2020-7774.json | 3 +++ 2020/7xxx/CVE-2020-7919.json | 3 +++ 2020/8xxx/CVE-2020-8203.json | 3 +++ 2020/8xxx/CVE-2020-8277.json | 3 +++ 2020/8xxx/CVE-2020-8284.json | 3 +++ 2020/8xxx/CVE-2020-8285.json | 3 +++ 2020/8xxx/CVE-2020-8286.json | 3 +++ 2020/8xxx/CVE-2020-8908.json | 3 +++ 2020/9xxx/CVE-2020-9281.json | 3 +++ 2020/9xxx/CVE-2020-9327.json | 3 +++ 2020/9xxx/CVE-2020-9480.json | 3 +++ 2020/9xxx/CVE-2020-9484.json | 3 +++ 2020/9xxx/CVE-2020-9488.json | 3 +++ 2020/9xxx/CVE-2020-9489.json | 3 +++ 2021/20xxx/CVE-2021-20227.json | 3 +++ 2021/21xxx/CVE-2021-21290.json | 3 +++ 2021/21xxx/CVE-2021-21345.json | 3 +++ 2021/22xxx/CVE-2021-22112.json | 3 +++ 2021/22xxx/CVE-2021-22173.json | 3 +++ 2021/22xxx/CVE-2021-22174.json | 3 +++ 2021/22xxx/CVE-2021-22191.json | 3 +++ 2021/22xxx/CVE-2021-22883.json | 3 +++ 2021/22xxx/CVE-2021-22884.json | 3 +++ 2021/23xxx/CVE-2021-23336.json | 3 +++ 2021/23xxx/CVE-2021-23839.json | 3 +++ 2021/23xxx/CVE-2021-23840.json | 3 +++ 2021/23xxx/CVE-2021-23841.json | 3 +++ 2021/26xxx/CVE-2021-26117.json | 3 +++ 2021/3xxx/CVE-2021-3449.json | 3 +++ 2021/3xxx/CVE-2021-3450.json | 3 +++ 211 files changed, 634 insertions(+) diff --git a/2014/9xxx/CVE-2014-9515.json b/2014/9xxx/CVE-2014-9515.json index d395014335a..2c48f4732cb 100644 --- a/2014/9xxx/CVE-2014-9515.json +++ b/2014/9xxx/CVE-2014-9515.json @@ -86,6 +86,9 @@ "refsource": "MISC", "name": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c", "url": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2016/2xxx/CVE-2016-2542.json b/2016/2xxx/CVE-2016-2542.json index 4d93ec61a6a..97003585fcb 100644 --- a/2016/2xxx/CVE-2016-2542.json +++ b/2016/2xxx/CVE-2016-2542.json @@ -76,6 +76,9 @@ "refsource": "MISC", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-03", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-03" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2016/5xxx/CVE-2016-5725.json b/2016/5xxx/CVE-2016-5725.json index da5c767f0c2..41fa16398a1 100644 --- a/2016/5xxx/CVE-2016-5725.json +++ b/2016/5xxx/CVE-2016-5725.json @@ -101,6 +101,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2016/7xxx/CVE-2016-7103.json b/2016/7xxx/CVE-2016-7103.json index e1fa3ca8cbf..1bad29573e1 100644 --- a/2016/7xxx/CVE-2016-7103.json +++ b/2016/7xxx/CVE-2016-7103.json @@ -156,6 +156,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2016/9xxx/CVE-2016-9775.json b/2016/9xxx/CVE-2016-9775.json index 02ee5e86436..f4d327d466d 100644 --- a/2016/9xxx/CVE-2016-9775.json +++ b/2016/9xxx/CVE-2016-9775.json @@ -96,6 +96,9 @@ "name": "https://security.netapp.com/advisory/ntap-20180731-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180731-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2017/1000xxx/CVE-2017-1000061.json b/2017/1000xxx/CVE-2017-1000061.json index 69dce5067f4..89be870eee5 100644 --- a/2017/1000xxx/CVE-2017-1000061.json +++ b/2017/1000xxx/CVE-2017-1000061.json @@ -68,6 +68,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-9573355ff4", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3PWHBRWXR3RNPHDSTQI6UWDG5ETOQ7VR/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2017/12xxx/CVE-2017-12626.json b/2017/12xxx/CVE-2017-12626.json index 392e22bf88d..bd871f729dd 100644 --- a/2017/12xxx/CVE-2017-12626.json +++ b/2017/12xxx/CVE-2017-12626.json @@ -102,6 +102,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2017/14xxx/CVE-2017-14735.json b/2017/14xxx/CVE-2017-14735.json index 6c1a5753cd2..708f522b939 100644 --- a/2017/14xxx/CVE-2017-14735.json +++ b/2017/14xxx/CVE-2017-14735.json @@ -86,6 +86,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2017/18xxx/CVE-2017-18640.json b/2017/18xxx/CVE-2017-18640.json index 3b63ac3f717..8fc57bbe70b 100644 --- a/2017/18xxx/CVE-2017-18640.json +++ b/2017/18xxx/CVE-2017-18640.json @@ -296,6 +296,9 @@ "refsource": "MLIST", "name": "[phoenix-dev] 20210419 [GitHub] [phoenix-omid] richardantal opened a new pull request #93: OMID-207 Upgrade to snakeyaml 1.26 due to CVE-2017-18640", "url": "https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2017/5xxx/CVE-2017-5645.json b/2017/5xxx/CVE-2017-5645.json index a135926b98e..73a7ca49df2 100644 --- a/2017/5xxx/CVE-2017-5645.json +++ b/2017/5xxx/CVE-2017-5645.json @@ -421,6 +421,9 @@ "refsource": "MLIST", "name": "[beam-issues] 20210528 [jira] [Created] (BEAM-12422) Vendored gRPC 1.36.0 is using a log4j version with security issues", "url": "https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000180.json b/2018/1000xxx/CVE-2018-1000180.json index 2b51741a4bd..d35e80d1269 100644 --- a/2018/1000xxx/CVE-2018-1000180.json +++ b/2018/1000xxx/CVE-2018-1000180.json @@ -154,6 +154,9 @@ "refsource": "MISC", "name": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180", "url": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000613.json b/2018/1000xxx/CVE-2018-1000613.json index 7e91d7795d6..fd1082bba04 100644 --- a/2018/1000xxx/CVE-2018-1000613.json +++ b/2018/1000xxx/CVE-2018-1000613.json @@ -104,6 +104,9 @@ "name": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000632.json b/2018/1000xxx/CVE-2018-1000632.json index 571d4e4b6dc..2ed7a0f553c 100644 --- a/2018/1000xxx/CVE-2018-1000632.json +++ b/2018/1000xxx/CVE-2018-1000632.json @@ -189,6 +189,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-8015a8cdc4", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/14xxx/CVE-2018-14040.json b/2018/14xxx/CVE-2018-14040.json index 1f23fab7074..2ba776b257c 100644 --- a/2018/14xxx/CVE-2018-14040.json +++ b/2018/14xxx/CVE-2018-14040.json @@ -136,6 +136,9 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/14xxx/CVE-2018-14041.json b/2018/14xxx/CVE-2018-14041.json index 186197313f2..70987710738 100644 --- a/2018/14xxx/CVE-2018-14041.json +++ b/2018/14xxx/CVE-2018-14041.json @@ -131,6 +131,9 @@ "refsource": "MLIST", "name": "[hbase-issues] 20201116 [GitHub] [hbase] symat opened a new pull request #2661: HBASE-25261 Upgrade Bootstrap to 3.4.1", "url": "https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/14xxx/CVE-2018-14042.json b/2018/14xxx/CVE-2018-14042.json index f6fed47ec98..bfce370d131 100644 --- a/2018/14xxx/CVE-2018-14042.json +++ b/2018/14xxx/CVE-2018-14042.json @@ -126,6 +126,9 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/14xxx/CVE-2018-14550.json b/2018/14xxx/CVE-2018-14550.json index fd3bead77ea..620dcc280bf 100644 --- a/2018/14xxx/CVE-2018-14550.json +++ b/2018/14xxx/CVE-2018-14550.json @@ -66,6 +66,9 @@ "refsource": "GENTOO", "name": "GLSA-201908-02", "url": "https://security.gentoo.org/glsa/201908-02" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/14xxx/CVE-2018-14613.json b/2018/14xxx/CVE-2018-14613.json index 7a0de6ed5f2..b62536dff30 100644 --- a/2018/14xxx/CVE-2018-14613.json +++ b/2018/14xxx/CVE-2018-14613.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/16xxx/CVE-2018-16884.json b/2018/16xxx/CVE-2018-16884.json index 8234c49cf51..c6058bce803 100644 --- a/2018/16xxx/CVE-2018-16884.json +++ b/2018/16xxx/CVE-2018-16884.json @@ -166,6 +166,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0204", "url": "https://access.redhat.com/errata/RHSA-2020:0204" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/1xxx/CVE-2018-1285.json b/2018/1xxx/CVE-2018-1285.json index d2648325ac6..e441d9a31a2 100644 --- a/2018/1xxx/CVE-2018-1285.json +++ b/2018/1xxx/CVE-2018-1285.json @@ -108,6 +108,9 @@ "refsource": "MISC", "name": "https://issues.apache.org/jira/browse/LOG4NET-575", "url": "https://issues.apache.org/jira/browse/LOG4NET-575" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2018/20xxx/CVE-2018-20843.json b/2018/20xxx/CVE-2018-20843.json index 18d4b87568e..f4cc7055d23 100644 --- a/2018/20xxx/CVE-2018-20843.json +++ b/2018/20xxx/CVE-2018-20843.json @@ -141,6 +141,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K51011533", "url": "https://support.f5.com/csp/article/K51011533" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2018/8xxx/CVE-2018-8032.json b/2018/8xxx/CVE-2018-8032.json index b7f412ecb24..2d893cc2df9 100644 --- a/2018/8xxx/CVE-2018-8032.json +++ b/2018/8xxx/CVE-2018-8032.json @@ -97,6 +97,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/0xxx/CVE-2019-0219.json b/2019/0xxx/CVE-2019-0219.json index 85c6b68f2b3..aaf7aea51bf 100644 --- a/2019/0xxx/CVE-2019-0219.json +++ b/2019/0xxx/CVE-2019-0219.