Bill Situ<Bill.Situ@Oracle.com>

On branch cna/Oracle/CPU2021Apr3rdv2
 Changes to be committed:
	modified:   2014/9xxx/CVE-2014-9515.json
	modified:   2016/2xxx/CVE-2016-2542.json
	modified:   2016/5xxx/CVE-2016-5725.json
	modified:   2016/7xxx/CVE-2016-7103.json
	modified:   2016/9xxx/CVE-2016-9775.json
	modified:   2017/1000xxx/CVE-2017-1000061.json
	modified:   2017/12xxx/CVE-2017-12626.json
	modified:   2017/14xxx/CVE-2017-14735.json
	modified:   2017/18xxx/CVE-2017-18640.json
	modified:   2017/5xxx/CVE-2017-5645.json
	modified:   2018/1000xxx/CVE-2018-1000180.json
	modified:   2018/1000xxx/CVE-2018-1000613.json
	modified:   2018/1000xxx/CVE-2018-1000632.json
	modified:   2018/14xxx/CVE-2018-14040.json
	modified:   2018/14xxx/CVE-2018-14041.json
	modified:   2018/14xxx/CVE-2018-14042.json
	modified:   2018/14xxx/CVE-2018-14550.json
	modified:   2018/14xxx/CVE-2018-14613.json
	modified:   2018/16xxx/CVE-2018-16884.json
	modified:   2018/1xxx/CVE-2018-1285.json
	modified:   2018/20xxx/CVE-2018-20843.json
	modified:   2018/8xxx/CVE-2018-8032.json
	modified:   2019/0xxx/CVE-2019-0219.json
	modified:   2019/0xxx/CVE-2019-0221.json
	modified:   2019/0xxx/CVE-2019-0227.json
	modified:   2019/0xxx/CVE-2019-0228.json
	modified:   2019/0xxx/CVE-2019-0230.json
	modified:   2019/0xxx/CVE-2019-0232.json
	modified:   2019/0xxx/CVE-2019-0233.json
	modified:   2019/10xxx/CVE-2019-10072.json
	modified:   2019/10xxx/CVE-2019-10080.json
	modified:   2019/10xxx/CVE-2019-10086.json
	modified:   2019/10xxx/CVE-2019-10098.json
	modified:   2019/10xxx/CVE-2019-10173.json
	modified:   2019/10xxx/CVE-2019-10246.json
	modified:   2019/10xxx/CVE-2019-10247.json
	modified:   2019/10xxx/CVE-2019-10638.json
	modified:   2019/10xxx/CVE-2019-10639.json
	modified:   2019/11xxx/CVE-2019-11048.json
	modified:   2019/11xxx/CVE-2019-11358.json
	modified:   2019/11xxx/CVE-2019-11487.json
	modified:   2019/11xxx/CVE-2019-11599.json
	modified:   2019/12xxx/CVE-2019-12086.json
	modified:   2019/12xxx/CVE-2019-12399.json
	modified:   2019/12xxx/CVE-2019-12402.json
	modified:   2019/12xxx/CVE-2019-12406.json
	modified:   2019/12xxx/CVE-2019-12415.json
	modified:   2019/12xxx/CVE-2019-12419.json
	modified:   2019/12xxx/CVE-2019-12423.json
	modified:   2019/14xxx/CVE-2019-14379.json
	modified:   2019/14xxx/CVE-2019-14898.json
	modified:   2019/15xxx/CVE-2019-15218.json
	modified:   2019/16xxx/CVE-2019-16746.json
	modified:   2019/16xxx/CVE-2019-16942.json
	modified:   2019/17xxx/CVE-2019-17075.json
	modified:   2019/17xxx/CVE-2019-17133.json
	modified:   2019/17xxx/CVE-2019-17195.json
	modified:   2019/17xxx/CVE-2019-17495.json
	modified:   2019/17xxx/CVE-2019-17566.json
	modified:   2019/17xxx/CVE-2019-17571.json
	modified:   2019/17xxx/CVE-2019-17573.json
	modified:   2019/17xxx/CVE-2019-17632.json
	modified:   2019/17xxx/CVE-2019-17638.json
	modified:   2019/18xxx/CVE-2019-18885.json
	modified:   2019/19xxx/CVE-2019-19052.json
	modified:   2019/19xxx/CVE-2019-19063.json
	modified:   2019/19xxx/CVE-2019-19066.json
	modified:   2019/19xxx/CVE-2019-19073.json
	modified:   2019/19xxx/CVE-2019-19074.json
	modified:   2019/19xxx/CVE-2019-19078.json
	modified:   2019/19xxx/CVE-2019-19535.json
	modified:   2019/19xxx/CVE-2019-19922.json
	modified:   2019/1xxx/CVE-2019-1241.json
	modified:   2019/1xxx/CVE-2019-1551.json
	modified:   2019/20xxx/CVE-2019-20812.json
	modified:   2019/3xxx/CVE-2019-3738.json
	modified:   2019/3xxx/CVE-2019-3739.json
	modified:   2019/3xxx/CVE-2019-3740.json
	modified:   2019/3xxx/CVE-2019-3773.json
	modified:   2019/3xxx/CVE-2019-3874.json
	modified:   2019/3xxx/CVE-2019-3900.json
	modified:   2019/5xxx/CVE-2019-5063.json
	modified:   2019/5xxx/CVE-2019-5064.json
	modified:   2019/5xxx/CVE-2019-5108.json
	modified:   2019/7xxx/CVE-2019-7317.json
	modified:   2019/8xxx/CVE-2019-8331.json
	modified:   2020/10xxx/CVE-2020-10188.json
	modified:   2020/10xxx/CVE-2020-10543.json
	modified:   2020/10xxx/CVE-2020-10683.json
	modified:   2020/10xxx/CVE-2020-10751.json
	modified:   2020/10xxx/CVE-2020-10769.json
	modified:   2020/10xxx/CVE-2020-10878.json
	modified:   2020/11xxx/CVE-2020-11022.json
	modified:   2020/11xxx/CVE-2020-11023.json
	modified:   2020/11xxx/CVE-2020-11612.json
	modified:   2020/11xxx/CVE-2020-11655.json
	modified:   2020/11xxx/CVE-2020-11656.json
	modified:   2020/11xxx/CVE-2020-11973.json
	modified:   2020/11xxx/CVE-2020-11979.json
