mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 19:17:10 +00:00
Bill Situ <Bill.Situ@Oracle.com>
On branch cna/Oracle/CPU2020Oct3rdparty Changes to be committed: modified: 2013/7xxx/CVE-2013-7285.json modified: 2015/1xxx/CVE-2015-1832.json modified: 2015/9xxx/CVE-2015-9251.json modified: 2016/0xxx/CVE-2016-0701.json modified: 2016/1000xxx/CVE-2016-1000031.json modified: 2016/1000xxx/CVE-2016-1000338.json modified: 2016/1000xxx/CVE-2016-1000339.json modified: 2016/1000xxx/CVE-2016-1000340.json modified: 2016/1000xxx/CVE-2016-1000341.json modified: 2016/1000xxx/CVE-2016-1000342.json modified: 2016/1000xxx/CVE-2016-1000343.json modified: 2016/1000xxx/CVE-2016-1000344.json modified: 2016/1000xxx/CVE-2016-1000345.json modified: 2016/1000xxx/CVE-2016-1000346.json modified: 2016/1000xxx/CVE-2016-1000352.json modified: 2016/2xxx/CVE-2016-2167.json modified: 2016/2xxx/CVE-2016-2168.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2510.json modified: 2016/3xxx/CVE-2016-3189.json modified: 2016/4xxx/CVE-2016-4800.json modified: 2016/5xxx/CVE-2016-5000.json modified: 2016/5xxx/CVE-2016-5725.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/8xxx/CVE-2016-8610.json modified: 2016/8xxx/CVE-2016-8734.json modified: 2017/12xxx/CVE-2017-12626.json modified: 2017/13xxx/CVE-2017-13098.json modified: 2017/15xxx/CVE-2017-15095.json modified: 2017/17xxx/CVE-2017-17485.json modified: 2017/3xxx/CVE-2017-3164.json modified: 2017/5xxx/CVE-2017-5644.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5662.json modified: 2017/7xxx/CVE-2017-7525.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9096.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2017/9xxx/CVE-2017-9800.json modified: 2018/1000xxx/CVE-2018-1000180.json modified: 2018/1000xxx/CVE-2018-1000613.json modified: 2018/1000xxx/CVE-2018-1000873.json modified: 2018/11xxx/CVE-2018-11054.json modified: 2018/11xxx/CVE-2018-11055.json modified: 2018/11xxx/CVE-2018-11056.json modified: 2018/11xxx/CVE-2018-11057.json modified: 2018/11xxx/CVE-2018-11058.json modified: 2018/11xxx/CVE-2018-11307.json modified: 2018/12xxx/CVE-2018-12022.json modified: 2018/12xxx/CVE-2018-12023.json modified: 2018/12xxx/CVE-2018-12536.json modified: 2018/12xxx/CVE-2018-12538.json modified: 2018/12xxx/CVE-2018-12545.json modified: 2018/14xxx/CVE-2018-14718.json modified: 2018/15xxx/CVE-2018-15769.json modified: 2018/17xxx/CVE-2018-17196.json modified: 2018/20xxx/CVE-2018-20843.json modified: 2018/3xxx/CVE-2018-3693.json modified: 2018/5xxx/CVE-2018-5382.json modified: 2018/5xxx/CVE-2018-5968.json modified: 2018/7xxx/CVE-2018-7489.json modified: 2018/8xxx/CVE-2018-8013.json modified: 2018/8xxx/CVE-2018-8088.json modified: 2019/0xxx/CVE-2019-0192.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/1010xxx/CVE-2019-1010239.json modified: 2019/10xxx/CVE-2019-10072.json modified: 2019/10xxx/CVE-2019-10097.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10241.json modified: 2019/10xxx/CVE-2019-10246.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10744.json modified: 2019/11xxx/CVE-2019-11048.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/11xxx/CVE-2019-11477.json modified: 2019/11xxx/CVE-2019-11478.json modified: 2019/11xxx/CVE-2019-11479.json modified: 2019/11xxx/CVE-2019-11834.json modified: 2019/11xxx/CVE-2019-11835.json modified: 2019/11xxx/CVE-2019-11922.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12260.json modified: 2019/12xxx/CVE-2019-12261.json modified: 2019/12xxx/CVE-2019-12384.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12419.json modified: 2019/12xxx/CVE-2019-12423.json modified: 2019/12xxx/CVE-2019-12814.json modified: 2019/12xxx/CVE-2019-12900.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/14xxx/CVE-2019-14379.json modified: 2019/14xxx/CVE-2019-14540.json modified: 2019/14xxx/CVE-2019-14893.json modified: 2019/15xxx/CVE-2019-15903.json modified: 2019/16xxx/CVE-2019-16335.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17091.json modified: 2019/17xxx/CVE-2019-17267.json modified: 2019/17xxx/CVE-2019-17359.json modified: 2019/17xxx/CVE-2019-17495.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17543.json modified: 2019/17xxx/CVE-2019-17558.json modified: 2019/17xxx/CVE-2019-17569.json modified: 2019/17xxx/CVE-2019-17632.json modified: 2019/17xxx/CVE-2019-17638.json modified: 2019/18xxx/CVE-2019-18348.json modified: 2019/1xxx/CVE-2019-1547.json modified: 2019/1xxx/CVE-2019-1549.json modified: 2019/1xxx/CVE-2019-1552.json modified: 2019/1xxx/CVE-2019-1563.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/5xxx/CVE-2019-5427.json modified: 2019/5xxx/CVE-2019-5435.json modified: 2019/5xxx/CVE-2019-5436.json modified: 2019/5xxx/CVE-2019-5443.json modified: 2019/5xxx/CVE-2019-5481.json modified: 2019/5xxx/CVE-2019-5482.json modified: 2019/9xxx/CVE-2019-9511.json modified: 2019/9xxx/CVE-2019-9513.json modified: 2020/10xxx/CVE-2020-10108.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10672.json modified: 2020/10xxx/CVE-2020-10673.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10722.json modified: 2020/10xxx/CVE-2020-10723.json modified: 2020/10xxx/CVE-2020-10724.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/10xxx/CVE-2020-10968.json modified: 2020/10xxx/CVE-2020-10969.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11111.json modified: 2020/11xxx/CVE-2020-11112.json modified: 2020/11xxx/CVE-2020-11113.json modified: 2020/11xxx/CVE-2020-11619.json modified: 2020/11xxx/CVE-2020-11620.json modified: 2020/11xxx/CVE-2020-11655.json modified: 2020/11xxx/CVE-2020-11656.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11972.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11984.json modified: 2020/11xxx/CVE-2020-11993.json modified: 2020/11xxx/CVE-2020-11996.json modified: 2020/12xxx/CVE-2020-12243.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13630.json modified: 2020/13xxx/CVE-2020-13631.json modified: 2020/13xxx/CVE-2020-13632.json modified: 2020/13xxx/CVE-2020-13920.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/15xxx/CVE-2020-15389.json modified: 2020/1xxx/CVE-2020-1730.json modified: 2020/1xxx/CVE-2020-1935.json modified: 2020/1xxx/CVE-2020-1938.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1950.json modified: 2020/1xxx/CVE-2020-1951.json modified: 2020/1xxx/CVE-2020-1953.json modified: 2020/1xxx/CVE-2020-1954.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/3xxx/CVE-2020-3235.json modified: 2020/3xxx/CVE-2020-3909.json modified: 2020/4xxx/CVE-2020-4051.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5407.json modified: 2020/5xxx/CVE-2020-5408.json modified: 2020/7xxx/CVE-2020-7067.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8840.json modified: 2020/9xxx/CVE-2020-9281.json modified: 2020/9xxx/CVE-2020-9327.json modified: 2020/9xxx/CVE-2020-9409.json modified: 2020/9xxx/CVE-2020-9410.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2020/9xxx/CVE-2020-9489.json modified: 2020/9xxx/CVE-2020-9490.json modified: 2020/9xxx/CVE-2020-9546.json modified: 2020/9xxx/CVE-2020-9547.json modified: 2020/9xxx/CVE-2020-9548.json