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[cordova-dev] 20191128 CVE-2019-0219: Apache Cordova InAppBrowser Privilege Escalation (Android)", "url": "https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0221.json b/2019/0xxx/CVE-2019-0221.json index 129880c4fb4..1ca9c8e1067 100644 --- a/2019/0xxx/CVE-2019-0221.json +++ b/2019/0xxx/CVE-2019-0221.json @@ -184,6 +184,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0227.json b/2019/0xxx/CVE-2019-0227.json index b175f8c0a86..1fcd431e06d 100644 --- a/2019/0xxx/CVE-2019-0227.json +++ b/2019/0xxx/CVE-2019-0227.json @@ -78,6 +78,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0228.json b/2019/0xxx/CVE-2019-0228.json index 29d3fb538db..fefbbc691a8 100644 --- a/2019/0xxx/CVE-2019-0228.json +++ b/2019/0xxx/CVE-2019-0228.json @@ -88,6 +88,9 @@ "refsource": "MLIST", "name": "[pdfbox-users] 20210120 Security Vulnerability with PDFbox 1.8.16", "url": "https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0230.json b/2019/0xxx/CVE-2019-0230.json index d08e9ee1853..fa48a840876 100644 --- a/2019/0xxx/CVE-2019-0230.json +++ b/2019/0xxx/CVE-2019-0230.json @@ -78,6 +78,9 @@ "refsource": "MLIST", "name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020", "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0232.json b/2019/0xxx/CVE-2019-0232.json index d86509ecf7c..7545ed95e34 100644 --- a/2019/0xxx/CVE-2019-0232.json +++ b/2019/0xxx/CVE-2019-0232.json @@ -204,6 +204,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/0xxx/CVE-2019-0233.json b/2019/0xxx/CVE-2019-0233.json index 9e1c284c3e6..89e8e64e9c2 100644 --- a/2019/0xxx/CVE-2019-0233.json +++ b/2019/0xxx/CVE-2019-0233.json @@ -58,6 +58,9 @@ "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/2982840", "url": "https://launchpad.support.sap.com/#/notes/2982840" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10072.json b/2019/10xxx/CVE-2019-10072.json index beda37bd986..3bc1b4e16a7 100644 --- a/2019/10xxx/CVE-2019-10072.json +++ b/2019/10xxx/CVE-2019-10072.json @@ -138,6 +138,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K17321505", "url": "https://support.f5.com/csp/article/K17321505" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10080.json b/2019/10xxx/CVE-2019-10080.json index 229e3c7537c..1d940bdea5c 100644 --- a/2019/10xxx/CVE-2019-10080.json +++ b/2019/10xxx/CVE-2019-10080.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10086.json b/2019/10xxx/CVE-2019-10086.json index 656260d99c1..9892e4a0a9c 100644 --- a/2019/10xxx/CVE-2019-10086.json +++ b/2019/10xxx/CVE-2019-10086.json @@ -243,6 +243,9 @@ "refsource": "MLIST", "name": "[dolphinscheduler-commits] 20210121 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on pull request #4525: [Improvement-4506][LICENSE] upgrade the version of the commons-beanutils", "url": "https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10098.json b/2019/10xxx/CVE-2019-10098.json index b0ba889d649..bae778174bc 100644 --- a/2019/10xxx/CVE-2019-10098.json +++ b/2019/10xxx/CVE-2019-10098.json @@ -123,6 +123,9 @@ "refsource": "MLIST", "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10173.json b/2019/10xxx/CVE-2019-10173.json index f5fb4337a9b..16dec8d27da 100644 --- a/2019/10xxx/CVE-2019-10173.json +++ b/2019/10xxx/CVE-2019-10173.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10246.json b/2019/10xxx/CVE-2019-10246.json index f83b7f6634b..886a365bd98 100644 --- a/2019/10xxx/CVE-2019-10246.json +++ b/2019/10xxx/CVE-2019-10246.json @@ -110,6 +110,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/10xxx/CVE-2019-10247.json b/2019/10xxx/CVE-2019-10247.json index 2d07c7d87df..0756feaa26c 100644 --- a/2019/10xxx/CVE-2019-10247.json +++ b/2019/10xxx/CVE-2019-10247.json @@ -143,6 +143,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/10xxx/CVE-2019-10638.json b/2019/10xxx/CVE-2019-10638.json index f4b3398c726..a994f11286f 100644 --- a/2019/10xxx/CVE-2019-10638.json +++ b/2019/10xxx/CVE-2019-10638.json @@ -186,6 +186,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/10xxx/CVE-2019-10639.json b/2019/10xxx/CVE-2019-10639.json index 7c4dcd14bd6..dd210f673d3 100644 --- a/2019/10xxx/CVE-2019-10639.json +++ b/2019/10xxx/CVE-2019-10639.json @@ -126,6 +126,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K32804955?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K32804955?utm_source=f5support&utm_medium=RSS" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/11xxx/CVE-2019-11048.json b/2019/11xxx/CVE-2019-11048.json index 21424c26325..a8e3e3a8c12 100644 --- a/2019/11xxx/CVE-2019-11048.json +++ b/2019/11xxx/CVE-2019-11048.json @@ -153,6 +153,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200528-0006/", "url": "https://security.netapp.com/advisory/ntap-20200528-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11358.json b/2019/11xxx/CVE-2019-11358.json index 8c7e37a0d5e..5d4ed3d0c59 100644 --- a/2019/11xxx/CVE-2019-11358.json +++ b/2019/11xxx/CVE-2019-11358.json @@ -386,6 +386,9 @@ "refsource": "CONFIRM", "name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601", "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/11xxx/CVE-2019-11487.json b/2019/11xxx/CVE-2019-11487.json index 68116f449ab..7e41535207d 100644 --- a/2019/11xxx/CVE-2019-11487.json +++ b/2019/11xxx/CVE-2019-11487.json @@ -196,6 +196,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0174", "url": "https://access.redhat.com/errata/RHSA-2020:0174" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/11xxx/CVE-2019-11599.json b/2019/11xxx/CVE-2019-11599.json index 5166c2a137e..dfb38c9ccc3 100644 --- a/2019/11xxx/CVE-2019-11599.json +++ b/2019/11xxx/CVE-2019-11599.json @@ -241,6 +241,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/12xxx/CVE-2019-12086.json b/2019/12xxx/CVE-2019-12086.json index d20878c9775..09491dc5c7d 100644 --- a/2019/12xxx/CVE-2019-12086.json +++ b/2019/12xxx/CVE-2019-12086.json @@ -246,6 +246,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/12xxx/CVE-2019-12399.json b/2019/12xxx/CVE-2019-12399.json index 9566ba83411..6f55a47ec8e 100644 --- a/2019/12xxx/CVE-2019-12399.json +++ b/2019/12xxx/CVE-2019-12399.json @@ -161,6 +161,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12402.json b/2019/12xxx/CVE-2019-12402.json index 30793547665..4ffd5b0cace 100644 --- a/2019/12xxx/CVE-2019-12402.json +++ b/2019/12xxx/CVE-2019-12402.json @@ -168,6 +168,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12406.json b/2019/12xxx/CVE-2019-12406.json index 7162d6cc60f..a4b3917d373 100644 --- a/2019/12xxx/CVE-2019-12406.json +++ b/2019/12xxx/CVE-2019-12406.json @@ -103,6 +103,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12415.json b/2019/12xxx/CVE-2019-12415.json index cb7958bfac2..626e22e103a 100644 --- a/2019/12xxx/CVE-2019-12415.json +++ b/2019/12xxx/CVE-2019-12415.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12419.json b/2019/12xxx/CVE-2019-12419.json index 82abdf0ca0c..64dcd2860c2 100644 --- a/2019/12xxx/CVE-2019-12419.json +++ b/2019/12xxx/CVE-2019-12419.json @@ -103,6 +103,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12423.json b/2019/12xxx/CVE-2019-12423.json index c579a7876c8..a76a2277a72 100644 --- a/2019/12xxx/CVE-2019-12423.json +++ b/2019/12xxx/CVE-2019-12423.