	modified:   2020/11xxx/CVE-2020-11987.json
	modified:   2020/11xxx/CVE-2020-11994.json
	modified:   2020/11xxx/CVE-2020-11998.json
	modified:   2020/12xxx/CVE-2020-12114.json
	modified:   2020/12xxx/CVE-2020-12723.json
	modified:   2020/12xxx/CVE-2020-12771.json
	modified:   2020/13xxx/CVE-2020-13434.json
	modified:   2020/13xxx/CVE-2020-13435.json
	modified:   2020/13xxx/CVE-2020-13871.json
	modified:   2020/13xxx/CVE-2020-13934.json
	modified:   2020/13xxx/CVE-2020-13935.json
	modified:   2020/13xxx/CVE-2020-13943.json
	modified:   2020/13xxx/CVE-2020-13947.json
	modified:   2020/13xxx/CVE-2020-13954.json
	modified:   2020/13xxx/CVE-2020-13956.json
	modified:   2020/14xxx/CVE-2020-14039.json
	modified:   2020/14xxx/CVE-2020-14060.json
	modified:   2020/14xxx/CVE-2020-14061.json
	modified:   2020/14xxx/CVE-2020-14062.json
	modified:   2020/14xxx/CVE-2020-14195.json
	modified:   2020/15xxx/CVE-2020-15358.json
	modified:   2020/15xxx/CVE-2020-15586.json
	modified:   2020/16xxx/CVE-2020-16166.json
	modified:   2020/16xxx/CVE-2020-16845.json
	modified:   2020/17xxx/CVE-2020-17521.json
	modified:   2020/17xxx/CVE-2020-17527.json
	modified:   2020/17xxx/CVE-2020-17530.json
	modified:   2020/1xxx/CVE-2020-1472.json
	modified:   2020/1xxx/CVE-2020-1927.json
	modified:   2020/1xxx/CVE-2020-1941.json
	modified:   2020/1xxx/CVE-2020-1945.json
	modified:   2020/1xxx/CVE-2020-1967.json
	modified:   2020/1xxx/CVE-2020-1968.json
	modified:   2020/1xxx/CVE-2020-1971.json
	modified:   2020/24xxx/CVE-2020-24394.json
	modified:   2020/24xxx/CVE-2020-24553.json
	modified:   2020/24xxx/CVE-2020-24616.json
	modified:   2020/24xxx/CVE-2020-24750.json
	modified:   2020/25xxx/CVE-2020-25649.json
	modified:   2020/26xxx/CVE-2020-26217.json
	modified:   2020/26xxx/CVE-2020-26418.json
	modified:   2020/26xxx/CVE-2020-26419.json
	modified:   2020/26xxx/CVE-2020-26420.json
	modified:   2020/26xxx/CVE-2020-26421.json
	modified:   2020/26xxx/CVE-2020-26422.json
	modified:   2020/27xxx/CVE-2020-27193.json
	modified:   2020/27xxx/CVE-2020-27216.json
	modified:   2020/27xxx/CVE-2020-27218.json
	modified:   2020/27xxx/CVE-2020-27223.json
	modified:   2020/27xxx/CVE-2020-27841.json
	modified:   2020/27xxx/CVE-2020-27842.json
	modified:   2020/27xxx/CVE-2020-27843.json
	modified:   2020/27xxx/CVE-2020-27844.json
	modified:   2020/27xxx/CVE-2020-27845.json
	modified:   2020/28xxx/CVE-2020-28052.json
	modified:   2020/28xxx/CVE-2020-28196.json
	modified:   2020/35xxx/CVE-2020-35490.json
	modified:   2020/35xxx/CVE-2020-35491.json
	modified:   2020/35xxx/CVE-2020-35728.json
	modified:   2020/36xxx/CVE-2020-36179.json
	modified:   2020/36xxx/CVE-2020-36180.json
	modified:   2020/36xxx/CVE-2020-36181.json
	modified:   2020/36xxx/CVE-2020-36182.json
	modified:   2020/36xxx/CVE-2020-36183.json
	modified:   2020/36xxx/CVE-2020-36184.json
	modified:   2020/36xxx/CVE-2020-36185.json
	modified:   2020/36xxx/CVE-2020-36186.json
	modified:   2020/36xxx/CVE-2020-36187.json
	modified:   2020/36xxx/CVE-2020-36188.json
	modified:   2020/36xxx/CVE-2020-36189.json
	modified:   2020/5xxx/CVE-2020-5359.json
	modified:   2020/5xxx/CVE-2020-5360.json
	modified:   2020/5xxx/CVE-2020-5398.json
	modified:   2020/5xxx/CVE-2020-5407.json
	modified:   2020/5xxx/CVE-2020-5408.json
	modified:   2020/5xxx/CVE-2020-5413.json
	modified:   2020/5xxx/CVE-2020-5421.json
	modified:   2020/7xxx/CVE-2020-7059.json
	modified:   2020/7xxx/CVE-2020-7060.json
	modified:   2020/7xxx/CVE-2020-7067.json
	modified:   2020/7xxx/CVE-2020-7069.json
	modified:   2020/7xxx/CVE-2020-7760.json
	modified:   2020/7xxx/CVE-2020-7774.json
	modified:   2020/7xxx/CVE-2020-7919.json
	modified:   2020/8xxx/CVE-2020-8203.json
	modified:   2020/8xxx/CVE-2020-8277.json
	modified:   2020/8xxx/CVE-2020-8284.json
	modified:   2020/8xxx/CVE-2020-8285.json
	modified:   2020/8xxx/CVE-2020-8286.json
	modified:   2020/8xxx/CVE-2020-8908.json
	modified:   2020/9xxx/CVE-2020-9281.json
	modified:   2020/9xxx/CVE-2020-9327.json
	modified:   2020/9xxx/CVE-2020-9480.json
	modified:   2020/9xxx/CVE-2020-9484.json
	modified:   2020/9xxx/CVE-2020-9488.json
	modified:   2020/9xxx/CVE-2020-9489.json
	modified:   2021/20xxx/CVE-2021-20227.json
	modified:   2021/21xxx/CVE-2021-21290.json
	modified:   2021/21xxx/CVE-2021-21345.json
	modified:   2021/22xxx/CVE-2021-22112.json
	modified:   2021/22xxx/CVE-2021-22173.json
	modified:   2021/22xxx/CVE-2021-22174.json
	modified:   2021/22xxx/CVE-2021-22191.json