This commit is contained in:
parent
64f8bffebd
commit
b9b857a3a0
@ -86,6 +86,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.",
|
||||
"url": "https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -226,6 +226,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html",
|
||||
"url": "http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,9 @@
|
||||
"name": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,9 @@
|
||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"refsource": "MISC"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
|
||||
"url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"name": "RHSA-2018:2927",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"name": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"name": "RHSA-2018:2927",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"name": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
|
||||
"url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"name": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"name": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"name": "RHSA-2018:2927",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:2927"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"name": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,9 @@
|
||||
"name": "GLSA-201610-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-05"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,9 @@
|
||||
"name": "GLSA-201610-05",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201610-05"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -436,6 +436,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10310"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:1545",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:1545"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -146,6 +146,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[kafka-jira] 20200414 [jira] [Commented] (KAFKA-9858) CVE-2016-3189 Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.",
|
||||
"url": "https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-16-362",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-16-362"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI's XLSX2CSV Example",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.apache.org/list.html?user@poi.apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200425 [SECURITY] [DLA 2184-1] jsch security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/04/msg00017.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -211,6 +211,9 @@
|
||||
"name": "https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -196,6 +196,9 @@
|
||||
"name": "https://security.paloaltonetworks.com/CVE-2016-8610",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://security.paloaltonetworks.com/CVE-2016-8610"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -80,6 +80,9 @@
|
||||
"name": "DSA-3932",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2017/dsa-3932"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -92,6 +92,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -108,6 +108,9 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:0607",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -210,6 +210,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200131 [SECURITY] [DLA 2091-1] libjackson-json-java security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -166,6 +166,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3892",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3892"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -102,6 +102,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html",
|
||||
"url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,9 @@
|
||||
"name": "96983",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/96983"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -401,6 +401,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"name": "97948",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/97948"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -338,6 +338,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200824 [SECURITY] [DLA 2342-1] libjackson-json-java security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[maven-issues] 20200730 [GitHub] [maven-dependency-plugin] slachiewicz commented on pull request #91: Bump jettyVersion from 9.2.28.v20190418 to 9.3.0.v20150612",
|
||||
"url": "https://lists.apache.org/thread.html/rbf4565a0b63f9c8b07fab29352a97bbffe76ecafed8b8555c15b83c6@%3Cissues.maven.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -123,6 +123,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
|
||||
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -128,6 +128,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
|
||||
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,9 @@
|
||||
"name": "https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_external_entity_attack.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_external_entity_attack.txt"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[hadoop-common-issues] 20191030 [jira] [Created] (HADOOP-16676) Security Vulnerability for dependency jetty-xml -please upgrade",
|
||||
"url": "https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -115,6 +115,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[subversion-commits] 20190830 svn commit: r1866117 - in /subversion/site/publish/docs/community-guide: how-to-roll-releases-in-private.txt issues.part.html",
|
||||
"url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -149,6 +149,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180",
|
||||
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -99,6 +99,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -119,6 +119,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200904-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200904-0004/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,6 +93,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -97,6 +97,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -111,6 +111,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -97,6 +97,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -113,6 +113,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -151,6 +151,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -226,6 +226,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -231,6 +231,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190530-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190530-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,6 +98,9 @@