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14379.json b/2019/14xxx/CVE-2019-14379.json index 18208750674..abbb8286484 100644 --- a/2019/14xxx/CVE-2019-14379.json +++ b/2019/14xxx/CVE-2019-14379.json @@ -331,6 +331,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/14xxx/CVE-2019-14898.json b/2019/14xxx/CVE-2019-14898.json index a78c14f0419..73302b6ceaa 100644 --- a/2019/14xxx/CVE-2019-14898.json +++ b/2019/14xxx/CVE-2019-14898.json @@ -81,6 +81,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200608-0001/", "url": "https://security.netapp.com/advisory/ntap-20200608-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/15xxx/CVE-2019-15218.json b/2019/15xxx/CVE-2019-15218.json index f48813e26fd..bd8c69c3c08 100644 --- a/2019/15xxx/CVE-2019-15218.json +++ b/2019/15xxx/CVE-2019-15218.json @@ -136,6 +136,9 @@ "refsource": "UBUNTU", "name": "USN-4147-1", "url": "https://usn.ubuntu.com/4147-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/16xxx/CVE-2019-16746.json b/2019/16xxx/CVE-2019-16746.json index 5523d225e96..a3b8529ab6a 100644 --- a/2019/16xxx/CVE-2019-16746.json +++ b/2019/16xxx/CVE-2019-16746.json @@ -116,6 +116,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/16xxx/CVE-2019-16942.json b/2019/16xxx/CVE-2019-16942.json index aedcd3ae434..aec37487c4c 100644 --- a/2019/16xxx/CVE-2019-16942.json +++ b/2019/16xxx/CVE-2019-16942.json @@ -186,6 +186,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17075.json b/2019/17xxx/CVE-2019-17075.json index 489c06c4fad..5982a6bd9dd 100644 --- a/2019/17xxx/CVE-2019-17075.json +++ b/2019/17xxx/CVE-2019-17075.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17133.json b/2019/17xxx/CVE-2019-17133.json index 6e9b5c91c04..5c67a218df9 100644 --- a/2019/17xxx/CVE-2019-17133.json +++ b/2019/17xxx/CVE-2019-17133.json @@ -166,6 +166,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0790", "url": "https://access.redhat.com/errata/RHSA-2020:0790" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17195.json b/2019/17xxx/CVE-2019-17195.json index 0a1a5e7faa3..e5cc0227b31 100644 --- a/2019/17xxx/CVE-2019-17195.json +++ b/2019/17xxx/CVE-2019-17195.json @@ -106,6 +106,9 @@ "refsource": "MLIST", "name": "[druid-commits] 20210507 [druid] branch 0.21.1 updated: Suppressing false positive CVE-2020-7791 (#11215) (#11217)", "url": "https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17495.json b/2019/17xxx/CVE-2019-17495.json index fae8cc0030b..b13dff8475a 100644 --- a/2019/17xxx/CVE-2019-17495.json +++ b/2019/17xxx/CVE-2019-17495.json @@ -66,6 +66,9 @@ "url": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11", "refsource": "MISC", "name": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17566.json b/2019/17xxx/CVE-2019-17566.json index 53744dd3697..b9cd7da7d12 100644 --- a/2019/17xxx/CVE-2019-17566.json +++ b/2019/17xxx/CVE-2019-17566.json @@ -63,6 +63,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index 7bc80e48dd9..2e1fdc53e63 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -468,6 +468,9 @@ "refsource": "MLIST", "name": "[activemq-users] 20210427 Re: Release date for ActiveMQ v5.16.2 to fix CVEs", "url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17573.json b/2019/17xxx/CVE-2019-17573.json index 0f91399ae5e..3f0e84c1f74 100644 --- a/2019/17xxx/CVE-2019-17573.json +++ b/2019/17xxx/CVE-2019-17573.json @@ -103,6 +103,9 @@ "refsource": "MLIST", "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html", "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17632.json b/2019/17xxx/CVE-2019-17632.json index 988d3509c73..1aa653eee34 100644 --- a/2019/17xxx/CVE-2019-17632.json +++ b/2019/17xxx/CVE-2019-17632.json @@ -78,6 +78,9 @@ "name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443", "refsource": "CONFIRM", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/17xxx/CVE-2019-17638.json b/2019/17xxx/CVE-2019-17638.json index c43b3368f9a..24af5a8094a 100644 --- a/2019/17xxx/CVE-2019-17638.json +++ b/2019/17xxx/CVE-2019-17638.json @@ -139,6 +139,9 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20210127 [GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan", "url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/18xxx/CVE-2019-18885.json b/2019/18xxx/CVE-2019-18885.json index a847b6222fe..09c3cccac75 100644 --- a/2019/18xxx/CVE-2019-18885.json +++ b/2019/18xxx/CVE-2019-18885.json @@ -106,6 +106,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19052.json b/2019/19xxx/CVE-2019-19052.json index db8da2ca561..f2f9c1d2068 100644 --- a/2019/19xxx/CVE-2019-19052.json +++ b/2019/19xxx/CVE-2019-19052.json @@ -116,6 +116,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19063.json b/2019/19xxx/CVE-2019-19063.json index 976f5a5383e..7c541f30297 100644 --- a/2019/19xxx/CVE-2019-19063.json +++ b/2019/19xxx/CVE-2019-19063.json @@ -116,6 +116,9 @@ "refsource": "UBUNTU", "name": "USN-4284-1", "url": "https://usn.ubuntu.com/4284-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19066.json b/2019/19xxx/CVE-2019-19066.json index ab978af8744..8e62ae64e13 100644 --- a/2019/19xxx/CVE-2019-19066.json +++ b/2019/19xxx/CVE-2019-19066.json @@ -111,6 +111,9 @@ "refsource": "UBUNTU", "name": "USN-4302-1", "url": "https://usn.ubuntu.com/4302-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19073.json b/2019/19xxx/CVE-2019-19073.json index 7017d82d437..79eaf5f26b6 100644 --- a/2019/19xxx/CVE-2019-19073.json +++ b/2019/19xxx/CVE-2019-19073.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19074.json b/2019/19xxx/CVE-2019-19074.json index 1ac9caddbdd..612949aa4cc 100644 --- a/2019/19xxx/CVE-2019-19074.json +++ b/2019/19xxx/CVE-2019-19074.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19078.json b/2019/19xxx/CVE-2019-19078.json index 38dbbcd8fa6..515e5c6b3a4 100644 --- a/2019/19xxx/CVE-2019-19078.json +++ b/2019/19xxx/CVE-2019-19078.json @@ -96,6 +96,9 @@ "refsource": "UBUNTU", "name": "USN-4284-1", "url": "https://usn.ubuntu.com/4284-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19535.json b/2019/19xxx/CVE-2019-19535.json index baf89969e74..2ef570432da 100644 --- a/2019/19xxx/CVE-2019-19535.json +++ b/2019/19xxx/CVE-2019-19535.json @@ -76,6 +76,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0336", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/19xxx/CVE-2019-19922.json b/2019/19xxx/CVE-2019-19922.json index 6daf82d954d..99c01f37dc8 100644 --- a/2019/19xxx/CVE-2019-19922.json +++ b/2019/19xxx/CVE-2019-19922.json @@ -91,6 +91,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200204-0002/", "url": "https://security.netapp.com/advisory/ntap-20200204-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/1xxx/CVE-2019-1241.json b/2019/1xxx/CVE-2019-1241.json index 148027c036c..9d83f419b72 100644 --- a/2019/1xxx/CVE-2019-1241.json +++ b/2019/1xxx/CVE-2019-1241.json @@ -211,6 +211,9 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1241", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1241" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/1xxx/CVE-2019-1551.json b/2019/1xxx/CVE-2019-1551.json index 63b73724e95..367bdaa8c36 100644 --- a/2019/1xxx/CVE-2019-1551.json +++ b/2019/1xxx/CVE-2019-1551.json @@ -179,6 +179,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/20xxx/CVE-2019-20812.json b/2019/20xxx/CVE-2019-20812.json index 0b7e3642bf4..777edd70bc7 100644 --- a/2019/20xxx/CVE-2019-20812.json +++ b/2019/20xxx/CVE-2019-20812.json @@ -71,6 +71,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0935", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/3xxx/CVE-2019-3738.json b/2019/3xxx/CVE-2019-3738.json index 7e48ba2b8b4..991108c00b5 100644 --- a/2019/3xxx/CVE-2019-3738.json +++ b/2019/3xxx/CVE-2019-3738.json @@ -80,6 +80,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/3xxx/CVE-2019-3739.json b/2019/3xxx/CVE-2019-3739.json index 95d05fb3cf5..ce959f76379 100644 --- a/2019/3xxx/CVE-2019-3739.json +++ b/2019/3xxx/CVE-2019-3739.json @@ -75,6 +75,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/3xxx/CVE-2019-3740.json b/2019/3xxx/CVE-2019-3740.json index bb404fee25f..d6c5207d36d 100644 --- a/2019/3xxx/CVE-2019-3740.json +++ b/2019/3xxx/CVE-2019-3740.json @@ -75,6 +75,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/3xxx/CVE-2019-3773.json b/2019/3xxx/CVE-2019-3773.json index 3abd807ad9c..bd34778e90c 100644 --- a/2019/3xxx/CVE-2019-3773.json +++ b/2019/3xxx/CVE-2019-3773.json @@ -71,6 +71,9 @@ "name": "https://pivotal.io/security/cve-2019-3773", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2019-3773" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3874.json b/2019/3xxx/CVE-2019-3874.json index ee43914fc47..065584d41b1 100644 --- a/2019/3xxx/CVE-2019-3874.json +++ b/2019/3xxx/CVE-2019-3874.json @@ -103,6 +103,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3900.json b/2019/3xxx/CVE-2019-3900.json index c2cd6d399b6..2dabd0c33d5 100644 --- a/2019/3xxx/CVE-2019-3900.json +++ b/2019/3xxx/CVE-2019-3900.json @@ -183,6 +183,9 @@ "refsource": "REDHAT", "name": "RHSA-2020:0204", "url": "https://access.redhat.com/errata/RHSA-2020:0204" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5063.json b/2019/5xxx/CVE-2019-5063.json index 79340770a65..e571449b82d 100644 --- a/2019/5xxx/CVE-2019-5063.json +++ b/2019/5xxx/CVE-2019-5063.