	modified:   2021/22xxx/CVE-2021-22883.json
	modified:   2021/22xxx/CVE-2021-22884.json
	modified:   2021/23xxx/CVE-2021-23336.json
	modified:   2021/23xxx/CVE-2021-23839.json
	modified:   2021/23xxx/CVE-2021-23840.json
	modified:   2021/23xxx/CVE-2021-23841.json
	modified:   2021/26xxx/CVE-2021-26117.json
	modified:   2021/3xxx/CVE-2021-3449.json
	modified:   2021/3xxx/CVE-2021-3450.json
This commit is contained in:
Bill Situ 2021-06-11 10:44:45 -07:00
parent 9a983ca84b
commit afc4b1c1ac
211 changed files with 634 additions and 0 deletions

View File

@ -86,6 +86,9 @@
"refsource": "MISC",
"name": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c",
"url": "https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334c"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -76,6 +76,9 @@
"refsource": "MISC",
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-03",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-287-03"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -156,6 +156,9 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"name": "https://security.netapp.com/advisory/ntap-20180731-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180731-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -68,6 +68,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-9573355ff4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3PWHBRWXR3RNPHDSTQI6UWDG5ETOQ7VR/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -102,6 +102,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -86,6 +86,9 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -296,6 +296,9 @@
"refsource": "MLIST",
"name": "[phoenix-dev] 20210419 [GitHub] [phoenix-omid] richardantal opened a new pull request #93: OMID-207 Upgrade to snakeyaml 1.26 due to CVE-2017-18640",
"url": "https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -421,6 +421,9 @@
"refsource": "MLIST",
"name": "[beam-issues] 20210528 [jira] [Created] (BEAM-12422) Vendored gRPC 1.36.0 is using a log4j version with security issues",
"url": "https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -154,6 +154,9 @@
"refsource": "MISC",
"name": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -104,6 +104,9 @@
"name": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc",
"refsource": "CONFIRM",
"url": "https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -189,6 +189,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-8015a8cdc4",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJULAHVR3I5SX7OSMXAG75IMNSAYOXGA/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -136,6 +136,9 @@
"refsource": "MLIST",
"name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
"url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -131,6 +131,9 @@
"refsource": "MLIST",
"name": "[hbase-issues] 20201116 [GitHub] [hbase] symat opened a new pull request #2661: HBASE-25261 Upgrade Bootstrap to 3.4.1",
"url": "https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -126,6 +126,9 @@
"refsource": "MLIST",
"name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
"url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -66,6 +66,9 @@
"refsource": "GENTOO",
"name": "GLSA-201908-02",
"url": "https://security.gentoo.org/glsa/201908-02"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -166,6 +166,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -108,6 +108,9 @@
"refsource": "MISC",
"name": "https://issues.apache.org/jira/browse/LOG4NET-575",
"url": "https://issues.apache.org/jira/browse/LOG4NET-575"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -141,6 +141,9 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K51011533",
"url": "https://support.f5.com/csp/article/K51011533"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -97,6 +97,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -53,6 +53,9 @@
"refsource": "MLIST",
"name": "[cordova-dev] 20191128 CVE-2019-0219: Apache Cordova InAppBrowser Privilege Escalation (Android)",
"url": "https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -184,6 +184,9 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -78,6 +78,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -88,6 +88,9 @@
"refsource": "MLIST",
"name": "[pdfbox-users] 20210120 Security Vulnerability with PDFbox 1.8.16",
"url": "https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -78,6 +78,9 @@
"refsource": "MLIST",
"name": "[announce] 20210223 Re: Apache Software Foundation Security Report: 2020",
