From b9b857a3a06fba14aa3f3aa45c12c3c990f77dbb Mon Sep 17 00:00:00 2001 From: Bill Situ Date: Tue, 20 Oct 2020 12:39:21 -0700 Subject: [PATCH] Bill Situ On branch cna/Oracle/CPU2020Oct3rdparty Changes to be committed: modified: 2013/7xxx/CVE-2013-7285.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1000xxx/CVE-2016-1000338.json modified: 2016/1000xxx/CVE-2016-1000339.json modified: 2016/1000xxx/CVE-2016-1000340.json modified: 2016/1000xxx/CVE-2016-1000341.json modified: 2016/1000xxx/CVE-2016-1000342.json modified: 2016/1000xxx/CVE-2016-1000343.json modified: 2016/1000xxx/CVE-2016-1000344.json modified: 2016/1000xxx/CVE-2016-1000345.json modified: 2016/1000xxx/CVE-2016-1000346.json modified: 2016/1000xxx/CVE-2016-1000352.json modified: 2016/2xxx/CVE-2016-2167.json modified: 2016/2xxx/CVE-2016-2168.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2510.json modified: 2016/3xxx/CVE-2016-3189.json modified: 2016/4xxx/CVE-2016-4800.json modified: 2016/5xxx/CVE-2016-5000.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2016/8xxx/CVE-2016-8734.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/13xxx/CVE-2017-13098.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/17xxx/CVE-2017-17485.json modified: 2017/3xxx/CVE-2017-3164.json modified: 2017/5xxx/CVE-2017-5644.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9096.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2017/9xxx/CVE-2017-9800.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11307.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12536.json modified: 2018/12xxx/CVE-2018-12538.json modified: 2018/12xxx/CVE-2018-12545.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17196.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5382.json modified: 2018/5xxx/CVE-2018-5968.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0192.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/1010xxx/CVE-2019-1010239.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10241.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10744.json modified: 2019/11xxx/CVE-2019-11048.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/11xxx/CVE-2019-11477.json modified: 2019/11xxx/CVE-2019-11478.json modified: 2019/11xxx/CVE-2019-11479.json modified: 2019/11xxx/CVE-2019-11834.json modified: 2019/11xxx/CVE-2019-11835.json modified: 2019/11xxx/CVE-2019-11922.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12260.json modified: 2019/12xxx/CVE-2019-12261.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/12xxx/CVE-2019-12900.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14893.json modified: 2019/15xxx/CVE-2019-15903.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17267.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17543.json modified: 2019/17xxx/CVE-2019-17558.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/17xxx/CVE-2019-17632.json modified: 2019/17xxx/CVE-2019-17638.json modified: 2019/18xxx/CVE-2019-18348.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/5xxx/CVE-2019-5481.json modified: 2019/5xxx/CVE-2019-5482.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9513.json modified: 2020/10xxx/CVE-2020-10108.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10722.json modified: 2020/10xxx/CVE-2020-10723.json modified: 2020/10xxx/CVE-2020-10724.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11972.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11984.json modified: 2020/11xxx/CVE-2020-11993.json modified: 2020/11xxx/CVE-2020-11996.json modified: 2020/12xxx/CVE-2020-12243.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13630.json modified: 2020/13xxx/CVE-2020-13631.json modified: 2020/13xxx/CVE-2020-13632.json modified: 2020/13xxx/CVE-2020-13920.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/15xxx/CVE-2020-15389.json modified: 2020/1xxx/CVE-2020-1730.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1950.json modified: 2020/1xxx/CVE-2020-1951.json modified: 2020/1xxx/CVE-2020-1953.json modified: 2020/1xxx/CVE-2020-1954.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/3xxx/CVE-2020-3235.json modified: 2020/3xxx/CVE-2020-3909.json modified: 2020/4xxx/CVE-2020-4051.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/7xxx/CVE-2020-7067.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8840.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9409.json modified: 2020/9xxx/CVE-2020-9410.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9489.json modified: 2020/9xxx/CVE-2020-9490.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json --- 2013/7xxx/CVE-2013-7285.json | 3 +++ 2015/1xxx/CVE-2015-1832.json | 3 +++ 2015/9xxx/CVE-2015-9251.json | 3 +++ 2016/0xxx/CVE-2016-0701.json | 3 +++ 2016/1000xxx/CVE-2016-1000031.json | 3 +++ 2016/1000xxx/CVE-2016-1000338.json | 3 +++ 2016/1000xxx/CVE-2016-1000339.json | 3 +++ 2016/1000xxx/CVE-2016-1000340.json | 3 +++ 2016/1000xxx/CVE-2016-1000341.json | 3 +++ 2016/1000xxx/CVE-2016-1000342.json | 3 +++ 2016/1000xxx/CVE-2016-1000343.json | 3 +++ 2016/1000xxx/CVE-2016-1000344.json | 3 +++ 2016/1000xxx/CVE-2016-1000345.json | 3 +++ 2016/1000xxx/CVE-2016-1000346.json | 3 +++ 2016/1000xxx/CVE-2016-1000352.json | 3 +++ 2016/2xxx/CVE-2016-2167.json | 3 +++ 2016/2xxx/CVE-2016-2168.json | 3 +++ 2016/2xxx/CVE-2016-2183.json | 3 +++ 2016/2xxx/CVE-2016-2510.json | 3 +++ 2016/3xxx/CVE-2016-3189.json | 3 +++ 2016/4xxx/CVE-2016-4800.json | 3 +++ 2016/5xxx/CVE-2016-5000.json | 3 +++ 2016/5xxx/CVE-2016-5725.json | 3 +++ 2016/6xxx/CVE-2016-6306.json | 3 +++ 2016/8xxx/CVE-2016-8610.json | 3 +++ 2016/8xxx/CVE-2016-8734.json | 3 +++ 2017/12xxx/CVE-2017-12626.json | 3 +++ 2017/13xxx/CVE-2017-13098.json | 3 +++ 2017/15xxx/CVE-2017-15095.json | 3 +++ 2017/17xxx/CVE-2017-17485.json | 3 +++ 2017/3xxx/CVE-2017-3164.json | 3 +++ 2017/5xxx/CVE-2017-5644.json | 3 +++ 2017/5xxx/CVE-2017-5645.json | 3 +++ 2017/5xxx/CVE-2017-5662.json | 3 +++ 2017/7xxx/CVE-2017-7525.json | 3 +++ 2017/7xxx/CVE-2017-7656.json | 3 +++ 2017/7xxx/CVE-2017-7657.json | 3 +++ 2017/7xxx/CVE-2017-7658.json | 3 +++ 2017/9xxx/CVE-2017-9096.json | 3 +++ 2017/9xxx/CVE-2017-9735.json | 3 +++ 2017/9xxx/CVE-2017-9800.json | 3 +++ 2018/1000xxx/CVE-2018-1000180.json | 3 +++ 2018/1000xxx/CVE-2018-1000613.json | 3 +++ 2018/1000xxx/CVE-2018-1000873.json | 3 +++ 2018/11xxx/CVE-2018-11054.json | 3 +++ 2018/11xxx/CVE-2018-11055.json | 3 +++ 2018/11xxx/CVE-2018-11056.json | 3 +++ 2018/11xxx/CVE-2018-11057.json | 3 +++ 2018/11xxx/CVE-2018-11058.json | 3 +++ 2018/11xxx/CVE-2018-11307.json | 3 +++ 2018/12xxx/CVE-2018-12022.json | 3 +++ 2018/12xxx/CVE-2018-12023.json | 3 +++ 2018/12xxx/CVE-2018-12536.json | 3 +++ 2018/12xxx/CVE-2018-12538.json | 3 +++ 2018/12xxx/CVE-2018-12545.json | 3 +++ 2018/14xxx/CVE-2018-14718.json | 3 +++ 2018/15xxx/CVE-2018-15769.json | 3 +++ 2018/17xxx/CVE-2018-17196.json | 3 +++ 2018/20xxx/CVE-2018-20843.json | 3 +++ 2018/3xxx/CVE-2018-3693.json | 3 +++ 2018/5xxx/CVE-2018-5382.json | 3 +++ 2018/5xxx/CVE-2018-5968.json | 3 +++ 2018/7xxx/CVE-2018-7489.json | 3 +++ 2018/8xxx/CVE-2018-8013.json | 3 +++ 2018/8xxx/CVE-2018-8088.json | 3 +++ 2019/0xxx/CVE-2019-0192.json | 3 +++ 2019/0xxx/CVE-2019-0201.json | 5 ++++- 2019/1010xxx/CVE-2019-1010239.json | 3 +++ 2019/10xxx/CVE-2019-10072.json | 3 +++ 2019/10xxx/CVE-2019-10097.json | 3 +++ 2019/10xxx/CVE-2019-10173.json | 3 +++ 2019/10xxx/CVE-2019-10241.json | 3 +++ 2019/10xxx/CVE-2019-10246.json | 3 +++ 2019/10xxx/CVE-2019-10247.json | 3 +++ 2019/10xxx/CVE-2019-10744.json | 3 +++ 2019/11xxx/CVE-2019-11048.json | 3 +++ 2019/11xxx/CVE-2019-11358.json | 3 +++ 2019/11xxx/CVE-2019-11477.json | 3 +++ 2019/11xxx/CVE-2019-11478.json | 3 +++ 2019/11xxx/CVE-2019-11479.json | 3 +++ 2019/11xxx/CVE-2019-11834.json | 3 +++ 2019/11xxx/CVE-2019-11835.json | 3 +++ 2019/11xxx/CVE-2019-11922.json | 3 +++ 2019/12xxx/CVE-2019-12086.json | 3 +++ 2019/12xxx/CVE-2019-12260.json | 3 +++ 2019/12xxx/CVE-2019-12261.json | 3 +++ 2019/12xxx/CVE-2019-12384.json | 3 +++ 2019/12xxx/CVE-2019-12402.json | 3 +++ 2019/12xxx/CVE-2019-12415.json | 3 +++ 2019/12xxx/CVE-2019-12419.json | 3 +++ 2019/12xxx/CVE-2019-12423.json | 3 +++ 2019/12xxx/CVE-2019-12814.json | 3 +++ 2019/12xxx/CVE-2019-12900.json | 3 +++ 2019/13xxx/CVE-2019-13990.json | 3 +++ 2019/14xxx/CVE-2019-14379.json | 3 +++ 2019/14xxx/CVE-2019-14540.json | 3 +++ 2019/14xxx/CVE-2019-14893.json | 3 +++ 2019/15xxx/CVE-2019-15903.json | 3 +++ 2019/16xxx/CVE-2019-16335.json | 3 +++ 2019/16xxx/CVE-2019-16942.json | 3 +++ 2019/16xxx/CVE-2019-16943.json | 3 +++ 2019/17xxx/CVE-2019-17091.json | 3 +++ 2019/17xxx/CVE-2019-17267.json | 3 +++ 2019/17xxx/CVE-2019-17359.json | 3 +++ 2019/17xxx/CVE-2019-17495.json | 3 +++ 2019/17xxx/CVE-2019-17531.json | 3 +++ 2019/17xxx/CVE-2019-17543.json | 3 +++ 2019/17xxx/CVE-2019-17558.json | 3 +++ 2019/17xxx/CVE-2019-17569.json | 3 +++ 2019/17xxx/CVE-2019-17632.json | 5 ++++- 2019/17xxx/CVE-2019-17638.json | 3 +++ 2019/18xxx/CVE-2019-18348.json | 3 +++ 2019/1xxx/CVE-2019-1547.json | 5 ++++- 2019/1xxx/CVE-2019-1549.json | 3 +++ 2019/1xxx/CVE-2019-1552.json | 3 +++ 2019/1xxx/CVE-2019-1563.json | 3 +++ 2019/20xxx/CVE-2019-20330.json | 3 +++ 2019/3xxx/CVE-2019-3738.json | 3 +++ 2019/3xxx/CVE-2019-3739.json | 3 +++ 2019/3xxx/CVE-2019-3740.json | 3 +++ 2019/5xxx/CVE-2019-5427.json | 3 +++ 2019/5xxx/CVE-2019-5435.json | 3 +++ 2019/5xxx/CVE-2019-5436.json | 3 +++ 2019/5xxx/CVE-2019-5443.json | 3 +++ 2019/5xxx/CVE-2019-5481.json | 3 +++ 2019/5xxx/CVE-2019-5482.json | 3 +++ 