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5064.json b/2019/5xxx/CVE-2019-5064.json index c2e6002f4a7..c11d2558257 100644 --- a/2019/5xxx/CVE-2019-5064.json +++ b/2019/5xxx/CVE-2019-5064.json @@ -53,6 +53,9 @@ "refsource": "MISC", "name": "https://github.com/opencv/opencv/issues/15857", "url": "https://github.com/opencv/opencv/issues/15857" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5108.json b/2019/5xxx/CVE-2019-5108.json index f29baf00649..c9acd25bdb7 100644 --- a/2019/5xxx/CVE-2019-5108.json +++ b/2019/5xxx/CVE-2019-5108.json @@ -108,6 +108,9 @@ "refsource": "DEBIAN", "name": "DSA-4698", "url": "https://www.debian.org/security/2020/dsa-4698" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2019/7xxx/CVE-2019-7317.json b/2019/7xxx/CVE-2019-7317.json index 649aca1e1e8..ec6beb9b92f 100644 --- a/2019/7xxx/CVE-2019-7317.json +++ b/2019/7xxx/CVE-2019-7317.json @@ -251,6 +251,9 @@ "refsource": "CONFIRM", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2019/8xxx/CVE-2019-8331.json b/2019/8xxx/CVE-2019-8331.json index b620acaec63..9cb7f290f6d 100644 --- a/2019/8xxx/CVE-2019-8331.json +++ b/2019/8xxx/CVE-2019-8331.json @@ -176,6 +176,9 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list", "url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/10xxx/CVE-2020-10188.json b/2020/10xxx/CVE-2020-10188.json index 6dd27d93d7d..1f1c9845383 100644 --- a/2020/10xxx/CVE-2020-10188.json +++ b/2020/10xxx/CVE-2020-10188.json @@ -91,6 +91,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200824 [SECURITY] [DLA 2341-1] inetutils security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00038.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/10xxx/CVE-2020-10543.json b/2020/10xxx/CVE-2020-10543.json index b2f37b8aa3b..85eee19bb3e 100644 --- a/2020/10xxx/CVE-2020-10543.json +++ b/2020/10xxx/CVE-2020-10543.json @@ -96,6 +96,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index 6bb8e54f166..1e47bc62a84 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -121,6 +121,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/10xxx/CVE-2020-10751.json b/2020/10xxx/CVE-2020-10751.json index 7889099f407..fc391b9b53b 100644 --- a/2020/10xxx/CVE-2020-10751.json +++ b/2020/10xxx/CVE-2020-10751.json @@ -128,6 +128,9 @@ "refsource": "UBUNTU", "name": "USN-4412-1", "url": "https://usn.ubuntu.com/4412-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10769.json b/2020/10xxx/CVE-2020-10769.json index eee8ef05ad0..dc0d8672337 100644 --- a/2020/10xxx/CVE-2020-10769.json +++ b/2020/10xxx/CVE-2020-10769.json @@ -58,6 +58,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1153", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10878.json b/2020/10xxx/CVE-2020-10878.json index 993ce6e3a80..e0005dd9ca9 100644 --- a/2020/10xxx/CVE-2020-10878.json +++ b/2020/10xxx/CVE-2020-10878.json @@ -101,6 +101,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json index 63fd6ddccbd..557d1682a2a 100644 --- a/2020/11xxx/CVE-2020-11022.json +++ b/2020/11xxx/CVE-2020-11022.json @@ -243,6 +243,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json index 2921f2345d7..5d306c7b0a3 100644 --- a/2020/11xxx/CVE-2020-11023.json +++ b/2020/11xxx/CVE-2020-11023.json @@ -353,6 +353,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11612.json b/2020/11xxx/CVE-2020-11612.json index aa5d2330ee7..59cef0b53fc 100644 --- a/2020/11xxx/CVE-2020-11612.json +++ b/2020/11xxx/CVE-2020-11612.json @@ -261,6 +261,9 @@ "refsource": "DEBIAN", "name": "DSA-4885", "url": "https://www.debian.org/security/2021/dsa-4885" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/11xxx/CVE-2020-11655.json b/2020/11xxx/CVE-2020-11655.json index 82d1fc12c36..2e4e8571a8b 100644 --- a/2020/11xxx/CVE-2020-11655.json +++ b/2020/11xxx/CVE-2020-11655.json @@ -106,6 +106,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/11xxx/CVE-2020-11656.json b/2020/11xxx/CVE-2020-11656.json index 1e8f45fa4b8..a031824398f 100644 --- a/2020/11xxx/CVE-2020-11656.json +++ b/2020/11xxx/CVE-2020-11656.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/11xxx/CVE-2020-11973.json b/2020/11xxx/CVE-2020-11973.json index 17f55858ba3..eb53d08ddea 100644 --- a/2020/11xxx/CVE-2020-11973.json +++ b/2020/11xxx/CVE-2020-11973.json @@ -63,6 +63,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11979.json b/2020/11xxx/CVE-2020-11979.json index 326f6b1627a..297e789f725 100644 --- a/2020/11xxx/CVE-2020-11979.json +++ b/2020/11xxx/CVE-2020-11979.json @@ -124,6 +124,9 @@ "refsource": "MLIST", "name": "[creadur-dev] 20210419 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8", "url": "https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 2e16f7588d8..37d486ca9bd 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -68,6 +68,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-33a1b73e48", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11994.json b/2020/11xxx/CVE-2020-11994.json index 017c00d5d11..2de4b6f31bc 100644 --- a/2020/11xxx/CVE-2020-11994.json +++ b/2020/11xxx/CVE-2020-11994.json @@ -53,6 +53,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11998.json b/2020/11xxx/CVE-2020-11998.json index e02db303d1d..9c750785415 100644 --- a/2020/11xxx/CVE-2020-11998.json +++ b/2020/11xxx/CVE-2020-11998.json @@ -63,6 +63,9 @@ "refsource": "MLIST", "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12114.json b/2020/12xxx/CVE-2020-12114.json index f5dd646b335..e45283669fb 100644 --- a/2020/12xxx/CVE-2020-12114.json +++ b/2020/12xxx/CVE-2020-12114.json @@ -126,6 +126,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html", "url": "http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/12xxx/CVE-2020-12723.json b/2020/12xxx/CVE-2020-12723.json index 6f6618f6da8..22226a753c1 100644 --- a/2020/12xxx/CVE-2020-12723.json +++ b/2020/12xxx/CVE-2020-12723.json @@ -106,6 +106,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/12xxx/CVE-2020-12771.json b/2020/12xxx/CVE-2020-12771.json index 83075c7a2e2..58e7db73f10 100644 --- a/2020/12xxx/CVE-2020-12771.json +++ b/2020/12xxx/CVE-2020-12771.json @@ -111,6 +111,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13434.json b/2020/13xxx/CVE-2020-13434.json index e1adbb54879..c16b73a655c 100644 --- a/2020/13xxx/CVE-2020-13434.json +++ b/2020/13xxx/CVE-2020-13434.json @@ -151,6 +151,9 @@ "refsource": "FULLDISC", "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", "url": "http://seclists.org/fulldisclosure/2020/Dec/32" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13435.json b/2020/13xxx/CVE-2020-13435.json index 7f5c8cc4f3a..7c50d62e530 100644 --- a/2020/13xxx/CVE-2020-13435.json +++ b/2020/13xxx/CVE-2020-13435.json @@ -136,6 +136,9 @@ "refsource": "FULLDISC", "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", "url": "http://seclists.org/fulldisclosure/2020/Dec/32" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13871.json b/2020/13xxx/CVE-2020-13871.json index 195c7d2e4ce..d069569e390 100644 --- a/2020/13xxx/CVE-2020-13871.json +++ b/2020/13xxx/CVE-2020-13871.json @@ -91,6 +91,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200619-0002/", "url": "https://security.netapp.com/advisory/ntap-20200619-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/13xxx/CVE-2020-13934.json b/2020/13xxx/CVE-2020-13934.json index 9dc8433121b..72c745cc464 100644 --- a/2020/13xxx/CVE-2020-13934.json +++ b/2020/13xxx/CVE-2020-13934.