"url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -204,6 +204,9 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -58,6 +58,9 @@
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2982840",
"url": "https://launchpad.support.sap.com/#/notes/2982840"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -138,6 +138,9 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K17321505",
"url": "https://support.f5.com/csp/article/K17321505"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -53,6 +53,9 @@
"refsource": "MLIST",
"name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html",
"url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -243,6 +243,9 @@
"refsource": "MLIST",
"name": "[dolphinscheduler-commits] 20210121 [GitHub] [incubator-dolphinscheduler] c-f-cooper commented on pull request #4525: [Improvement-4506][LICENSE] upgrade the version of the commons-beanutils",
"url": "https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -123,6 +123,9 @@
"refsource": "MLIST",
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -88,6 +88,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -110,6 +110,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -143,6 +143,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -186,6 +186,9 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
"url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -126,6 +126,9 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K32804955?utm_source=f5support&amp;utm_medium=RSS",
"url": "https://support.f5.com/csp/article/K32804955?utm_source=f5support&amp;utm_medium=RSS"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -153,6 +153,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200528-0006/",
"url": "https://security.netapp.com/advisory/ntap-20200528-0006/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -386,6 +386,9 @@
"refsource": "CONFIRM",
"name": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601",
"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -196,6 +196,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0174",
"url": "https://access.redhat.com/errata/RHSA-2020:0174"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -241,6 +241,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -246,6 +246,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -161,6 +161,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -168,6 +168,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -103,6 +103,9 @@
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -93,6 +93,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -103,6 +103,9 @@
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -83,6 +83,9 @@
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -331,6 +331,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200608-0001/",
"url": "https://security.netapp.com/advisory/ntap-20200608-0001/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -136,6 +136,9 @@
"refsource": "UBUNTU",
"name": "USN-4147-1",
"url": "https://usn.ubuntu.com/4147-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -116,6 +116,9 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1153",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -186,6 +186,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -166,6 +166,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0790",
"url": "https://access.redhat.com/errata/RHSA-2020:0790"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -106,6 +106,9 @@
"refsource": "MLIST",
"name": "[druid-commits] 20210507 [druid] branch 0.21.1 updated: Suppressing false positive CVE-2020-7791 (#11215) (#11217)",
"url": "https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -66,6 +66,9 @@
"url": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11",
"refsource": "MISC",
"name": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -63,6 +63,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -468,6 +468,9 @@
"refsource": "MLIST",
"name": "[activemq-users] 20210427 Re: Release date for ActiveMQ v5.16.2 to fix CVEs",
"url": "https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -103,6 +103,9 @@
"refsource": "MLIST",
"name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
"url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -78,6 +78,9 @@
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443",
"refsource": "CONFIRM",
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -139,6 +139,9 @@
"refsource": "MLIST",