2019/9xxx/CVE-2019-9511.json | 3 +++ 2019/9xxx/CVE-2019-9513.json | 3 +++ 2020/10xxx/CVE-2020-10108.json | 3 +++ 2020/10xxx/CVE-2020-10543.json | 3 +++ 2020/10xxx/CVE-2020-10672.json | 3 +++ 2020/10xxx/CVE-2020-10673.json | 3 +++ 2020/10xxx/CVE-2020-10683.json | 3 +++ 2020/10xxx/CVE-2020-10722.json | 3 +++ 2020/10xxx/CVE-2020-10723.json | 3 +++ 2020/10xxx/CVE-2020-10724.json | 3 +++ 2020/10xxx/CVE-2020-10878.json | 3 +++ 2020/10xxx/CVE-2020-10968.json | 3 +++ 2020/10xxx/CVE-2020-10969.json | 3 +++ 2020/11xxx/CVE-2020-11022.json | 3 +++ 2020/11xxx/CVE-2020-11023.json | 3 +++ 2020/11xxx/CVE-2020-11080.json | 3 +++ 2020/11xxx/CVE-2020-11111.json | 3 +++ 2020/11xxx/CVE-2020-11112.json | 3 +++ 2020/11xxx/CVE-2020-11113.json | 3 +++ 2020/11xxx/CVE-2020-11619.json | 3 +++ 2020/11xxx/CVE-2020-11620.json | 3 +++ 2020/11xxx/CVE-2020-11655.json | 3 +++ 2020/11xxx/CVE-2020-11656.json | 3 +++ 2020/11xxx/CVE-2020-11971.json | 3 +++ 2020/11xxx/CVE-2020-11972.json | 3 +++ 2020/11xxx/CVE-2020-11973.json | 3 +++ 2020/11xxx/CVE-2020-11984.json | 3 +++ 2020/11xxx/CVE-2020-11993.json | 3 +++ 2020/11xxx/CVE-2020-11996.json | 3 +++ 2020/12xxx/CVE-2020-12243.json | 3 +++ 2020/12xxx/CVE-2020-12723.json | 3 +++ 2020/13xxx/CVE-2020-13630.json | 3 +++ 2020/13xxx/CVE-2020-13631.json | 3 +++ 2020/13xxx/CVE-2020-13632.json | 3 +++ 2020/13xxx/CVE-2020-13920.json | 3 +++ 2020/13xxx/CVE-2020-13934.json | 3 +++ 2020/13xxx/CVE-2020-13935.json | 3 +++ 2020/14xxx/CVE-2020-14060.json | 3 +++ 2020/14xxx/CVE-2020-14061.json | 3 +++ 2020/14xxx/CVE-2020-14062.json | 3 +++ 2020/14xxx/CVE-2020-14195.json | 3 +++ 2020/15xxx/CVE-2020-15358.json | 3 +++ 2020/15xxx/CVE-2020-15389.json | 3 +++ 2020/1xxx/CVE-2020-1730.json | 3 +++ 2020/1xxx/CVE-2020-1935.json | 3 +++ 2020/1xxx/CVE-2020-1938.json | 3 +++ 2020/1xxx/CVE-2020-1941.json | 3 +++ 2020/1xxx/CVE-2020-1945.json | 3 +++ 2020/1xxx/CVE-2020-1950.json | 3 +++ 2020/1xxx/CVE-2020-1951.json | 3 +++ 2020/1xxx/CVE-2020-1953.json | 3 +++ 2020/1xxx/CVE-2020-1954.json | 5 ++++- 2020/1xxx/CVE-2020-1967.json | 3 +++ 2020/3xxx/CVE-2020-3235.json | 9 +++------ 2020/3xxx/CVE-2020-3909.json | 3 +++ 2020/4xxx/CVE-2020-4051.json | 3 +++ 2020/5xxx/CVE-2020-5397.json | 3 +++ 2020/5xxx/CVE-2020-5398.json | 3 +++ 2020/5xxx/CVE-2020-5407.json | 3 +++ 2020/5xxx/CVE-2020-5408.json | 3 +++ 2020/7xxx/CVE-2020-7067.json | 3 +++ 2020/8xxx/CVE-2020-8172.json | 3 +++ 2020/8xxx/CVE-2020-8174.json | 3 +++ 2020/8xxx/CVE-2020-8840.json | 3 +++ 2020/9xxx/CVE-2020-9281.json | 3 +++ 2020/9xxx/CVE-2020-9327.json | 3 +++ 2020/9xxx/CVE-2020-9409.json | 3 +++ 2020/9xxx/CVE-2020-9410.json | 3 +++ 2020/9xxx/CVE-2020-9484.json | 3 +++ 2020/9xxx/CVE-2020-9488.json | 3 +++ 2020/9xxx/CVE-2020-9489.json | 3 +++ 2020/9xxx/CVE-2020-9490.json | 3 +++ 2020/9xxx/CVE-2020-9546.json | 3 +++ 2020/9xxx/CVE-2020-9547.json | 3 +++ 2020/9xxx/CVE-2020-9548.json | 3 +++ 201 files changed, 607 insertions(+), 10 deletions(-) diff --git a/2013/7xxx/CVE-2013-7285.json b/2013/7xxx/CVE-2013-7285.json index 74af36b7872..8def3931183 100644 --- a/2013/7xxx/CVE-2013-7285.json +++ b/2013/7xxx/CVE-2013-7285.json @@ -86,6 +86,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.", "url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2015/1xxx/CVE-2015-1832.json b/2015/1xxx/CVE-2015-1832.json index d41c48531a9..7401cc0e5a7 100644 --- a/2015/1xxx/CVE-2015-1832.json +++ b/2015/1xxx/CVE-2015-1832.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2015/9xxx/CVE-2015-9251.json b/2015/9xxx/CVE-2015-9251.json index aff5d917685..246c0448562 100644 --- a/2015/9xxx/CVE-2015-9251.json +++ b/2015/9xxx/CVE-2015-9251.json @@ -226,6 +226,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html", "url": "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/0xxx/CVE-2016-0701.json b/2016/0xxx/CVE-2016-0701.json index 8a3dd2ce1a4..3a118192cea 100644 --- a/2016/0xxx/CVE-2016-0701.json +++ b/2016/0xxx/CVE-2016-0701.json @@ -161,6 +161,9 @@ "name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000031.json b/2016/1000xxx/CVE-2016-1000031.json index b0c44026d6a..3ad8df1135e 100644 --- a/2016/1000xxx/CVE-2016-1000031.json +++ b/2016/1000xxx/CVE-2016-1000031.json @@ -151,6 +151,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "MISC" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000338.json b/2016/1000xxx/CVE-2016-1000338.json index f9999e83c99..a8fbbfd1e05 100644 --- a/2016/1000xxx/CVE-2016-1000338.json +++ b/2016/1000xxx/CVE-2016-1000338.json @@ -81,6 +81,9 @@ "refsource": "MLIST", "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000339.json b/2016/1000xxx/CVE-2016-1000339.json index 6c93d6b93a1..d820cebc4c3 100644 --- a/2016/1000xxx/CVE-2016-1000339.json +++ b/2016/1000xxx/CVE-2016-1000339.json @@ -86,6 +86,9 @@ "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000340.json b/2016/1000xxx/CVE-2016-1000340.json index f5a21854274..d2165cc49a2 100644 --- a/2016/1000xxx/CVE-2016-1000340.json +++ b/2016/1000xxx/CVE-2016-1000340.json @@ -71,6 +71,9 @@ "name": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000341.json b/2016/1000xxx/CVE-2016-1000341.json index 07e6d8fb447..d8e76a55bfe 100644 --- a/2016/1000xxx/CVE-2016-1000341.json +++ b/2016/1000xxx/CVE-2016-1000341.json @@ -81,6 +81,9 @@ "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000342.json b/2016/1000xxx/CVE-2016-1000342.json index 0430bf34da1..7186860d922 100644 --- a/2016/1000xxx/CVE-2016-1000342.json +++ b/2016/1000xxx/CVE-2016-1000342.json @@ -81,6 +81,9 @@ "name": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000343.json b/2016/1000xxx/CVE-2016-1000343.json index 73ea8aba8bd..1cc73c1e166 100644 --- a/2016/1000xxx/CVE-2016-1000343.json +++ b/2016/1000xxx/CVE-2016-1000343.json @@ -86,6 +86,9 @@ "refsource": "MLIST", "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000344.json b/2016/1000xxx/CVE-2016-1000344.json index 202d010c6ef..31625fd5be8 100644 --- a/2016/1000xxx/CVE-2016-1000344.json +++ b/2016/1000xxx/CVE-2016-1000344.json @@ -71,6 +71,9 @@ "name": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000345.json b/2016/1000xxx/CVE-2016-1000345.json index 791ec291a95..e77cdec742d 100644 --- a/2016/1000xxx/CVE-2016-1000345.json +++ b/2016/1000xxx/CVE-2016-1000345.json @@ -81,6 +81,9 @@ "name": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000346.json b/2016/1000xxx/CVE-2016-1000346.json index cc9db34cd48..1874f00c785 100644 --- a/2016/1000xxx/CVE-2016-1000346.json +++ b/2016/1000xxx/CVE-2016-1000346.json @@ -81,6 +81,9 @@ "name": "RHSA-2018:2927", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2927" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/1000xxx/CVE-2016-1000352.json b/2016/1000xxx/CVE-2016-1000352.json index bbcdc7e98f2..79664b08dcc 100644 --- a/2016/1000xxx/CVE-2016-1000352.json +++ b/2016/1000xxx/CVE-2016-1000352.json @@ -71,6 +71,9 @@ "name": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f", "refsource": "CONFIRM", "url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2167.json b/2016/2xxx/CVE-2016-2167.json index 4246f8be698..36072f37539 100644 --- a/2016/2xxx/CVE-2016-2167.json +++ b/2016/2xxx/CVE-2016-2167.json @@ -106,6 +106,9 @@ "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2168.json b/2016/2xxx/CVE-2016-2168.json index accc40b73fd..671a015667d 100644 --- a/2016/2xxx/CVE-2016-2168.json +++ b/2016/2xxx/CVE-2016-2168.json @@ -106,6 +106,9 @@ "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2183.json b/2016/2xxx/CVE-2016-2183.json index 87b05946fba..9ad9a678832 100644 --- a/2016/2xxx/CVE-2016-2183.json +++ b/2016/2xxx/CVE-2016-2183.json @@ -436,6 +436,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/2xxx/CVE-2016-2510.json b/2016/2xxx/CVE-2016-2510.json index bd35260fd46..1204aee7e64 100644 --- a/2016/2xxx/CVE-2016-2510.json +++ b/2016/2xxx/CVE-2016-2510.json @@ -141,6 +141,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:1545", "url": "https://access.redhat.com/errata/RHSA-2019:1545" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/3xxx/CVE-2016-3189.json b/2016/3xxx/CVE-2016-3189.json index 2a042cdbc68..e8da72311fe 100644 --- a/2016/3xxx/CVE-2016-3189.json +++ b/2016/3xxx/CVE-2016-3189.json @@ -146,6 +146,9 @@ "refsource": "MLIST", "name": "[kafka-jira] 20200414 [jira] [Commented] (KAFKA-9858) CVE-2016-3189 Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.", "url": "https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/4xxx/CVE-2016-4800.json b/2016/4xxx/CVE-2016-4800.json index ccb57670b6e..e0d01a535a2 100644 --- a/2016/4xxx/CVE-2016-4800.json +++ b/2016/4xxx/CVE-2016-4800.json @@ -76,6 +76,9 @@ "name": "http://www.zerodayinitiative.com/advisories/ZDI-16-362", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-362" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/5xxx/CVE-2016-5000.json b/2016/5xxx/CVE-2016-5000.json index 2d4ce37968f..af74dfa7c2c 100644 --- a/2016/5xxx/CVE-2016-5000.json +++ b/2016/5xxx/CVE-2016-5000.json @@ -76,6 +76,9 @@ "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example", "refsource": "MLIST", "url": "https://lists.apache.org/list.html?user@poi.apache.org" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/5xxx/CVE-2016-5725.json b/2016/5xxx/CVE-2016-5725.json index 8e082338cd8..0286af1563a 100644 --- a/2016/5xxx/CVE-2016-5725.json +++ b/2016/5xxx/CVE-2016-5725.json @@ -91,6 +91,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200425 [SECURITY] [DLA 2184-1] jsch security update", "url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00017.