|
||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
|
||||
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities",
|
||||
"url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -216,6 +216,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -88,6 +88,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.mail-archive.com/dev@kafka.apache.org/msg99277.html",
|
||||
"url": "https://www.mail-archive.com/dev@kafka.apache.org/msg99277.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -136,6 +136,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"name": "https://01.org/security/advisories/intel-oss-10002",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://01.org/security/advisories/intel-oss-10002"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -75,6 +75,9 @@
|
||||
"name": "VU#306792",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "https://www.kb.cert.org/vuls/id/306792"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3149",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -181,6 +181,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3149",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3149"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -127,6 +127,9 @@
|
||||
"name": "https://xmlgraphics.apache.org/security.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://xmlgraphics.apache.org/security.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -261,6 +261,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[logging-notifications] 20200825 [jira] [Commented] (LOG4J2-2329) Fix dependency in log4j-slf4j-impl to slf4j due to CVE-2018-8088",
|
||||
"url": "https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25@%3Cnotifications.logging.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -112,6 +112,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html",
|
||||
"url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -131,6 +131,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190619-0001/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190619-0001/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -138,7 +141,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper\u2019s getACL() command doesn\u2019t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users."
|
||||
"value": "An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,9 @@
|
||||
"url": "https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -133,6 +133,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4680",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4680"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://httpd.apache.org/security/vulnerabilities_24.html",
|
||||
"url": "https://httpd.apache.org/security/vulnerabilities_24.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -120,6 +120,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
|
||||
"url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -100,6 +100,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190509-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190509-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -128,6 +128,9 @@
|
||||
"name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,6 +63,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS",
|
||||
"url": "https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -148,6 +148,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4719",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4719"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -371,6 +371,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2020-02",
|
||||
"url": "https://www.tenable.com/security/tns-2020-02"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -241,6 +241,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt",
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -240,6 +240,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt",
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -234,6 +234,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt",
|
||||
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
"url": "https://github.com/DaveGamble/cJSON/compare/c69134d...93688cb",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/DaveGamble/cJSON/compare/c69134d...93688cb"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,9 @@
|
||||
"url": "https://github.com/DaveGamble/cJSON/issues/338",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/DaveGamble/cJSON/issues/338"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,9 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2019:2008",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -241,6 +241,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html",
|
||||
"url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -276,6 +276,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://blog.doyensec.com/2019/07/22/jackson-gadgets.html",
|
||||
"url": "https://blog.doyensec.com/2019/07/22/jackson-gadgets.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -158,6 +158,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2",
|
||||
"url": "http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -321,6 +321,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190625-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190625-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[kafka-users] 20200413 CVEs for the dependency software guava and rocksdbjni of Kafka",
|
||||
"url": "https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[tomee-commits] 20200720 [jira] [Assigned] (TOMEE-2886) Update quartz-scheduler to mitigate CVE-2019-13990",
|
||||
"url": "https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -326,6 +326,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -221,6 +221,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -89,6 +89,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -336,6 +336,9 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4335-1",
|
||||
"url": "https://usn.ubuntu.com/4335-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -206,6 +206,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -181,6 +181,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[geode-issues] 20200831 [jira] [Created] (GEODE-8471) Dependency security issues in geode-core-1.12",
|
||||
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user