"name": "[pulsar-commits] 20210127 [GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan",
"url": "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -106,6 +106,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -116,6 +116,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -116,6 +116,9 @@
"refsource": "UBUNTU",
"name": "USN-4284-1",
"url": "https://usn.ubuntu.com/4284-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -111,6 +111,9 @@
"refsource": "UBUNTU",
"name": "USN-4302-1",
"url": "https://usn.ubuntu.com/4302-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update",
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"refsource": "UBUNTU",
"name": "USN-4284-1",
"url": "https://usn.ubuntu.com/4284-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -76,6 +76,9 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0336",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -91,6 +91,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200204-0002/",
"url": "https://security.netapp.com/advisory/ntap-20200204-0002/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -211,6 +211,9 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1241",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1241"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -179,6 +179,9 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -71,6 +71,9 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:0935",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -80,6 +80,9 @@
"refsource": "CONFIRM",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318",
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -75,6 +75,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -75,6 +75,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -71,6 +71,9 @@
"name": "https://pivotal.io/security/cve-2019-3773",
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2019-3773"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -103,6 +103,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -183,6 +183,9 @@
"refsource": "REDHAT",
"name": "RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -48,6 +48,9 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -53,6 +53,9 @@
"refsource": "MISC",
"name": "https://github.com/opencv/opencv/issues/15857",
"url": "https://github.com/opencv/opencv/issues/15857"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -108,6 +108,9 @@
"refsource": "DEBIAN",
"name": "DSA-4698",
"url": "https://www.debian.org/security/2020/dsa-4698"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -251,6 +251,9 @@
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -176,6 +176,9 @@
"refsource": "MLIST",
"name": "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
"url": "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -91,6 +91,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200824 [SECURITY] [DLA 2341-1] inetutils security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00038.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -121,6 +121,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -128,6 +128,9 @@
"refsource": "UBUNTU",
"name": "USN-4412-1",
"url": "https://usn.ubuntu.com/4412-1/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -58,6 +58,9 @@
"refsource": "SUSE",
"name": "openSUSE-SU-2020:1153",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -101,6 +101,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -243,6 +243,9 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -353,6 +353,9 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -261,6 +261,9 @@
"refsource": "DEBIAN",
"name": "DSA-4885",
"url": "https://www.debian.org/security/2021/dsa-4885"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -106,6 +106,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -91,6 +91,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -63,6 +63,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

View File

@ -124,6 +124,9 @@
"refsource": "MLIST",
"name": "[creadur-dev] 20210419 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8",
"url": "https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
}

View File

@ -68,6 +68,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-33a1b73e48",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEDID4DAVPECE6O4QQCSIS75BLLBUUAM/"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
}
]
},

Some files were not shown because too many files have changed in this diff Show More