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/6xxx/CVE-2016-6306.json b/2016/6xxx/CVE-2016-6306.json index 65ac866000c..f2bb57a4506 100644 --- a/2016/6xxx/CVE-2016-6306.json +++ b/2016/6xxx/CVE-2016-6306.json @@ -211,6 +211,9 @@ "name": "https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9", "refsource": "CONFIRM", "url": "https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/8xxx/CVE-2016-8610.json b/2016/8xxx/CVE-2016-8610.json index 5b3b12ce462..a2288b0bf67 100644 --- a/2016/8xxx/CVE-2016-8610.json +++ b/2016/8xxx/CVE-2016-8610.json @@ -196,6 +196,9 @@ "name": "https://security.paloaltonetworks.com/CVE-2016-8610", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2016-8610" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2016/8xxx/CVE-2016-8734.json b/2016/8xxx/CVE-2016-8734.json index c5893cb6a92..58524ba69d5 100644 --- a/2016/8xxx/CVE-2016-8734.json +++ b/2016/8xxx/CVE-2016-8734.json @@ -80,6 +80,9 @@ "name": "DSA-3932", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3932" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/12xxx/CVE-2017-12626.json b/2017/12xxx/CVE-2017-12626.json index 8bfedf2dd48..43a28cb490c 100644 --- a/2017/12xxx/CVE-2017-12626.json +++ b/2017/12xxx/CVE-2017-12626.json @@ -92,6 +92,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/13xxx/CVE-2017-13098.json b/2017/13xxx/CVE-2017-13098.json index 679c98636df..72387ba40f8 100644 --- a/2017/13xxx/CVE-2017-13098.json +++ b/2017/13xxx/CVE-2017-13098.json @@ -108,6 +108,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0607", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/15xxx/CVE-2017-15095.json b/2017/15xxx/CVE-2017-15095.json index 8cb427ea4d9..81056945969 100644 --- a/2017/15xxx/CVE-2017-15095.json +++ b/2017/15xxx/CVE-2017-15095.json @@ -210,6 +210,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/17xxx/CVE-2017-17485.json b/2017/17xxx/CVE-2017-17485.json index 8803e50f0d5..943647c711a 100644 --- a/2017/17xxx/CVE-2017-17485.json +++ b/2017/17xxx/CVE-2017-17485.json @@ -166,6 +166,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/3xxx/CVE-2017-3164.json b/2017/3xxx/CVE-2017-3164.json index 9a91b493e34..7e92a3e6e84 100644 --- a/2017/3xxx/CVE-2017-3164.json +++ b/2017/3xxx/CVE-2017-3164.json @@ -102,6 +102,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/5xxx/CVE-2017-5644.json b/2017/5xxx/CVE-2017-5644.json index 376ce3f9cb5..b654a8b5951 100644 --- a/2017/5xxx/CVE-2017-5644.json +++ b/2017/5xxx/CVE-2017-5644.json @@ -61,6 +61,9 @@ "name": "96983", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96983" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/5xxx/CVE-2017-5645.json b/2017/5xxx/CVE-2017-5645.json index 318050007b4..4c3d18524a0 100644 --- a/2017/5xxx/CVE-2017-5645.json +++ b/2017/5xxx/CVE-2017-5645.json @@ -401,6 +401,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/5xxx/CVE-2017-5662.json b/2017/5xxx/CVE-2017-5662.json index 154f99ce76d..fb4f2349f9a 100644 --- a/2017/5xxx/CVE-2017-5662.json +++ b/2017/5xxx/CVE-2017-5662.json @@ -101,6 +101,9 @@ "name": "97948", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97948" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/7xxx/CVE-2017-7525.json b/2017/7xxx/CVE-2017-7525.json index ebe60799f8e..818667c1188 100644 --- a/2017/7xxx/CVE-2017-7525.json +++ b/2017/7xxx/CVE-2017-7525.json @@ -338,6 +338,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/7xxx/CVE-2017-7656.json b/2017/7xxx/CVE-2017-7656.json index 8009129c47d..9886033206d 100644 --- a/2017/7xxx/CVE-2017-7656.json +++ b/2017/7xxx/CVE-2017-7656.json @@ -118,6 +118,9 @@ "refsource": "MLIST", "name": "[maven-issues] 20200730 [GitHub] [maven-dependency-plugin] slachiewicz commented on pull request #91: Bump jettyVersion from 9.2.28.v20190418 to 9.3.0.v20150612", "url": "https://lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/7xxx/CVE-2017-7657.json b/2017/7xxx/CVE-2017-7657.json index 1b5896ac33d..2337e89d6e2 100644 --- a/2017/7xxx/CVE-2017-7657.json +++ b/2017/7xxx/CVE-2017-7657.json @@ -123,6 +123,9 @@ "refsource": "MLIST", "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/7xxx/CVE-2017-7658.json b/2017/7xxx/CVE-2017-7658.json index d519e5ff460..89096b9dfcd 100644 --- a/2017/7xxx/CVE-2017-7658.json +++ b/2017/7xxx/CVE-2017-7658.json @@ -128,6 +128,9 @@ "refsource": "MLIST", "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/9xxx/CVE-2017-9096.json b/2017/9xxx/CVE-2017-9096.json index 59b1bb1f8a4..aabd2a91f8b 100644 --- a/2017/9xxx/CVE-2017-9096.json +++ b/2017/9xxx/CVE-2017-9096.json @@ -66,6 +66,9 @@ "name": "https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_external_entity_attack.txt", "refsource": "MISC", "url": "https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_external_entity_attack.txt" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/9xxx/CVE-2017-9735.json b/2017/9xxx/CVE-2017-9735.json index be1989322ca..a2cf8cc6aad 100644 --- a/2017/9xxx/CVE-2017-9735.json +++ b/2017/9xxx/CVE-2017-9735.json @@ -101,6 +101,9 @@ "refsource": "MLIST", "name": "[hadoop-common-issues] 20191030 [jira] [Created] (HADOOP-16676) Security Vulnerability for dependency jetty-xml -please upgrade", "url": "https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2017/9xxx/CVE-2017-9800.json b/2017/9xxx/CVE-2017-9800.json index b4e9fefc5f5..ec17c195bc7 100644 --- a/2017/9xxx/CVE-2017-9800.json +++ b/2017/9xxx/CVE-2017-9800.json @@ -115,6 +115,9 @@ "refsource": "MLIST", "name": "[subversion-commits] 20190830 svn commit: r1866117 - in /subversion/site/publish/docs/community-guide: how-to-roll-releases-in-private.txt issues.part.html", "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000180.json b/2018/1000xxx/CVE-2018-1000180.json index e21eeab7b6e..7f0a752a00d 100644 --- a/2018/1000xxx/CVE-2018-1000180.json +++ b/2018/1000xxx/CVE-2018-1000180.json @@ -149,6 +149,9 @@ "refsource": "MISC", "name": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180", "url": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000613.json b/2018/1000xxx/CVE-2018-1000613.json index 9941c8646d6..b30ba5be88b 100644 --- a/2018/1000xxx/CVE-2018-1000613.json +++ b/2018/1000xxx/CVE-2018-1000613.json @@ -99,6 +99,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/1000xxx/CVE-2018-1000873.json b/2018/1000xxx/CVE-2018-1000873.json index d80bd74522f..69ee22b3012 100644 --- a/2018/1000xxx/CVE-2018-1000873.json +++ b/2018/1000xxx/CVE-2018-1000873.json @@ -119,6 +119,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200904-0004/", "url": "https://security.netapp.com/advisory/ntap-20200904-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/11xxx/CVE-2018-11054.json b/2018/11xxx/CVE-2018-11054.json index 885930c38b9..a36cf969027 100644 --- a/2018/11xxx/CVE-2018-11054.json +++ b/2018/11xxx/CVE-2018-11054.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11055.json b/2018/11xxx/CVE-2018-11055.json index 2c144aa4cb1..aece5698e83 100644 --- a/2018/11xxx/CVE-2018-11055.json +++ b/2018/11xxx/CVE-2018-11055.json @@ -97,6 +97,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11056.json b/2018/11xxx/CVE-2018-11056.json index 531c40a8822..502e59d0205 100644 --- a/2018/11xxx/CVE-2018-11056.json +++ b/2018/11xxx/CVE-2018-11056.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11057.json b/2018/11xxx/CVE-2018-11057.json index 35d149f466b..b47cb5ab4fd 100644 --- a/2018/11xxx/CVE-2018-11057.json +++ b/2018/11xxx/CVE-2018-11057.json @@ -97,6 +97,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11058.json b/2018/11xxx/CVE-2018-11058.json index d5e8e25cdf3..31abfb1f8cc 100644 --- a/2018/11xxx/CVE-2018-11058.json +++ b/2018/11xxx/CVE-2018-11058.json @@ -113,6 +113,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/11xxx/CVE-2018-11307.json b/2018/11xxx/CVE-2018-11307.json index f81bcc085be..04274637a4b 100644 --- a/2018/11xxx/CVE-2018-11307.json +++ b/2018/11xxx/CVE-2018-11307.json @@ -151,6 +151,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12022.json b/2018/12xxx/CVE-2018-12022.json index f17bfe58f40..21b09ff3c19 100644 --- a/2018/12xxx/CVE-2018-12022.json +++ b/2018/12xxx/CVE-2018-12022.json @@ -226,6 +226,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12023.json b/2018/12xxx/CVE-2018-12023.json index a371d41b8c8..806e2396e54 100644 --- a/2018/12xxx/CVE-2018-12023.json +++ b/2018/12xxx/CVE-2018-12023.json @@ -231,6 +231,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190530-0003/", "url": "https://security.netapp.com/advisory/ntap-20190530-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12536.json b/2018/12xxx/CVE-2018-12536.json index 3d81094a54f..b0bd1f3659d 100644 --- a/2018/12xxx/CVE-2018-12536.json +++ b/2018/12xxx/CVE-2018-12536.json @@ -98,6 +98,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12538.json b/2018/12xxx/CVE-2018-12538.json index b7d8a5dda95..6e130e56e03 100644 --- a/2018/12xxx/CVE-2018-12538.json +++ b/2018/12xxx/CVE-2018-12538.json @@ -81,6 +81,9 @@ "refsource": "MLIST", "name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image", "url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/12xxx/CVE-2018-12545.json b/2018/12xxx/CVE-2018-12545.json index 4a998aec29c..b6cfce67f39 100644 --- a/2018/12xxx/CVE-2018-12545.json +++ b/2018/12xxx/CVE-2018-12545.