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13935.json b/2020/13xxx/CVE-2020-13935.json index 6b915b07f3b..4b6f6c7645f 100644 --- a/2020/13xxx/CVE-2020-13935.json +++ b/2020/13xxx/CVE-2020-13935.json @@ -103,6 +103,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13943.json b/2020/13xxx/CVE-2020-13943.json index 502d23987b1..c0da390e4d1 100644 --- a/2020/13xxx/CVE-2020-13943.json +++ b/2020/13xxx/CVE-2020-13943.json @@ -73,6 +73,9 @@ "refsource": "DEBIAN", "name": "DSA-4835", "url": "https://www.debian.org/security/2021/dsa-4835" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13947.json b/2020/13xxx/CVE-2020-13947.json index efb8a92bc2b..c1a758ae896 100644 --- a/2020/13xxx/CVE-2020-13947.json +++ b/2020/13xxx/CVE-2020-13947.json @@ -63,6 +63,9 @@ "refsource": "MLIST", "name": "[activemq-users] 20210211 Re: CVE-2020-13947 - XSS in WebConsole", "url": "https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13954.json b/2020/13xxx/CVE-2020-13954.json index 34d0a23da4a..b293b1f2530 100644 --- a/2020/13xxx/CVE-2020-13954.json +++ b/2020/13xxx/CVE-2020-13954.json @@ -122,6 +122,9 @@ "refsource": "MLIST", "name": "[syncope-dev] 20210526 [GitHub] [syncope] coheigea opened a new pull request #268: Disable CXF Services Listing", "url": "https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 29c4daece58..8955cc6ed7d 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -223,6 +223,9 @@ "refsource": "MLIST", "name": "[creadur-commits] 20210608 [jira] [Assigned] (TENTACLES-13) Upgrade httpclient to circumvent CVE-2020-13956", "url": "https://lists.apache.org/thread.html/r70c429923100c5a4fae8e5bc71c8a2d39af3de4888f50a0ac3755e6f@%3Ccommits.creadur.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14039.json b/2020/14xxx/CVE-2020-14039.json index 4fd94d5b123..4d9bd9e9714 100644 --- a/2020/14xxx/CVE-2020-14039.json +++ b/2020/14xxx/CVE-2020-14039.json @@ -86,6 +86,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1407", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14060.json b/2020/14xxx/CVE-2020-14060.json index d0f989f1b63..bb9442bda5d 100644 --- a/2020/14xxx/CVE-2020-14060.json +++ b/2020/14xxx/CVE-2020-14060.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14061.json b/2020/14xxx/CVE-2020-14061.json index 0aadcaa91a8..301e53e6376 100644 --- a/2020/14xxx/CVE-2020-14061.json +++ b/2020/14xxx/CVE-2020-14061.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14062.json b/2020/14xxx/CVE-2020-14062.json index ccedce54995..274fc63ebb2 100644 --- a/2020/14xxx/CVE-2020-14062.json +++ b/2020/14xxx/CVE-2020-14062.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/14xxx/CVE-2020-14195.json b/2020/14xxx/CVE-2020-14195.json index 05aace0b929..240a9d96601 100644 --- a/2020/14xxx/CVE-2020-14195.json +++ b/2020/14xxx/CVE-2020-14195.json @@ -76,6 +76,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/15xxx/CVE-2020-15358.json b/2020/15xxx/CVE-2020-15358.json index 5e2324f67d9..6cba4b986ac 100644 --- a/2020/15xxx/CVE-2020-15358.json +++ b/2020/15xxx/CVE-2020-15358.json @@ -146,6 +146,9 @@ "refsource": "FULLDISC", "name": "20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave", "url": "http://seclists.org/fulldisclosure/2021/Feb/14" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/15xxx/CVE-2020-15586.json b/2020/15xxx/CVE-2020-15586.json index edbbc66e614..de22d5553ea 100644 --- a/2020/15xxx/CVE-2020-15586.json +++ b/2020/15xxx/CVE-2020-15586.json @@ -116,6 +116,9 @@ "refsource": "DEBIAN", "name": "DSA-4848", "url": "https://www.debian.org/security/2021/dsa-4848" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/16xxx/CVE-2020-16166.json b/2020/16xxx/CVE-2020-16166.json index 454aea79193..259e11ad34e 100644 --- a/2020/16xxx/CVE-2020-16166.json +++ b/2020/16xxx/CVE-2020-16166.json @@ -121,6 +121,9 @@ "refsource": "MISC", "name": "https://arxiv.org/pdf/2012.07432.pdf", "url": "https://arxiv.org/pdf/2012.07432.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/16xxx/CVE-2020-16845.json b/2020/16xxx/CVE-2020-16845.json index 5052121c678..cf9440bec86 100644 --- a/2020/16xxx/CVE-2020-16845.json +++ b/2020/16xxx/CVE-2020-16845.json @@ -121,6 +121,9 @@ "refsource": "DEBIAN", "name": "DSA-4848", "url": "https://www.debian.org/security/2021/dsa-4848" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/17xxx/CVE-2020-17521.json b/2020/17xxx/CVE-2020-17521.json index 033e8a24cc4..0e858c51496 100644 --- a/2020/17xxx/CVE-2020-17521.json +++ b/2020/17xxx/CVE-2020-17521.json @@ -82,6 +82,9 @@ "refsource": "MLIST", "name": "[atlas-dev] 20210422 [jira] [Updated] (ATLAS-4257) Atlas - Upgrade groovy to 2.4.21+, 2.5.14+, 3.0.7+, or 4.0.0-alpha-2+ due to CVE-2020-17521", "url": "https://lists.apache.org/thread.html/r4b2f13c302eec98838ff7475253091fb9b75bc1038016ba00ebf6c08@%3Cdev.atlas.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/17xxx/CVE-2020-17527.json b/2020/17xxx/CVE-2020-17527.json index 84c7429cbb4..b41d298cf8f 100644 --- a/2020/17xxx/CVE-2020-17527.json +++ b/2020/17xxx/CVE-2020-17527.json @@ -173,6 +173,9 @@ "refsource": "MLIST", "name": "[tomee-commits] 20210319 [jira] [Updated] (TOMEE-2936) TomEE plus(7.0.9) is affected by CVE-2020-17527(BDSA-2020-3628) vulnerability.", "url": "https://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20@%3Ccommits.tomee.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/17xxx/CVE-2020-17530.json b/2020/17xxx/CVE-2020-17530.json index d65c23f440a..0fa4e2d4de7 100644 --- a/2020/17xxx/CVE-2020-17530.json +++ b/2020/17xxx/CVE-2020-17530.json @@ -68,6 +68,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210115-0005/", "url": "https://security.netapp.com/advisory/ntap-20210115-0005/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1472.json b/2020/1xxx/CVE-2020-1472.json index 3e385699d7c..430c784caaa 100644 --- a/2020/1xxx/CVE-2020-1472.json +++ b/2020/1xxx/CVE-2020-1472.json @@ -251,6 +251,9 @@ "refsource": "GENTOO", "name": "GLSA-202012-24", "url": "https://security.gentoo.org/glsa/202012-24" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/1xxx/CVE-2020-1927.json b/2020/1xxx/CVE-2020-1927.json index 5699478c185..d3782943bab 100644 --- a/2020/1xxx/CVE-2020-1927.json +++ b/2020/1xxx/CVE-2020-1927.json @@ -163,6 +163,9 @@ "refsource": "MLIST", "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1941.json b/2020/1xxx/CVE-2020-1941.json index 8817fe03b3f..5d81ca1cbb3 100644 --- a/2020/1xxx/CVE-2020-1941.json +++ b/2020/1xxx/CVE-2020-1941.json @@ -73,6 +73,9 @@ "refsource": "MLIST", "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1945.json b/2020/1xxx/CVE-2020-1945.json index 4fd6d0f5e3f..1339e413395 100644 --- a/2020/1xxx/CVE-2020-1945.json +++ b/2020/1xxx/CVE-2020-1945.json @@ -278,6 +278,9 @@ "refsource": "MLIST", "name": "[creadur-dev] 20210419 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8", "url": "https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1967.json b/2020/1xxx/CVE-2020-1967.json index 33823173585..84987e4a352 100644 --- a/2020/1xxx/CVE-2020-1967.json +++ b/2020/1xxx/CVE-2020-1967.json @@ -211,6 +211,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/1xxx/CVE-2020-1968.json b/2020/1xxx/CVE-2020-1968.json index a7aa68ff3c0..4e093865ce7 100644 --- a/2020/1xxx/CVE-2020-1968.json +++ b/2020/1xxx/CVE-2020-1968.json @@ -91,6 +91,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200911-0004/", "url": "https://security.netapp.com/advisory/ntap-20200911-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/1xxx/CVE-2020-1971.json b/2020/1xxx/CVE-2020-1971.json index 80171c3cde9..f4ad132ebcf 100644 --- a/2020/1xxx/CVE-2020-1971.json +++ b/2020/1xxx/CVE-2020-1971.json @@ -164,6 +164,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24394.json b/2020/24xxx/CVE-2020-24394.json index fabd4d98a72..87569269ca6 100644 --- a/2020/24xxx/CVE-2020-24394.json +++ b/2020/24xxx/CVE-2020-24394.json @@ -91,6 +91,9 @@ "refsource": "UBUNTU", "name": "USN-4485-1", "url": "https://usn.ubuntu.com/4485-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24553.json