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/14xxx/CVE-2018-14718.json b/2018/14xxx/CVE-2018-14718.json index 238a83f44ee..beeed11c73a 100644 --- a/2018/14xxx/CVE-2018-14718.json +++ b/2018/14xxx/CVE-2018-14718.json @@ -216,6 +216,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/15xxx/CVE-2018-15769.json b/2018/15xxx/CVE-2018-15769.json index dfac65fb0b9..59088821fd6 100644 --- a/2018/15xxx/CVE-2018-15769.json +++ b/2018/15xxx/CVE-2018-15769.json @@ -86,6 +86,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/17xxx/CVE-2018-17196.json b/2018/17xxx/CVE-2018-17196.json index 1745562704e..e482a19c89c 100644 --- a/2018/17xxx/CVE-2018-17196.json +++ b/2018/17xxx/CVE-2018-17196.json @@ -88,6 +88,9 @@ "refsource": "MISC", "name": "https://www.mail-archive.com/dev@kafka.apache.org/msg99277.html", "url": "https://www.mail-archive.com/dev@kafka.apache.org/msg99277.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/20xxx/CVE-2018-20843.json b/2018/20xxx/CVE-2018-20843.json index a99e8f4c017..b4bf3753ba1 100644 --- a/2018/20xxx/CVE-2018-20843.json +++ b/2018/20xxx/CVE-2018-20843.json @@ -136,6 +136,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/3xxx/CVE-2018-3693.json b/2018/3xxx/CVE-2018-3693.json index 390c46907be..5b0ea95c1f6 100644 --- a/2018/3xxx/CVE-2018-3693.json +++ b/2018/3xxx/CVE-2018-3693.json @@ -101,6 +101,9 @@ "name": "https://01.org/security/advisories/intel-oss-10002", "refsource": "CONFIRM", "url": "https://01.org/security/advisories/intel-oss-10002" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/5xxx/CVE-2018-5382.json b/2018/5xxx/CVE-2018-5382.json index f75acbb0c54..d7bbc4d5bdf 100644 --- a/2018/5xxx/CVE-2018-5382.json +++ b/2018/5xxx/CVE-2018-5382.json @@ -75,6 +75,9 @@ "name": "VU#306792", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/306792" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2018/5xxx/CVE-2018-5968.json b/2018/5xxx/CVE-2018-5968.json index 82afa0e7d37..7a55c8c9174 100644 --- a/2018/5xxx/CVE-2018-5968.json +++ b/2018/5xxx/CVE-2018-5968.json @@ -106,6 +106,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:3149", "url": "https://access.redhat.com/errata/RHSA-2019:3149" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/7xxx/CVE-2018-7489.json b/2018/7xxx/CVE-2018-7489.json index 14c242cad39..83f98120d40 100644 --- a/2018/7xxx/CVE-2018-7489.json +++ b/2018/7xxx/CVE-2018-7489.json @@ -181,6 +181,9 @@ "refsource": "REDHAT", "name": "RHSA-2019:3149", "url": "https://access.redhat.com/errata/RHSA-2019:3149" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8013.json b/2018/8xxx/CVE-2018-8013.json index d1fefbb8695..01c7a95c24b 100644 --- a/2018/8xxx/CVE-2018-8013.json +++ b/2018/8xxx/CVE-2018-8013.json @@ -127,6 +127,9 @@ "name": "https://xmlgraphics.apache.org/security.html", "refsource": "CONFIRM", "url": "https://xmlgraphics.apache.org/security.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2018/8xxx/CVE-2018-8088.json b/2018/8xxx/CVE-2018-8088.json index b6201c2c960..571535e965d 100644 --- a/2018/8xxx/CVE-2018-8088.json +++ b/2018/8xxx/CVE-2018-8088.json @@ -261,6 +261,9 @@ "refsource": "MLIST", "name": "[logging-notifications] 20200825 [jira] [Commented] (LOG4J2-2329) Fix dependency in log4j-slf4j-impl to slf4j due to CVE-2018-8088", "url": "https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25@%3Cnotifications.logging.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/0xxx/CVE-2019-0192.json b/2019/0xxx/CVE-2019-0192.json index ad89e7b605f..494eef42e42 100644 --- a/2019/0xxx/CVE-2019-0192.json +++ b/2019/0xxx/CVE-2019-0192.json @@ -112,6 +112,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/0xxx/CVE-2019-0201.json b/2019/0xxx/CVE-2019-0201.json index 2ad0352b236..0c66412b54c 100644 --- a/2019/0xxx/CVE-2019-0201.json +++ b/2019/0xxx/CVE-2019-0201.json @@ -131,6 +131,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190619-0001/", "url": "https://security.netapp.com/advisory/ntap-20190619-0001/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, @@ -138,7 +141,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper\u2019s getACL() command doesn\u2019t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users." + "value": "An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users." } ] } diff --git a/2019/1010xxx/CVE-2019-1010239.json b/2019/1010xxx/CVE-2019-1010239.json index 2f497be910f..b46fb20d857 100644 --- a/2019/1010xxx/CVE-2019-1010239.json +++ b/2019/1010xxx/CVE-2019-1010239.json @@ -61,6 +61,9 @@ "url": "https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b", "refsource": "MISC", "name": "https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/10xxx/CVE-2019-10072.json b/2019/10xxx/CVE-2019-10072.json index 92b9e51cf39..a38e1675f6a 100644 --- a/2019/10xxx/CVE-2019-10072.json +++ b/2019/10xxx/CVE-2019-10072.json @@ -133,6 +133,9 @@ "refsource": "DEBIAN", "name": "DSA-4680", "url": "https://www.debian.org/security/2020/dsa-4680" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10097.json b/2019/10xxx/CVE-2019-10097.json index 7568c342250..fbc017f003e 100644 --- a/2019/10xxx/CVE-2019-10097.json +++ b/2019/10xxx/CVE-2019-10097.json @@ -78,6 +78,9 @@ "refsource": "MISC", "name": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10173.json b/2019/10xxx/CVE-2019-10173.json index f79459763fe..13d58ddcfa8 100644 --- a/2019/10xxx/CVE-2019-10173.json +++ b/2019/10xxx/CVE-2019-10173.json @@ -78,6 +78,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10241.json b/2019/10xxx/CVE-2019-10241.json index 0cad6ca0868..d2d7ac67ce3 100644 --- a/2019/10xxx/CVE-2019-10241.json +++ b/2019/10xxx/CVE-2019-10241.json @@ -120,6 +120,9 @@ "refsource": "MLIST", "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/10xxx/CVE-2019-10246.json b/2019/10xxx/CVE-2019-10246.json index a02dbc78940..bfa1a88edeb 100644 --- a/2019/10xxx/CVE-2019-10246.json +++ b/2019/10xxx/CVE-2019-10246.json @@ -100,6 +100,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190509-0003/", "url": "https://security.netapp.com/advisory/ntap-20190509-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/10xxx/CVE-2019-10247.json b/2019/10xxx/CVE-2019-10247.json index 0f88cda50e2..69c697c48ba 100644 --- a/2019/10xxx/CVE-2019-10247.json +++ b/2019/10xxx/CVE-2019-10247.json @@ -128,6 +128,9 @@ "name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577", "refsource": "CONFIRM", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/10xxx/CVE-2019-10744.json b/2019/10xxx/CVE-2019-10744.json index bbffcde26eb..4c988fca938 100644 --- a/2019/10xxx/CVE-2019-10744.json +++ b/2019/10xxx/CVE-2019-10744.json @@ -63,6 +63,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11048.json b/2019/11xxx/CVE-2019-11048.json index 36d10bd6e80..8d6226ad8eb 100644 --- a/2019/11xxx/CVE-2019-11048.json +++ b/2019/11xxx/CVE-2019-11048.json @@ -148,6 +148,9 @@ "refsource": "DEBIAN", "name": "DSA-4719", "url": "https://www.debian.org/security/2020/dsa-4719" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11358.json b/2019/11xxx/CVE-2019-11358.json index 7a5501d1e89..36128d8d44c 100644 --- a/2019/11xxx/CVE-2019-11358.json +++ b/2019/11xxx/CVE-2019-11358.json @@ -371,6 +371,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2020-02", "url": "https://www.tenable.com/security/tns-2020-02" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/11xxx/CVE-2019-11477.json b/2019/11xxx/CVE-2019-11477.json index bd9f940bf43..3d685b52b9f 100644 --- a/2019/11xxx/CVE-2019-11477.json +++ b/2019/11xxx/CVE-2019-11477.json @@ -241,6 +241,9 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11478.json b/2019/11xxx/CVE-2019-11478.json index 69c41931065..2ccbdf27e18 100644 --- a/2019/11xxx/CVE-2019-11478.json +++ b/2019/11xxx/CVE-2019-11478.json @@ -240,6 +240,9 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11479.json b/2019/11xxx/CVE-2019-11479.json index 5a4b3316f32..980b7378e53 100644 --- a/2019/11xxx/CVE-2019-11479.json +++ b/2019/11xxx/CVE-2019-11479.json @@ -234,6 +234,9 @@ "refsource": "CONFIRM", "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/11xxx/CVE-2019-11834.json b/2019/11xxx/CVE-2019-11834.json index 6d905ba16cb..078b2d21201 100644 --- a/2019/11xxx/CVE-2019-11834.json +++ b/2019/11xxx/CVE-2019-11834.json @@ -66,6 +66,9 @@ "url": "https://github.com/DaveGamble/cJSON/compare/c69134d...93688cb", "refsource": "MISC", "name": "https://github.com/DaveGamble/cJSON/compare/c69134d...93688cb" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/11xxx/CVE-2019-11835.json b/2019/11xxx/CVE-2019-11835.json index 9fbe6ed59a0..9a675e2b467 100644 --- a/2019/11xxx/CVE-2019-11835.json +++ b/2019/11xxx/CVE-2019-11835.json @@ -66,6 +66,9 @@ "url": "https://github.com/DaveGamble/cJSON/issues/338", "refsource": "MISC", "name": "https://github.com/DaveGamble/cJSON/issues/338" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/11xxx/CVE-2019-11922.json b/2019/11xxx/CVE-2019-11922.json index fc6e00ddc5c..65e599b9af7 100644 --- a/2019/11xxx/CVE-2019-11922.json +++ b/2019/11xxx/CVE-2019-11922.json @@ -87,6 +87,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2019:2008", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12086.json b/2019/12xxx/CVE-2019-12086.json index dc2a033cb33..55fabbedbc1 100644 --- a/2019/12xxx/CVE-2019-12086.json +++ b/2019/12xxx/CVE-2019-12086.json @@ -241,6 +241,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12260.json b/2019/12xxx/CVE-2019-12260.json index ed16f73d544..35afae18acf 100644 --- a/2019/12xxx/CVE-2019-12260.json +++ b/2019/12xxx/CVE-2019-12260.json @@ -96,6 +96,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12261.json b/2019/12xxx/CVE-2019-12261.json index 6e0e7407a07..fc57ca121e5 100644 --- a/2019/12xxx/CVE-2019-12261.json +++ b/2019/12xxx/CVE-2019-12261.json @@ -96,6 +96,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12384.json b/2019/12xxx/CVE-2019-12384.json index f5af4d1468e..38a57f1c1cf 100644 --- a/2019/12xxx/CVE-2019-12384.json +++ b/2019/12xxx/CVE-2019-12384.json @@ -276,6 +276,9 @@ "refsource": "MISC", "name": "https://blog.doyensec.com/2019/07/22/jackson-gadgets.html", "url": "https://blog.doyensec.com/2019/07/22/jackson-gadgets.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12402.json b/2019/12xxx/CVE-2019-12402.json index 2e15c86e608..7a2d488d3c7 100644 --- a/2019/12xxx/CVE-2019-12402.json +++ b/2019/12xxx/CVE-2019-12402.json @@ -158,6 +158,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E", "url": "https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12415.json b/2019/12xxx/CVE-2019-12415.json index d6d7a578c11..186d3450131 100644 --- a/2019/12xxx/CVE-2019-12415.json +++ b/2019/12xxx/CVE-2019-12415.json @@ -83,6 +83,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12419.json b/2019/12xxx/CVE-2019-12419.json index a837293164d..561894f4913 100644 --- a/2019/12xxx/CVE-2019-12419.json +++ b/2019/12xxx/CVE-2019-12419.json @@ -73,6 +73,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12423.json b/2019/12xxx/CVE-2019-12423.json index c38683b5c61..6f9bc03aa8e 100644 --- a/2019/12xxx/CVE-2019-12423.json +++ b/2019/12xxx/CVE-2019-12423.json @@ -68,6 +68,9 @@ "refsource": "CONFIRM", "name": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2", "url": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12814.json b/2019/12xxx/CVE-2019-12814.json index 449a6058364..1fa095f2cb8 100644 --- a/2019/12xxx/CVE-2019-12814.json +++ b/2019/12xxx/CVE-2019-12814.json @@ -321,6 +321,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20190625-0006/", "url": "https://security.netapp.com/advisory/ntap-20190625-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/12xxx/CVE-2019-12900.json b/2019/12xxx/CVE-2019-12900.json index 26bb7e3a540..eb2e7e42ad1 100644 --- a/2019/12xxx/CVE-2019-12900.json +++ b/2019/12xxx/CVE-2019-12900.json @@ -151,6 +151,9 @@ "refsource": "MLIST", "name": "[kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka", "url": "https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/13xxx/CVE-2019-13990.json b/2019/13xxx/CVE-2019-13990.json index c9fe8818bc4..8a353c86532 100644 --- a/2019/13xxx/CVE-2019-13990.json +++ b/2019/13xxx/CVE-2019-13990.json @@ -106,6 +106,9 @@ "refsource": "MLIST", "name": "[tomee-commits] 20200720 [jira] [Assigned] (TOMEE-2886) Update quartz-scheduler to mitigate CVE-2019-13990", "url": "https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14379.json b/2019/14xxx/CVE-2019-14379.json index 20e1b0f27e1..f0dd3f502f4 100644 --- a/2019/14xxx/CVE-2019-14379.json +++ b/2019/14xxx/CVE-2019-14379.json @@ -326,6 +326,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14540.json b/2019/14xxx/CVE-2019-14540.json index 65f708d4f52..46455f3dfe3 100644 --- a/2019/14xxx/CVE-2019-14540.json +++ b/2019/14xxx/CVE-2019-14540.json @@ -221,6 +221,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/14xxx/CVE-2019-14893.json b/2019/14xxx/CVE-2019-14893.json index f478cd81d8c..24b726f6b2d 100644 --- a/2019/14xxx/CVE-2019-14893.json +++ b/2019/14xxx/CVE-2019-14893.json @@ -89,6 +89,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/15xxx/CVE-2019-15903.json b/2019/15xxx/CVE-2019-15903.json index b604cceec91..566c8c74580 100644 --- a/2019/15xxx/CVE-2019-15903.json +++ b/2019/15xxx/CVE-2019-15903.json @@ -336,6 +336,9 @@ "refsource": "UBUNTU", "name": "USN-4335-1", "url": "https://usn.ubuntu.com/4335-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16335.json b/2019/16xxx/CVE-2019-16335.json index fffff5d3d52..75960cd48d7 100644 --- a/2019/16xxx/CVE-2019-16335.json +++ b/2019/16xxx/CVE-2019-16335.json @@ -206,6 +206,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16942.json b/2019/16xxx/CVE-2019-16942.json index 3f45b92c542..37ad0837cc7 100644 --- a/2019/16xxx/CVE-2019-16942.json +++ b/2019/16xxx/CVE-2019-16942.json @@ -181,6 +181,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/16xxx/CVE-2019-16943.json b/2019/16xxx/CVE-2019-16943.json index 36e33871e77..3ab88bfd680 100644 --- a/2019/16xxx/CVE-2019-16943.json +++ b/2019/16xxx/CVE-2019-16943.json @@ -176,6 +176,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17091.json b/2019/17xxx/CVE-2019-17091.json index 47083a4a69c..7cae2fc48f2 100644 --- a/2019/17xxx/CVE-2019-17091.json +++ b/2019/17xxx/CVE-2019-17091.json @@ -121,6 +121,9 @@ "url": "https://github.com/javaserverfaces/mojarra/commit/f61935cd39f34329fbf27b1972a506fbdd0ab4d4", "refsource": "MISC", "name": "https://github.com/javaserverfaces/mojarra/commit/f61935cd39f34329fbf27b1972a506fbdd0ab4d4" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17267.json b/2019/17xxx/CVE-2019-17267.json index 6fb1f4dc634..bdc08c572ad 100644 --- a/2019/17xxx/CVE-2019-17267.json +++ b/2019/17xxx/CVE-2019-17267.json @@ -146,6 +146,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17359.json b/2019/17xxx/CVE-2019-17359.json index fdb61461a10..1c17389d0a8 100644 --- a/2019/17xxx/CVE-2019-17359.json +++ b/2019/17xxx/CVE-2019-17359.json @@ -121,6 +121,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20191024-0006/", "url": "https://security.netapp.com/advisory/ntap-20191024-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17495.json b/2019/17xxx/CVE-2019-17495.json index 60a182b8240..2a815fff496 100644 --- a/2019/17xxx/CVE-2019-17495.json +++ b/2019/17xxx/CVE-2019-17495.json @@ -61,6 +61,9 @@ "url": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11", "refsource": "MISC", "name": "https://github.com/swagger-api/swagger-ui/releases/tag/v3.23.11" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17531.json b/2019/17xxx/CVE-2019-17531.json index 3c74a0110ca..8ec8e926e5c 100644 --- a/2019/17xxx/CVE-2019-17531.json +++ b/2019/17xxx/CVE-2019-17531.json @@ -136,6 +136,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17543.json b/2019/17xxx/CVE-2019-17543.json index 41e9c652f2d..803aee314a9 100644 --- a/2019/17xxx/CVE-2019-17543.json +++ b/2019/17xxx/CVE-2019-17543.json @@ -131,6 +131,9 @@ "refsource": "MLIST", "name": "[kudu-issues] 20200709 [jira] [Resolved] (KUDU-3156) Whether the CVE-2019-17543 vulnerability of lz affects kudu", "url": "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17558.json b/2019/17xxx/CVE-2019-17558.json index 8e4886ee3d4..27395ebe278 100644 --- a/2019/17xxx/CVE-2019-17558.json +++ b/2019/17xxx/CVE-2019-17558.json @@ -138,6 +138,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/157078/Apache-Solr-8.3.0-Velocity-Template-Remote-Code-Execution.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17569.json b/2019/17xxx/CVE-2019-17569.json index 51313b3f368..5cce4d93f6b 100644 --- a/2019/17xxx/CVE-2019-17569.json +++ b/2019/17xxx/CVE-2019-17569.json @@ -94,6 +94,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200327-0005/", "url": "https://security.netapp.com/advisory/ntap-20200327-0005/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17632.json b/2019/17xxx/CVE-2019-17632.json index ade50391956..740bd273739 100644 --- a/2019/17xxx/CVE-2019-17632.json +++ b/2019/17xxx/CVE-2019-17632.json @@ -36,7 +36,7 @@ "credit": [ { "lang": "eng", - "value": "This vulnerability was discovered by Jon Are Rakv\u00e5g, Security architect, SpareBank 1 Utvikling and Erlend Leiknes, Security Consultant, mnemonic as" + "value": "This vulnerability was discovered by Jon Are Rakvåg, Security architect, SpareBank 1 Utvikling and Erlend Leiknes, Security Consultant, mnemonic as" } ], "data_format": "MITRE", @@ -73,6 +73,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-4913d43d77", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/17xxx/CVE-2019-17638.json b/2019/17xxx/CVE-2019-17638.json index de81fe77654..1136496d189 100644 --- a/2019/17xxx/CVE-2019-17638.json +++ b/2019/17xxx/CVE-2019-17638.json @@ -124,6 +124,9 @@ "refsource": "MLIST", "name": "[pulsar-commits] 20201005 [GitHub] [pulsar] abhishekheaven7 closed issue #8203: Pulsar client with version 2.6.1 has critical vulnerability CVE-2019-17638", "url": "https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/18xxx/CVE-2019-18348.json b/2019/18xxx/CVE-2019-18348.json index 32a77caef56..7338d8c7b87 100644 --- a/2019/18xxx/CVE-2019-18348.json +++ b/2019/18xxx/CVE-2019-18348.json @@ -111,6 +111,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1547.json b/2019/1xxx/CVE-2019-1547.json index c1d76ee6673..cc4185e8af4 100644 --- a/2019/1xxx/CVE-2019-1547.json +++ b/2019/1xxx/CVE-2019-1547.json @@ -38,7 +38,7 @@ "credit": [ { "lang": "eng", - "value": "Cesar Pereida Garc\u00eda, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley" + "value": "Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, and Billy Brumley" } ], "data_format": "MITRE", @@ -232,6 +232,9 @@ "refsource": "UBUNTU", "name": "USN-4504-1", "url": "https://usn.ubuntu.com/4504-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1549.json b/2019/1xxx/CVE-2019-1549.json index 7e18e6db3a1..ed7c468030f 100644 --- a/2019/1xxx/CVE-2019-1549.json +++ b/2019/1xxx/CVE-2019-1549.json @@ -136,6 +136,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K44070243?