b/2020/24xxx/CVE-2020-24553.json index 4d2508f3905..fca52fe9a55 100644 --- a/2020/24xxx/CVE-2020-24553.json +++ b/2020/24xxx/CVE-2020-24553.json @@ -91,6 +91,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:1587", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24616.json b/2020/24xxx/CVE-2020-24616.json index 5c30631ea6c..e35099b2dbf 100644 --- a/2020/24xxx/CVE-2020-24616.json +++ b/2020/24xxx/CVE-2020-24616.json @@ -76,6 +76,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/24xxx/CVE-2020-24750.json b/2020/24xxx/CVE-2020-24750.json index 5b0211ba077..9722cb5c8c9 100644 --- a/2020/24xxx/CVE-2020-24750.json +++ b/2020/24xxx/CVE-2020-24750.json @@ -76,6 +76,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json index 458aa736909..2e0a3fbac0b 100644 --- a/2020/25xxx/CVE-2020-25649.json +++ b/2020/25xxx/CVE-2020-25649.json @@ -333,6 +333,9 @@ "refsource": "MLIST", "name": "[knox-dev] 20210601 [jira] [Updated] (KNOX-2614) Upgrade jackson-databind to 2.10.5 due to CVE-2020-25649", "url": "https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26217.json b/2020/26xxx/CVE-2020-26217.json index f411f6280e7..44eb92ba9f8 100644 --- a/2020/26xxx/CVE-2020-26217.json +++ b/2020/26xxx/CVE-2020-26217.json @@ -113,6 +113,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210409-0004/", "url": "https://security.netapp.com/advisory/ntap-20210409-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26418.json b/2020/26xxx/CVE-2020-26418.json index 531e019ccbb..3df20dd6e29 100644 --- a/2020/26xxx/CVE-2020-26418.json +++ b/2020/26xxx/CVE-2020-26418.json @@ -81,6 +81,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-138674557c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26419.json b/2020/26xxx/CVE-2020-26419.json index 017cc700d25..db0fe0c9d26 100644 --- a/2020/26xxx/CVE-2020-26419.json +++ b/2020/26xxx/CVE-2020-26419.json @@ -73,6 +73,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-138674557c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26420.json b/2020/26xxx/CVE-2020-26420.json index dbeccaf5bea..9fb60a795c0 100644 --- a/2020/26xxx/CVE-2020-26420.json +++ b/2020/26xxx/CVE-2020-26420.json @@ -76,6 +76,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-138674557c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26421.json b/2020/26xxx/CVE-2020-26421.json index 8071da74056..bdf37c1ce00 100644 --- a/2020/26xxx/CVE-2020-26421.json +++ b/2020/26xxx/CVE-2020-26421.json @@ -81,6 +81,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-138674557c", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M75HYXU36SP6GHIDPHNZGJKEO6TX4C4Y/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/26xxx/CVE-2020-26422.json b/2020/26xxx/CVE-2020-26422.json index d129d6de2e9..cc99c75979e 100644 --- a/2020/26xxx/CVE-2020-26422.json +++ b/2020/26xxx/CVE-2020-26422.json @@ -63,6 +63,9 @@ "refsource": "GENTOO", "name": "GLSA-202101-12", "url": "https://security.gentoo.org/glsa/202101-12" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27193.json b/2020/27xxx/CVE-2020-27193.json index 87cab929a6e..d8ae2701984 100644 --- a/2020/27xxx/CVE-2020-27193.json +++ b/2020/27xxx/CVE-2020-27193.json @@ -66,6 +66,9 @@ "refsource": "CONFIRM", "name": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/", "url": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27216.json b/2020/27xxx/CVE-2020-27216.json index 5565bfd4ac3..48e6c5f3f92 100644 --- a/2020/27xxx/CVE-2020-27216.json +++ b/2020/27xxx/CVE-2020-27216.json @@ -740,6 +740,9 @@ "refsource": "MLIST", "name": "[knox-dev] 20210601 [jira] [Created] (KNOX-2615) Upgrade to jetty-webapp.9.4.33 due to CVE-2020-27216", "url": "https://lists.apache.org/thread.html/r9d9b4b93df7f92cdf1147db0fc169be1776c93d1fbc63bc65721fffd@%3Cdev.knox.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index 13f30b9ef83..c7d754d3f62 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -617,6 +617,9 @@ "refsource": "MLIST", "name": "[samza-commits] 20210310 [GitHub] [samza] Telesia opened a new pull request #1471: SAMZA-2630: Upgrade dependencies for security fixes", "url": "https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27223.json b/2020/27xxx/CVE-2020-27223.json index 6a2e5a5ef85..4a702b2a7db 100644 --- a/2020/27xxx/CVE-2020-27223.json +++ b/2020/27xxx/CVE-2020-27223.json @@ -48,6 +48,7 @@ { "lang": "eng", "value": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of \u201cquality\u201d (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values." + } ] }, @@ -381,6 +382,9 @@ "refsource": "MLIST", "name": "[solr-issues] 20210507 [jira] [Updated] (SOLR-15325) High security vulnerability in Jetty library bundled within Solr - CVE-2020-27223 (+1)", "url": "https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/27xxx/CVE-2020-27841.json b/2020/27xxx/CVE-2020-27841.json index 80d222f6af5..b047fbc360b 100644 --- a/2020/27xxx/CVE-2020-27841.json +++ b/2020/27xxx/CVE-2020-27841.json @@ -68,6 +68,9 @@ "refsource": "DEBIAN", "name": "DSA-4882", "url": "https://www.debian.org/security/2021/dsa-4882" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27842.json b/2020/27xxx/CVE-2020-27842.json index 6298d0df233..cdbfd24c06a 100644 --- a/2020/27xxx/CVE-2020-27842.json +++ b/2020/27xxx/CVE-2020-27842.json @@ -63,6 +63,9 @@ "refsource": "DEBIAN", "name": "DSA-4882", "url": "https://www.debian.org/security/2021/dsa-4882" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27843.json b/2020/27xxx/CVE-2020-27843.json index 1ef139d3a3d..e86a2095748 100644 --- a/2020/27xxx/CVE-2020-27843.json +++ b/2020/27xxx/CVE-2020-27843.json @@ -63,6 +63,9 @@ "refsource": "DEBIAN", "name": "DSA-4882", "url": "https://www.debian.org/security/2021/dsa-4882" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27844.json b/2020/27xxx/CVE-2020-27844.json index a1ff786e534..95d9bddb9f8 100644 --- a/2020/27xxx/CVE-2020-27844.json +++ b/2020/27xxx/CVE-2020-27844.json @@ -58,6 +58,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27845.json b/2020/27xxx/CVE-2020-27845.json index 70dd6144ff2..68006934b6c 100644 --- a/2020/27xxx/CVE-2020-27845.json +++ b/2020/27xxx/CVE-2020-27845.json @@ -68,6 +68,9 @@ "refsource": "DEBIAN", "name": "DSA-4882", "url": "https://www.debian.org/security/2021/dsa-4882" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/28xxx/CVE-2020-28052.json b/2020/28xxx/CVE-2020-28052.json index ef28ebecdb6..ebc9209d128 100644 --- a/2020/28xxx/CVE-2020-28052.json +++ b/2020/28xxx/CVE-2020-28052.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[solr-issues] 20210525 [jira] [Created] (SOLR-15431) Security vulnerability with Bouncy Castle library within Apache Solr 8.8.2", "url": "https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/28xxx/CVE-2020-28196.json b/2020/28xxx/CVE-2020-28196.json index 4b155471a54..133353c7fdc 100644 --- a/2020/28xxx/CVE-2020-28196.json +++ b/2020/28xxx/CVE-2020-28196.json @@ -96,6 +96,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0002/", "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/35xxx/CVE-2020-35490.json b/2020/35xxx/CVE-2020-35490.json index de50c61fa45..849ef61e8a2 100644 --- a/2020/35xxx/CVE-2020-35490.json +++ b/2020/35xxx/CVE-2020-35490.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/35xxx/CVE-2020-35491.json b/2020/35xxx/CVE-2020-35491.json index ccac953bb66..8d356cb34ed 100644 --- a/2020/35xxx/CVE-2020-35491.json +++ b/2020/35xxx/CVE-2020-35491.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/35xxx/CVE-2020-35728.json b/2020/35xxx/CVE-2020-35728.json index 9fb243e20ff..631a1259372 100644 --- a/2020/35xxx/CVE-2020-35728.json +++ b/2020/35xxx/CVE-2020-35728.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36179.json b/2020/36xxx/CVE-2020-36179.json index 7b734d06a46..3c11b088231 100644 --- a/2020/36xxx/CVE-2020-36179.json +++ b/2020/36xxx/CVE-2020-36179.json @@ -76,6 +76,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36180.json b/2020/36xxx/CVE-2020-36180.json index 82f619066e0..10e3baac219 100644 --- a/2020/36xxx/CVE-2020-36180.json +++ b/2020/36xxx/CVE-2020-36180.