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K44070243?utm_source=f5support&utm_medium=RSS" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1552.json b/2019/1xxx/CVE-2019-1552.json index 50298deb83f..1a8ed3a177c 100644 --- a/2019/1xxx/CVE-2019-1552.json +++ b/2019/1xxx/CVE-2019-1552.json @@ -157,6 +157,9 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K94041354?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K94041354?utm_source=f5support&utm_medium=RSS" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/1xxx/CVE-2019-1563.json b/2019/1xxx/CVE-2019-1563.json index 3f619e6ef19..1a1f11c66b8 100644 --- a/2019/1xxx/CVE-2019-1563.json +++ b/2019/1xxx/CVE-2019-1563.json @@ -212,6 +212,9 @@ "refsource": "UBUNTU", "name": "USN-4504-1", "url": "https://usn.ubuntu.com/4504-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/20xxx/CVE-2019-20330.json b/2019/20xxx/CVE-2019-20330.json index 16750b92c55..67a641ea11f 100644 --- a/2019/20xxx/CVE-2019-20330.json +++ b/2019/20xxx/CVE-2019-20330.json @@ -206,6 +206,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3738.json b/2019/3xxx/CVE-2019-3738.json index 5ab94e3fa7f..524d97eebaf 100644 --- a/2019/3xxx/CVE-2019-3738.json +++ b/2019/3xxx/CVE-2019-3738.json @@ -75,6 +75,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10318" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3739.json b/2019/3xxx/CVE-2019-3739.json index 36b959b348d..bcb261c951c 100644 --- a/2019/3xxx/CVE-2019-3739.json +++ b/2019/3xxx/CVE-2019-3739.json @@ -70,6 +70,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities", "name": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/3xxx/CVE-2019-3740.json b/2019/3xxx/CVE-2019-3740.json index b1735f93409..5d4258a2c8c 100644 --- a/2019/3xxx/CVE-2019-3740.json +++ b/2019/3xxx/CVE-2019-3740.json @@ -70,6 +70,9 @@ "refsource": "MISC", "url": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities", "name": "https://www.dell.com/support/security/en-us/details/DOC-106556/DSA-2019-094-RSA-BSAFE®-Crypto-J-Multiple-Security-Vulnerabilities" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2019/5xxx/CVE-2019-5427.json b/2019/5xxx/CVE-2019-5427.json index ceb7c1bdcb6..1d8f96863eb 100644 --- a/2019/5xxx/CVE-2019-5427.json +++ b/2019/5xxx/CVE-2019-5427.json @@ -68,6 +68,9 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/509315", "url": "https://hackerone.com/reports/509315" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5435.json b/2019/5xxx/CVE-2019-5435.json index d48e2a3ace8..0c3ffc806d9 100644 --- a/2019/5xxx/CVE-2019-5435.json +++ b/2019/5xxx/CVE-2019-5435.json @@ -78,6 +78,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5436.json b/2019/5xxx/CVE-2019-5436.json index 080349ea685..a14d4a9db06 100644 --- a/2019/5xxx/CVE-2019-5436.json +++ b/2019/5xxx/CVE-2019-5436.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5443.json b/2019/5xxx/CVE-2019-5443.json index 3fdf8cdcd31..9f62945d7c5 100644 --- a/2019/5xxx/CVE-2019-5443.json +++ b/2019/5xxx/CVE-2019-5443.json @@ -73,6 +73,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5481.json b/2019/5xxx/CVE-2019-5481.json index ed99ac2fcd0..d2937c77434 100644 --- a/2019/5xxx/CVE-2019-5481.json +++ b/2019/5xxx/CVE-2019-5481.json @@ -103,6 +103,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/5xxx/CVE-2019-5482.json b/2019/5xxx/CVE-2019-5482.json index c7e8fdc2197..446071c46ea 100644 --- a/2019/5xxx/CVE-2019-5482.json +++ b/2019/5xxx/CVE-2019-5482.json @@ -108,6 +108,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200416-0003/", "url": "https://security.netapp.com/advisory/ntap-20200416-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9511.json b/2019/9xxx/CVE-2019-9511.json index 8939092042d..fad326e3896 100644 --- a/2019/9xxx/CVE-2019-9511.json +++ b/2019/9xxx/CVE-2019-9511.json @@ -303,6 +303,9 @@ "refsource": "DEBIAN", "name": "DSA-4669", "url": "https://www.debian.org/security/2020/dsa-4669" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9513.json b/2019/9xxx/CVE-2019-9513.json index d094bc51c3e..be115fec73e 100644 --- a/2019/9xxx/CVE-2019-9513.json +++ b/2019/9xxx/CVE-2019-9513.json @@ -278,6 +278,9 @@ "refsource": "DEBIAN", "name": "DSA-4669", "url": "https://www.debian.org/security/2020/dsa-4669" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10108.json b/2020/10xxx/CVE-2020-10108.json index e909857db9d..63222d30dfe 100644 --- a/2020/10xxx/CVE-2020-10108.json +++ b/2020/10xxx/CVE-2020-10108.json @@ -86,6 +86,9 @@ "refsource": "GENTOO", "name": "GLSA-202007-24", "url": "https://security.gentoo.org/glsa/202007-24" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10543.json b/2020/10xxx/CVE-2020-10543.json index bec60b34148..2fc59b1b64a 100644 --- a/2020/10xxx/CVE-2020-10543.json +++ b/2020/10xxx/CVE-2020-10543.json @@ -86,6 +86,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0850", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10672.json b/2020/10xxx/CVE-2020-10672.json index 763599fd44a..163ae840c91 100644 --- a/2020/10xxx/CVE-2020-10672.json +++ b/2020/10xxx/CVE-2020-10672.json @@ -76,6 +76,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200403-0002/", "url": "https://security.netapp.com/advisory/ntap-20200403-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10673.json b/2020/10xxx/CVE-2020-10673.json index c43d2927a94..2f60be673a5 100644 --- a/2020/10xxx/CVE-2020-10673.json +++ b/2020/10xxx/CVE-2020-10673.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2660", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2660" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index c2f037ef9e9..6801eab1552 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -101,6 +101,9 @@ "refsource": "UBUNTU", "name": "USN-4575-1", "url": "https://usn.ubuntu.com/4575-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10722.json b/2020/10xxx/CVE-2020-10722.json index bfd0fc6ad3e..560f95cc81a 100644 --- a/2020/10xxx/CVE-2020-10722.json +++ b/2020/10xxx/CVE-2020-10722.json @@ -79,6 +79,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-04e3d34451", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10723.json b/2020/10xxx/CVE-2020-10723.json index a48d22dcb83..af04270bd62 100644 --- a/2020/10xxx/CVE-2020-10723.json +++ b/2020/10xxx/CVE-2020-10723.json @@ -79,6 +79,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-04e3d34451", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10724.json b/2020/10xxx/CVE-2020-10724.json index c73d0e3f8c3..c3af52f22b5 100644 --- a/2020/10xxx/CVE-2020-10724.json +++ b/2020/10xxx/CVE-2020-10724.json @@ -79,6 +79,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-04e3d34451", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRHKFVV4MRWNNJOYQOVP64L4UVWYPEO4/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10878.json b/2020/10xxx/CVE-2020-10878.json index 212fcb3a71a..0842db17a25 100644 --- a/2020/10xxx/CVE-2020-10878.json +++ b/2020/10xxx/CVE-2020-10878.json @@ -91,6 +91,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0850", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10968.json b/2020/10xxx/CVE-2020-10968.json index b3618338bfe..c4340581f8b 100644 --- a/2020/10xxx/CVE-2020-10968.json +++ b/2020/10xxx/CVE-2020-10968.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2662", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2662" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/10xxx/CVE-2020-10969.json b/2020/10xxx/CVE-2020-10969.json index 46f157746e4..6af8c676860 100644 --- a/2020/10xxx/CVE-2020-10969.json +++ b/2020/10xxx/CVE-2020-10969.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2642", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2642" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json index 7e2e4cd58b1..347a64aae2c 100644 --- a/2020/11xxx/CVE-2020-11022.json +++ b/2020/11xxx/CVE-2020-11022.json @@ -153,6 +153,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-fe94df8c34", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json index 1ab440edbf0..72a6a64c81a 100644 --- a/2020/11xxx/CVE-2020-11023.json +++ b/2020/11xxx/CVE-2020-11023.json @@ -233,6 +233,9 @@ "refsource": "MLIST", "name": "[nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html", "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11080.json b/2020/11xxx/CVE-2020-11080.json index c3968e92847..8501b67e146 100644 --- a/2020/11xxx/CVE-2020-11080.json +++ b/2020/11xxx/CVE-2020-11080.json @@ -103,6 +103,9 @@ "name": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394", "refsource": "MISC", "url": "https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11111.json b/2020/11xxx/CVE-2020-11111.json index e5d3a0e89c9..7ab02118886 100644 --- a/2020/11xxx/CVE-2020-11111.json +++ b/2020/11xxx/CVE-2020-11111.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2664", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2664" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11112.json b/2020/11xxx/CVE-2020-11112.json index 3974e49d05b..ea4c27eaae9 100644 --- a/2020/11xxx/CVE-2020-11112.json +++ b/2020/11xxx/CVE-2020-11112.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2666", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2666" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11113.json b/2020/11xxx/CVE-2020-11113.json index 99c68d96a03..f1de36c5902 100644 --- a/2020/11xxx/CVE-2020-11113.json +++ b/2020/11xxx/CVE-2020-11113.json @@ -76,6 +76,9 @@ "url": "https://github.com/FasterXML/jackson-databind/issues/2670", "refsource": "MISC", "name": "https://github.com/FasterXML/jackson-databind/issues/2670" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11619.json b/2020/11xxx/CVE-2020-11619.json index 214815faeae..05a38101380 100644 --- a/2020/11xxx/CVE-2020-11619.json +++ b/2020/11xxx/CVE-2020-11619.json @@ -81,6 +81,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11620.json b/2020/11xxx/CVE-2020-11620.json index a6cd03f42ed..bd294303639 100644 --- a/2020/11xxx/CVE-2020-11620.json +++ b/2020/11xxx/CVE-2020-11620.json @@ -81,6 +81,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11655.json b/2020/11xxx/CVE-2020-11655.json index 17804490ce1..504224a6bbc 100644 --- a/2020/11xxx/CVE-2020-11655.json +++ b/2020/11xxx/CVE-2020-11655.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11656.json b/2020/11xxx/CVE-2020-11656.json index 208ee0c0c47..dbcfdbf9902 100644 --- a/2020/11xxx/CVE-2020-11656.json +++ b/2020/11xxx/CVE-2020-11656.json @@ -81,6 +81,9 @@ "refsource": "FREEBSD", "name": "FreeBSD-SA-20:22", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/11xxx/CVE-2020-11971.json b/2020/11xxx/CVE-2020-11971.json index 85fe41b6218..5c7f56d174c 100644 --- a/2020/11xxx/CVE-2020-11971.json +++ b/2020/11xxx/CVE-2020-11971.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[activemq-issues] 20200622 [jira] [Assigned] (AMQ-7492) CVE-2020-11971 needs AMQ to upgrade to Apache Camel 3.2.0", "url": "https://lists.apache.org/thread.html/r8988311eb2481fd8a87e69cf17ffb8dc81bfeba5503021537f72db0a@%3Cissues.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11972.json b/2020/11xxx/CVE-2020-11972.json index c669e364cc2..d6b0effc401 100644 --- a/2020/11xxx/CVE-2020-11972.json +++ b/2020/11xxx/CVE-2020-11972.json @@ -58,6 +58,9 @@ "refsource": "MLIST", "name": "[oss-security] 20200514 Re: [SECURITY] New security advisory CVE-2020-11972 released for Apache Camel", "url": "http://www.openwall.com/lists/oss-security/2020/05/14/10" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11973.json b/2020/11xxx/CVE-2020-11973.json index 0105224942c..d44fd1b1f7f 100644 --- a/2020/11xxx/CVE-2020-11973.json +++ b/2020/11xxx/CVE-2020-11973.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[oss-security] 20200514 [SECURITY] New security advisory CVE-2020-11973 released for Apache Camel", "url": "http://www.openwall.com/lists/oss-security/2020/05/14/9" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11984.json b/2020/11xxx/CVE-2020-11984.json index e97808b984f..31bd0385a3c 100644 --- a/2020/11xxx/CVE-2020-11984.json +++ b/2020/11xxx/CVE-2020-11984.json @@ -138,6 +138,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-0d3d3f5072", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11993.json b/2020/11xxx/CVE-2020-11993.json index 53e9a00a607..b884546989b 100644 --- a/2020/11xxx/CVE-2020-11993.json +++ b/2020/11xxx/CVE-2020-11993.json @@ -103,6 +103,9 @@ "refsource": "DEBIAN", "name": "DSA-4757", "url": "https://www.debian.org/security/2020/dsa-4757" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11996.json b/2020/11xxx/CVE-2020-11996.json index 504bf1bad8c..eaa293c0d76 100644 --- a/2020/11xxx/CVE-2020-11996.json +++ b/2020/11xxx/CVE-2020-11996.json @@ -149,6 +149,9 @@ "refsource": "MLIST", "name": "[tomcat-users] 20201008 Is Tomcat7 supports HTTP2", "url": "https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12243.json b/2020/12xxx/CVE-2020-12243.json index 9b00a9c3aeb..f4ecbd02fdf 100644 --- a/2020/12xxx/CVE-2020-12243.json +++ b/2020/12xxx/CVE-2020-12243.json @@ -101,6 +101,9 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT211289", "url": "https://support.apple.com/kb/HT211289" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/12xxx/CVE-2020-12723.json b/2020/12xxx/CVE-2020-12723.json index 0951122f4b8..96dd9a1d76c 100644 --- a/2020/12xxx/CVE-2020-12723.json +++ b/2020/12xxx/CVE-2020-12723.json @@ -96,6 +96,9 @@ "refsource": "SUSE", "name": "openSUSE-SU-2020:0850", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13630.json b/2020/13xxx/CVE-2020-13630.json index d4c236043be..82e46c418c8 100644 --- a/2020/13xxx/CVE-2020-13630.json +++ b/2020/13xxx/CVE-2020-13630.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13631.json b/2020/13xxx/CVE-2020-13631.json index 895386ce077..ad234340af3 100644 --- a/2020/13xxx/CVE-2020-13631.json +++ b/2020/13xxx/CVE-2020-13631.json @@ -91,6 +91,9 @@ "refsource": "FREEBSD", "name": "FreeBSD-SA-20:22", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13632.json b/2020/13xxx/CVE-2020-13632.json index e53ea4bf213..961397d1bb4 100644 --- a/2020/13xxx/CVE-2020-13632.json +++ b/2020/13xxx/CVE-2020-13632.json @@ -96,6 +96,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/13xxx/CVE-2020-13920.json b/2020/13xxx/CVE-2020-13920.json index 4977e1a7139..123696da71c 100644 --- a/2020/13xxx/CVE-2020-13920.json +++ b/2020/13xxx/CVE-2020-13920.json @@ -53,6 +53,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2400-1] activemq security update", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00013.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13934.json b/2020/13xxx/CVE-2020-13934.json index 4558645d69d..7add4866196 100644 --- a/2020/13xxx/CVE-2020-13934.json +++ b/2020/13xxx/CVE-2020-13934.json @@ -78,6 +78,9 @@ "refsource": "MLIST", "name": "[tomcat-dev] 20200818 [Bug 64671] HTTP/2 Stream.receivedData method throwing continuous NullPointerException in the logs", "url": "https://lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13935.json b/2020/13xxx/CVE-2020-13935.json index 40a9ad56e28..f7948c887e7 100644 --- a/2020/13xxx/CVE-2020-13935.json +++ b/2020/13xxx/CVE-2020-13935.json @@ -83,6 +83,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14060.json b/2020/14xxx/CVE-2020-14060.json index e74b19d92ff..cd750ad4030 100644 --- a/2020/14xxx/CVE-2020-14060.json +++ b/2020/14xxx/CVE-2020-14060.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0003/", "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/14xxx/CVE-2020-14061.json b/2020/14xxx/CVE-2020-14061.json index d16322100e0..d27be752202 100644 --- a/2020/14xxx/CVE-2020-14061.json +++ b/2020/14xxx/CVE-2020-14061.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0003/", "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/14xxx/CVE-2020-14062.json b/2020/14xxx/CVE-2020-14062.json index b479b2cd7b1..a8d4bf532b7 100644 --- a/2020/14xxx/CVE-2020-14062.json +++ b/2020/14xxx/CVE-2020-14062.json @@ -71,6 +71,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0003/", "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/14xxx/CVE-2020-14195.json b/2020/14xxx/CVE-2020-14195.json index e0d6866a55c..53287953ed1 100644 --- a/2020/14xxx/CVE-2020-14195.json +++ b/2020/14xxx/CVE-2020-14195.json @@ -66,6 +66,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200702-0003/", "url": "https://security.netapp.com/advisory/ntap-20200702-0003/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/15xxx/CVE-2020-15358.json b/2020/15xxx/CVE-2020-15358.json index 85e784fe20f..04711190650 100644 --- a/2020/15xxx/CVE-2020-15358.json +++ b/2020/15xxx/CVE-2020-15358.json @@ -81,6 +81,9 @@ "refsource": "UBUNTU", "name": "USN-4438-1", "url": "https://usn.ubuntu.com/4438-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/15xxx/CVE-2020-15389.json b/2020/15xxx/CVE-2020-15389.json index ba8ff3e2453..1d245cd886c 100644 --- a/2020/15xxx/CVE-2020-15389.json +++ b/2020/15xxx/CVE-2020-15389.json @@ -66,6 +66,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200710 [SECURITY] [DLA 2277-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2020/07/msg00008.html" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/1xxx/CVE-2020-1730.json b/2020/1xxx/CVE-2020-1730.json index ad61b1bb29f..3ced58c1b78 100644 --- a/2020/1xxx/CVE-2020-1730.json +++ b/2020/1xxx/CVE-2020-1730.json @@ -76,6 +76,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-6cad41abb0", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2A7BIFKUYIYKTY7FX4BEWVC2OHS5DPOU/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1935.json b/2020/1xxx/CVE-2020-1935.json index 87d19dfdc48..5f2cb260ae1 100644 --- a/2020/1xxx/CVE-2020-1935.json +++ b/2020/1xxx/CVE-2020-1935.json @@ -129,6 +129,9 @@ "refsource": "UBUNTU", "name": "USN-4448-1", "url": "https://usn.ubuntu.com/4448-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1938.json b/2020/1xxx/CVE-2020-1938.json index 5e1d4c5f5b7..b8c6242a516 100644 --- a/2020/1xxx/CVE-2020-1938.json +++ b/2020/1xxx/CVE-2020-1938.json @@ -274,6 +274,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1941.json b/2020/1xxx/CVE-2020-1941.json index c6d4ffd73f1..d524f112daf 100644 --- a/2020/1xxx/CVE-2020-1941.json +++ b/2020/1xxx/CVE-2020-1941.json @@ -58,6 +58,9 @@ "refsource": "MLIST", "name": "[activemq-commits] 20200910 [activemq-website] branch master updated: Publish CVE-2020-11998", "url": "https://lists.apache.org/thread.html/re4672802b0e5ed67c08c9e77057d52138e062f77cc09581b723cf95a@%3Ccommits.activemq.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1945.json b/2020/1xxx/CVE-2020-1945.json index 6b2d85207fd..0923f93cf3a 100644 --- a/2020/1xxx/CVE-2020-1945.json +++ b/2020/1xxx/CVE-2020-1945.json @@ -213,6 +213,9 @@ "refsource": "MLIST", "name": "[creadur-dev] 20201006 [jira] [Resolved] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8", "url": "https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305@%3Cdev.creadur.