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36181.json b/2020/36xxx/CVE-2020-36181.json index 16346656282..7f671ce65ab 100644 --- a/2020/36xxx/CVE-2020-36181.json +++ b/2020/36xxx/CVE-2020-36181.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36182.json b/2020/36xxx/CVE-2020-36182.json index 5b65f91b3e4..49c2edccbb6 100644 --- a/2020/36xxx/CVE-2020-36182.json +++ b/2020/36xxx/CVE-2020-36182.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36183.json b/2020/36xxx/CVE-2020-36183.json index ee8004cff75..7d1b0671a01 100644 --- a/2020/36xxx/CVE-2020-36183.json +++ b/2020/36xxx/CVE-2020-36183.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36184.json b/2020/36xxx/CVE-2020-36184.json index ff7419117dc..d0c5df81bf4 100644 --- a/2020/36xxx/CVE-2020-36184.json +++ b/2020/36xxx/CVE-2020-36184.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36185.json b/2020/36xxx/CVE-2020-36185.json index 7a32ed2b387..b727aa01f41 100644 --- a/2020/36xxx/CVE-2020-36185.json +++ b/2020/36xxx/CVE-2020-36185.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36186.json b/2020/36xxx/CVE-2020-36186.json index 28c6001359b..aca060fe2c9 100644 --- a/2020/36xxx/CVE-2020-36186.json +++ b/2020/36xxx/CVE-2020-36186.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36187.json b/2020/36xxx/CVE-2020-36187.json index e9e4ec72a65..765c97a6cb0 100644 --- a/2020/36xxx/CVE-2020-36187.json +++ b/2020/36xxx/CVE-2020-36187.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36188.json b/2020/36xxx/CVE-2020-36188.json index 5293d45d2c6..d6d7981ec51 100644 --- a/2020/36xxx/CVE-2020-36188.json +++ b/2020/36xxx/CVE-2020-36188.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/36xxx/CVE-2020-36189.json b/2020/36xxx/CVE-2020-36189.json index 5adbe94ba5d..6ce46c76d45 100644 --- a/2020/36xxx/CVE-2020-36189.json +++ b/2020/36xxx/CVE-2020-36189.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210424 [SECURITY] [DLA 2638-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/5xxx/CVE-2020-5359.json b/2020/5xxx/CVE-2020-5359.json index 49632665761..7eeae56a311 100644 --- a/2020/5xxx/CVE-2020-5359.json +++ b/2020/5xxx/CVE-2020-5359.json @@ -66,6 +66,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities", "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/5xxx/CVE-2020-5360.json b/2020/5xxx/CVE-2020-5360.json index 341f4e22c25..b64e1bd5409 100644 --- a/2020/5xxx/CVE-2020-5360.json +++ b/2020/5xxx/CVE-2020-5360.json @@ -66,6 +66,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities", "name": "https://www.dell.com/support/kbdoc/en-us/000181098/dsa-2020-114-dell-bsafe-micro-edition-suite-multiple-security-vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index 49f7e5e8fe0..ecd1d92491d 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -263,6 +263,9 @@ "refsource": "MLIST", "name": "[rocketmq-dev] 20210317 [GitHub] [rocketmq-externals] vongosling commented on issue #690: Spring Framework CVE-2020-5398", "url": "https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5407.json b/2020/5xxx/CVE-2020-5407.json index a0c24c7223e..d3d90564070 100644 --- a/2020/5xxx/CVE-2020-5407.json +++ b/2020/5xxx/CVE-2020-5407.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5408.json b/2020/5xxx/CVE-2020-5408.json index 3ab54ecf684..b444209518e 100644 --- a/2020/5xxx/CVE-2020-5408.json +++ b/2020/5xxx/CVE-2020-5408.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5413.json b/2020/5xxx/CVE-2020-5413.json index b88b226af2e..ad9590b9b3f 100644 --- a/2020/5xxx/CVE-2020-5413.json +++ b/2020/5xxx/CVE-2020-5413.json @@ -78,6 +78,9 @@ "refsource": "CONFIRM", "url": "https://tanzu.vmware.com/security/cve-2020-5413", "name": "https://tanzu.vmware.com/security/cve-2020-5413" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5421.json b/2020/5xxx/CVE-2020-5421.json index 04fdd4b0109..33a741adab0 100644 --- a/2020/5xxx/CVE-2020-5421.json +++ b/2020/5xxx/CVE-2020-5421.json @@ -168,6 +168,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210513-0009/", "url": "https://security.netapp.com/advisory/ntap-20210513-0009/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7059.json b/2020/7xxx/CVE-2020-7059.json index f7537e38172..e10b9436856 100644 --- a/2020/7xxx/CVE-2020-7059.json +++ b/2020/7xxx/CVE-2020-7059.json @@ -150,6 +150,9 @@ "refsource": "BUGTRAQ", "name": "20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update", "url": "https://seclists.org/bugtraq/2021/Jan/3" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7060.json b/2020/7xxx/CVE-2020-7060.json index 4556ef51968..a3505bd1b12 100644 --- a/2020/7xxx/CVE-2020-7060.json +++ b/2020/7xxx/CVE-2020-7060.json @@ -150,6 +150,9 @@ "refsource": "BUGTRAQ", "name": "20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update", "url": "https://seclists.org/bugtraq/2021/Jan/3" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7067.json b/2020/7xxx/CVE-2020-7067.json index 08240fcf18a..c32c263a733 100644 --- a/2020/7xxx/CVE-2020-7067.json +++ b/2020/7xxx/CVE-2020-7067.json @@ -114,6 +114,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200504-0001/", "url": "https://security.netapp.com/advisory/ntap-20200504-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7069.json b/2020/7xxx/CVE-2020-7069.json index a008e0d5a07..e69b1f1816c 100644 --- a/2020/7xxx/CVE-2020-7069.json +++ b/2020/7xxx/CVE-2020-7069.json @@ -140,6 +140,9 @@ "refsource": "DEBIAN", "name": "DSA-4856", "url": "https://www.debian.org/security/2021/dsa-4856" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7760.json b/2020/7xxx/CVE-2020-7760.json index 892a2cb6fae..3307d13e938 100644 --- a/2020/7xxx/CVE-2020-7760.json +++ b/2020/7xxx/CVE-2020-7760.json @@ -109,6 +109,9 @@ "refsource": "DEBIAN", "name": "DSA-4789", "url": "https://www.debian.org/security/2020/dsa-4789" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7774.json b/2020/7xxx/CVE-2020-7774.json index aa50fdc0aa1..21f680462b3 100644 --- a/2020/7xxx/CVE-2020-7774.json +++ b/2020/7xxx/CVE-2020-7774.json @@ -66,6 +66,9 @@ "refsource": "MISC", "url": "https://github.com/yargs/y18n/issues/96", "name": "https://github.com/yargs/y18n/issues/96" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7919.json b/2020/7xxx/CVE-2020-7919.json index 02df7b60193..a21f6d78444 100644 --- a/2020/7xxx/CVE-2020-7919.json +++ b/2020/7xxx/CVE-2020-7919.json @@ -81,6 +81,9 @@ "refsource": "DEBIAN", "name": "DSA-4848", "url": "https://www.debian.org/security/2021/dsa-4848" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/8xxx/CVE-2020-8203.json b/2020/8xxx/CVE-2020-8203.json index bd372de8902..595b5973546 100644 --- a/2020/8xxx/CVE-2020-8203.json +++ b/2020/8xxx/CVE-2020-8203.json @@ -58,6 +58,9 @@ "refsource": "MISC", "name": "https://github.com/lodash/lodash/issues/4874", "url": "https://github.com/lodash/lodash/issues/4874" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8277.json b/2020/8xxx/CVE-2020-8277.json index aeb1cf32db6..9a4c4720c21 100644 --- a/2020/8xxx/CVE-2020-8277.json +++ b/2020/8xxx/CVE-2020-8277.json @@ -88,6 +88,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-ee913722db", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEIV4CH6KNVZK63Y6EKVN2XDW7IHSJBJ/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8284.json b/2020/8xxx/CVE-2020-8284.json index 88216625613..d1879c8ef91 100644 --- a/2020/8xxx/CVE-2020-8284.json +++ b/2020/8xxx/CVE-2020-8284.json @@ -98,6 +98,9 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212327", "url": "https://support.apple.com/kb/HT212327" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8285.json b/2020/8xxx/CVE-2020-8285.json index 25dae9eac28..e179f82ca03 100644 --- a/2020/8xxx/CVE-2020-8285.json +++ b/2020/8xxx/CVE-2020-8285.json @@ -108,6 +108,9 @@ "refsource": "FULLDISC", "name": "20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina", "url": "http://seclists.org/fulldisclosure/2021/Apr/51" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8286.json b/2020/8xxx/CVE-2020-8286.json index b7dba482e8b..ef3519719eb 100644 --- a/2020/8xxx/CVE-2020-8286.json +++ b/2020/8xxx/CVE-2020-8286.json @@ -118,6 +118,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8908.json b/2020/8xxx/CVE-2020-8908.json index 36ee99e7b13..c8bf12240b3 100644 --- a/2020/8xxx/CVE-2020-8908.json +++ b/2020/8xxx/CVE-2020-8908.json @@ -146,6 +146,9 @@ "refsource": "MLIST", "name": "[arrow-github] 20210610 [GitHub] [arrow] projjal opened a new pull request #10501: ARROW-13032: Update guava version", "url": "https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9281.json b/2020/9xxx/CVE-2020-9281.json index daedad329f2..08a9e678c53 100644 --- a/2020/9xxx/CVE-2020-9281.json +++ b/2020/9xxx/CVE-2020-9281.