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1950.json b/2020/1xxx/CVE-2020-1950.json index 4bcc07806df..0b59f1a5105 100644 --- a/2020/1xxx/CVE-2020-1950.json +++ b/2020/1xxx/CVE-2020-1950.json @@ -63,6 +63,9 @@ "refsource": "UBUNTU", "name": "USN-4564-1", "url": "https://usn.ubuntu.com/4564-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1951.json b/2020/1xxx/CVE-2020-1951.json index 356ab4b5dc0..4c61270413d 100644 --- a/2020/1xxx/CVE-2020-1951.json +++ b/2020/1xxx/CVE-2020-1951.json @@ -63,6 +63,9 @@ "refsource": "UBUNTU", "name": "USN-4564-1", "url": "https://usn.ubuntu.com/4564-1/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1953.json b/2020/1xxx/CVE-2020-1953.json index 1ac527be8bd..036c47e67e1 100644 --- a/2020/1xxx/CVE-2020-1953.json +++ b/2020/1xxx/CVE-2020-1953.json @@ -65,6 +65,9 @@ "refsource": "MLIST", "name": "[camel-commits] 20200313 [camel] branch camel-3.1.x updated: Update Commons Configuration 2 due to CVE-2020-1953", "url": "https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1954.json b/2020/1xxx/CVE-2020-1954.json index f9df7ff8181..ba794cb3ae3 100644 --- a/2020/1xxx/CVE-2020-1954.json +++ b/2020/1xxx/CVE-2020-1954.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2", "url": "http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, @@ -55,7 +58,7 @@ "description_data": [ { "lang": "eng", - "value": "Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the \u2018createMBServerConnectorFactory\u2019 property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX." + "value": "Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory’ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX." } ] } diff --git a/2020/1xxx/CVE-2020-1967.json b/2020/1xxx/CVE-2020-1967.json index 5f2ac824856..d4a1b0d0a0c 100644 --- a/2020/1xxx/CVE-2020-1967.json +++ b/2020/1xxx/CVE-2020-1967.json @@ -191,6 +191,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200717-0004/", "url": "https://security.netapp.com/advisory/ntap-20200717-0004/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/3xxx/CVE-2020-3235.json b/2020/3xxx/CVE-2020-3235.json index a391952fbc3..35f4755ce5c 100644 --- a/2020/3xxx/CVE-2020-3235.json +++ b/2020/3xxx/CVE-2020-3235.json @@ -40,12 +40,6 @@ } ] }, - "exploit": [ - { - "lang": "eng", - "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " - } - ], "impact": { "cvss": { "baseScore": "7.7", @@ -71,6 +65,9 @@ "name": "20200603 Cisco IOS and IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3909.json b/2020/3xxx/CVE-2020-3909.json index 9ed46149a76..ba71528164c 100644 --- a/2020/3xxx/CVE-2020-3909.json +++ b/2020/3xxx/CVE-2020-3909.json @@ -145,6 +145,9 @@ "url": "https://support.apple.com/HT211107", "refsource": "MISC", "name": "https://support.apple.com/HT211107" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/4xxx/CVE-2020-4051.json b/2020/4xxx/CVE-2020-4051.json index 0f13bdd556e..9d26903ffea 100644 --- a/2020/4xxx/CVE-2020-4051.json +++ b/2020/4xxx/CVE-2020-4051.json @@ -93,6 +93,9 @@ "name": "https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301", "refsource": "MISC", "url": "https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5397.json b/2020/5xxx/CVE-2020-5397.json index 99e1465fcd9..355818e4638 100644 --- a/2020/5xxx/CVE-2020-5397.json +++ b/2020/5xxx/CVE-2020-5397.json @@ -73,6 +73,9 @@ "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2020-5397", "name": "https://pivotal.io/security/cve-2020-5397" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5398.json b/2020/5xxx/CVE-2020-5398.json index ef89c113453..ffc4acec599 100644 --- a/2020/5xxx/CVE-2020-5398.json +++ b/2020/5xxx/CVE-2020-5398.json @@ -228,6 +228,9 @@ "refsource": "MLIST", "name": "[ambari-commits] 20201019 [ambari] branch branch-2.7 updated: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421 (dlysnichenko) (#3246)", "url": "https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5407.json b/2020/5xxx/CVE-2020-5407.json index dfb8f9f07a0..1bd96e10cfb 100644 --- a/2020/5xxx/CVE-2020-5407.json +++ b/2020/5xxx/CVE-2020-5407.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[geode-dev] 20200521 Proposal to backport GEODE-8167", "url": "https://lists.apache.org/thread.html/ra19a4e7236877fe12bfb52db07b27ad72d9e7a9f5e27bba7e928e18a@%3Cdev.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/5xxx/CVE-2020-5408.json b/2020/5xxx/CVE-2020-5408.json index f054f5c0cbf..d33a5b3b6fe 100644 --- a/2020/5xxx/CVE-2020-5408.json +++ b/2020/5xxx/CVE-2020-5408.json @@ -83,6 +83,9 @@ "refsource": "CONFIRM", "url": "https://tanzu.vmware.com/security/cve-2020-5408", "name": "https://tanzu.vmware.com/security/cve-2020-5408" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7067.json b/2020/7xxx/CVE-2020-7067.json index d9ea55f2989..ed08c590d11 100644 --- a/2020/7xxx/CVE-2020-7067.json +++ b/2020/7xxx/CVE-2020-7067.json @@ -109,6 +109,9 @@ "refsource": "DEBIAN", "name": "DSA-4719", "url": "https://www.debian.org/security/2020/dsa-4719" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8172.json b/2020/8xxx/CVE-2020-8172.json index cb737fbbf2d..9047c0d1987 100644 --- a/2020/8xxx/CVE-2020-8172.json +++ b/2020/8xxx/CVE-2020-8172.json @@ -63,6 +63,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200625-0002/", "url": "https://security.netapp.com/advisory/ntap-20200625-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8174.json b/2020/8xxx/CVE-2020-8174.json index fe1a7c5e494..de0a3f53038 100644 --- a/2020/8xxx/CVE-2020-8174.json +++ b/2020/8xxx/CVE-2020-8174.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/784186", "url": "https://hackerone.com/reports/784186" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8840.json b/2020/8xxx/CVE-2020-8840.json index 6ed4e5e5901..9b2af1c9fa5 100644 --- a/2020/8xxx/CVE-2020-8840.json +++ b/2020/8xxx/CVE-2020-8840.json @@ -266,6 +266,9 @@ "refsource": "MLIST", "name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12", "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9281.json b/2020/9xxx/CVE-2020-9281.json index 947332566f6..8c8701be1bc 100644 --- a/2020/9xxx/CVE-2020-9281.json +++ b/2020/9xxx/CVE-2020-9281.json @@ -71,6 +71,9 @@ "refsource": "FEDORA", "name": "FEDORA-2020-a832c215bf", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L322YA73LCV3TO7ORY45WQDAFJVNKXBE/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9327.json b/2020/9xxx/CVE-2020-9327.json index 4fc2f5e4bb1..615466ac0ec 100644 --- a/2020/9xxx/CVE-2020-9327.json +++ b/2020/9xxx/CVE-2020-9327.json @@ -86,6 +86,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200313-0002/", "url": "https://security.netapp.com/advisory/ntap-20200313-0002/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9409.json b/2020/9xxx/CVE-2020-9409.json index 8e87166aed9..1b1c09ceae2 100644 --- a/2020/9xxx/CVE-2020-9409.json +++ b/2020/9xxx/CVE-2020-9409.json @@ -97,6 +97,9 @@ "name": "http://www.tibco.com/services/support/advisories", "refsource": "CONFIRM", "url": "http://www.tibco.com/services/support/advisories" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9410.json b/2020/9xxx/CVE-2020-9410.json index 81bd4f32425..229d521ef5c 100644 --- a/2020/9xxx/CVE-2020-9410.json +++ b/2020/9xxx/CVE-2020-9410.json @@ -143,6 +143,9 @@ "name": "http://www.tibco.com/services/support/advisories", "refsource": "CONFIRM", "url": "http://www.tibco.com/services/support/advisories" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 1ac73e03f8c..89e651ddec1 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -158,6 +158,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10332" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9488.json b/2020/9xxx/CVE-2020-9488.json index 066e90748f2..c642cde536f 100644 --- a/2020/9xxx/CVE-2020-9488.json +++ b/2020/9xxx/CVE-2020-9488.json @@ -153,6 +153,9 @@ "refsource": "MLIST", "name": "[db-torque-dev] 20200715 Build failed in Jenkins: Torque4-trunk #685", "url": "https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9489.json b/2020/9xxx/CVE-2020-9489.json index 87b8d75f56c..db7762f9696 100644 --- a/2020/9xxx/CVE-2020-9489.json +++ b/2020/9xxx/CVE-2020-9489.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r4d943777e36ca3aa6305a45da5acccc54ad894f2d5a07186cfa2442c%40%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/r4d943777e36ca3aa6305a45da5acccc54ad894f2d5a07186cfa2442c%40%3Cdev.tika.apache.org%3E" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9490.json b/2020/9xxx/CVE-2020-9490.json index 6c4ab83b0f1..991301e5f58 100644 --- a/2020/9xxx/CVE-2020-9490.json +++ b/2020/9xxx/CVE-2020-9490.json @@ -103,6 +103,9 @@ "refsource": "DEBIAN", "name": "DSA-4757", "url": "https://www.debian.org/security/2020/dsa-4757" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9546.json b/2020/9xxx/CVE-2020-9546.json index b426837595b..ab47f5fe227 100644 --- a/2020/9xxx/CVE-2020-9546.json +++ b/2020/9xxx/CVE-2020-9546.json @@ -121,6 +121,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200904-0006/", "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9547.json b/2020/9xxx/CVE-2020-9547.json index db5036c0c29..d51df176016 100644 --- a/2020/9xxx/CVE-2020-9547.json +++ b/2020/9xxx/CVE-2020-9547.json @@ -151,6 +151,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200904-0006/", "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } diff --git a/2020/9xxx/CVE-2020-9548.json b/2020/9xxx/CVE-2020-9548.json index bd92a2736e8..d2f0f596f23 100644 --- a/2020/9xxx/CVE-2020-9548.json +++ b/2020/9xxx/CVE-2020-9548.json @@ -116,6 +116,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20200904-0006/", "url": "https://security.netapp.com/advisory/ntap-20200904-0006/" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] }