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/9xxx/CVE-2020-9327.json b/2020/9xxx/CVE-2020-9327.json index 83bb52c43c7..b62ac95a8da 100644 --- a/2020/9xxx/CVE-2020-9327.json +++ b/2020/9xxx/CVE-2020-9327.json @@ -96,6 +96,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2021.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2020/9xxx/CVE-2020-9480.json b/2020/9xxx/CVE-2020-9480.json index 0c69cf0d896..7822da2dc89 100644 --- a/2020/9xxx/CVE-2020-9480.json +++ b/2020/9xxx/CVE-2020-9480.json @@ -68,6 +68,9 @@ "refsource": "MLIST", "name": "[doris-commits] 20210402 [GitHub] [incubator-doris] zh0122 opened a new pull request #5593: [FE][Bug] Update Spark version to fix a security issue", "url": "https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 1f1bee780f9..b079c0a9959 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -208,6 +208,9 @@ "refsource": "MLIST", "name": "[tomee-commits] 20210522 [jira] [Closed] (TOMEE-2909) Impact of security vulnerability(CVE-2020-9484) on TOMEE plus (7.0.7)", "url": "https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9488.json b/2020/9xxx/CVE-2020-9488.json index 664e1d2ad2c..67f9ba18e1e 100644 --- a/2020/9xxx/CVE-2020-9488.json +++ b/2020/9xxx/CVE-2020-9488.json @@ -258,6 +258,9 @@ "refsource": "MLIST", "name": "[flink-issues] 20210510 [GitHub] [flink] zentol opened a new pull request #15879: [FLINK-22407][build] Bump log4j to 2.24.1", "url": "https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9489.json b/2020/9xxx/CVE-2020-9489.json index a8a175e475f..0b787ad4b32 100644 --- a/2020/9xxx/CVE-2020-9489.json +++ b/2020/9xxx/CVE-2020-9489.json @@ -58,6 +58,9 @@ "refsource": "MLIST", "name": "[james-notifications] 20210501 [GitHub] [james-project] chibenwa opened a new pull request #414: [UPGRADE] Adopt Apache Tika 1.26", "url": "https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/20xxx/CVE-2021-20227.json b/2021/20xxx/CVE-2021-20227.json index 574209e5a8c..cd686b7504f 100644 --- a/2021/20xxx/CVE-2021-20227.json +++ b/2021/20xxx/CVE-2021-20227.json @@ -63,6 +63,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210423-0010/", "url": "https://security.netapp.com/advisory/ntap-20210423-0010/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 84eb2596f24..dd6619797bb 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -236,6 +236,9 @@ "refsource": "DEBIAN", "name": "DSA-4885", "url": "https://www.debian.org/security/2021/dsa-4885" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21345.json b/2021/21xxx/CVE-2021-21345.json index 796158ba871..558d11923c8 100644 --- a/2021/21xxx/CVE-2021-21345.json +++ b/2021/21xxx/CVE-2021-21345.json @@ -116,6 +116,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210430-0002/", "url": "https://security.netapp.com/advisory/ntap-20210430-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22112.json b/2021/22xxx/CVE-2021-22112.json index 9c9ab64afa2..1ae71ed8d71 100644 --- a/2021/22xxx/CVE-2021-22112.json +++ b/2021/22xxx/CVE-2021-22112.json @@ -58,6 +58,9 @@ "refsource": "MLIST", "name": "[nifi-issues] 20210510 [GitHub] [nifi] exceptionfactory opened a new pull request #5066: NIFI-8502 Upgrade Spring Framework to 5.3.6", "url": "https://lists.apache.org/thread.html/redbd004a503b3520ae5746c2ab5e93fd7da807a8c128e60d2002cd9b@%3Cissues.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22173.json b/2021/22xxx/CVE-2021-22173.json index 98e2d9580e1..5b38139a49d 100644 --- a/2021/22xxx/CVE-2021-22173.json +++ b/2021/22xxx/CVE-2021-22173.json @@ -68,6 +68,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-5522a34aa0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22174.json b/2021/22xxx/CVE-2021-22174.json index 8fbbc038f60..21bd5e12b35 100644 --- a/2021/22xxx/CVE-2021-22174.json +++ b/2021/22xxx/CVE-2021-22174.json @@ -68,6 +68,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-5522a34aa0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYXLKQJ3D632XSG6VO7M4YFDAG6GRCLY/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22191.json b/2021/22xxx/CVE-2021-22191.json index 8f577f2b4f2..9ae2bc83511 100644 --- a/2021/22xxx/CVE-2021-22191.json +++ b/2021/22xxx/CVE-2021-22191.json @@ -61,6 +61,9 @@ "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22191.json", "refsource": "CONFIRM" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22883.json b/2021/22xxx/CVE-2021-22883.json index 05b96f172eb..7cd6f0f5ecf 100644 --- a/2021/22xxx/CVE-2021-22883.json +++ b/2021/22xxx/CVE-2021-22883.json @@ -73,6 +73,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22884.json b/2021/22xxx/CVE-2021-22884.json index 0c4f1f2e195..7fc9186061c 100644 --- a/2021/22xxx/CVE-2021-22884.json +++ b/2021/22xxx/CVE-2021-22884.json @@ -78,6 +78,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210416-0001/", "url": "https://security.netapp.com/advisory/ntap-20210416-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23336.json b/2021/23xxx/CVE-2021-23336.json index 968fa84d2e0..c8d117dc060 100644 --- a/2021/23xxx/CVE-2021-23336.json +++ b/2021/23xxx/CVE-2021-23336.json @@ -234,6 +234,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-12df7f7382", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23839.json b/2021/23xxx/CVE-2021-23839.json index 730bf30203c..1bf587d2584 100644 --- a/2021/23xxx/CVE-2021-23839.json +++ b/2021/23xxx/CVE-2021-23839.json @@ -81,6 +81,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0009/", "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2021/23xxx/CVE-2021-23840.json b/2021/23xxx/CVE-2021-23840.json index db0578b21fa..2dcaa7cbf72 100644 --- a/2021/23xxx/CVE-2021-23840.json +++ b/2021/23xxx/CVE-2021-23840.json @@ -114,6 +114,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2021/23xxx/CVE-2021-23841.json b/2021/23xxx/CVE-2021-23841.json index 4cd9253d32a..55287fca547 100644 --- a/2021/23xxx/CVE-2021-23841.json +++ b/2021/23xxx/CVE-2021-23841.json @@ -144,6 +144,9 @@ "refsource": "FULLDISC", "name": "20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6", "url": "http://seclists.org/fulldisclosure/2021/May/67" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2021/26xxx/CVE-2021-26117.json b/2021/26xxx/CVE-2021-26117.json index ff8287a40bf..c0b3b7b2ee9 100644 --- a/2021/26xxx/CVE-2021-26117.json +++ b/2021/26xxx/CVE-2021-26117.json @@ -159,6 +159,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20210421 [jira] [Updated] (AMQ-8246) CVE-2021-26117 still exists on 5.16.1", "url": "https://lists.apache.org/thread.html/ra255ddfc8b613b80e9fa22ff3e106168b245f38a22316bfb54d21159@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3449.json b/2021/3xxx/CVE-2021-3449.json index 16c0676137f..ddb2870ed1a 100644 --- a/2021/3xxx/CVE-2021-3449.json +++ b/2021/3xxx/CVE-2021-3449.json @@ -156,6 +156,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-10", "url": "https://www.tenable.com/security/tns-2021-10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } diff --git a/2021/3xxx/CVE-2021-3450.json b/2021/3xxx/CVE-2021-3450.json index 99511a3d4e4..be7d6efc8ae 100644 --- a/2021/3xxx/CVE-2021-3450.json +++ b/2021/3xxx/CVE-2021-3450.json @@ -151,6 +151,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-09", "url": "https://www.tenable.com/security/tns-2021-09" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] }