Bill Situ <Bill.Situ@Oracle.com>

On branch cna/Oracle/CPU2021Jul3rd
 Changes to be committed:
	modified:   2012/0xxx/CVE-2012-0881.json
	modified:   2014/0xxx/CVE-2014-0107.json
	modified:   2015/0xxx/CVE-2015-0254.json
	modified:   2016/0xxx/CVE-2016-0762.json
	modified:   2016/4xxx/CVE-2016-4429.json
	modified:   2016/7xxx/CVE-2016-7103.json
	modified:   2017/14xxx/CVE-2017-14735.json
	modified:   2017/16xxx/CVE-2017-16931.json
	modified:   2017/3xxx/CVE-2017-3735.json
	modified:   2017/5xxx/CVE-2017-5461.json
	modified:   2017/5xxx/CVE-2017-5637.json
	modified:   2017/7xxx/CVE-2017-7656.json
	modified:   2017/7xxx/CVE-2017-7657.json
	modified:   2017/7xxx/CVE-2017-7658.json
	modified:   2017/9xxx/CVE-2017-9735.json
	modified:   2018/0xxx/CVE-2018-0737.json
	modified:   2018/0xxx/CVE-2018-0739.json
	modified:   2018/15xxx/CVE-2018-15686.json
	modified:   2018/15xxx/CVE-2018-15756.json
	modified:   2018/21xxx/CVE-2018-21010.json
	modified:   2018/7xxx/CVE-2018-7160.json
	modified:   2018/7xxx/CVE-2018-7183.json
	modified:   2019/0xxx/CVE-2019-0190.json
	modified:   2019/0xxx/CVE-2019-0201.json
	modified:   2019/0xxx/CVE-2019-0205.json
	modified:   2019/0xxx/CVE-2019-0210.json
	modified:   2019/0xxx/CVE-2019-0219.json
	modified:   2019/0xxx/CVE-2019-0228.json
	modified:   2019/10xxx/CVE-2019-10086.json
	modified:   2019/10xxx/CVE-2019-10173.json
	modified:   2019/10xxx/CVE-2019-10746.json
	modified:   2019/11xxx/CVE-2019-11358.json
	modified:   2019/12xxx/CVE-2019-12260.json
	modified:   2019/12xxx/CVE-2019-12399.json
	modified:   2019/12xxx/CVE-2019-12402.json
	modified:   2019/12xxx/CVE-2019-12415.json
	modified:   2019/12xxx/CVE-2019-12973.json
	modified:   2019/13xxx/CVE-2019-13990.json
	modified:   2019/15xxx/CVE-2019-15604.json
	modified:   2019/15xxx/CVE-2019-15605.json
	modified:   2019/15xxx/CVE-2019-15606.json
	modified:   2019/16xxx/CVE-2019-16942.json
	modified:   2019/16xxx/CVE-2019-16943.json
	modified:   2019/17xxx/CVE-2019-17195.json
	modified:   2019/17xxx/CVE-2019-17531.json
	modified:   2019/17xxx/CVE-2019-17543.json
	modified:   2019/17xxx/CVE-2019-17545.json
	modified:   2019/17xxx/CVE-2019-17566.json
	modified:   2019/20xxx/CVE-2019-20330.json
	modified:   2019/3xxx/CVE-2019-3738.json
	modified:   2019/3xxx/CVE-2019-3739.json
	modified:   2019/3xxx/CVE-2019-3740.json
	modified:   2019/3xxx/CVE-2019-3773.json
	modified:   2019/5xxx/CVE-2019-5063.json
	modified:   2019/5xxx/CVE-2019-5064.json
	modified:   2020/10xxx/CVE-2020-10531.json
	modified:   2020/10xxx/CVE-2020-10543.json
	modified:   2020/10xxx/CVE-2020-10683.json
	modified:   2020/10xxx/CVE-2020-10878.json
	modified:   2020/11xxx/CVE-2020-11022.json
	modified:   2020/11xxx/CVE-2020-11023.json
	modified:   2020/11xxx/CVE-2020-11080.json
	modified:   2020/11xxx/CVE-2020-11612.json
	modified:   2020/11xxx/CVE-2020-11868.json
	modified:   2020/11xxx/CVE-2020-11973.json
	modified:   2020/11xxx/CVE-2020-11979.json
	modified:   2020/11xxx/CVE-2020-11987.json
	modified:   2020/11xxx/CVE-2020-11988.json
	modified:   2020/11xxx/CVE-2020-11998.json
	modified:   2020/12xxx/CVE-2020-12723.json
	modified:   2020/13xxx/CVE-2020-13934.json
	modified:   2020/13xxx/CVE-2020-13935.json
	modified:   2020/13xxx/CVE-2020-13949.json
	modified:   2020/13xxx/CVE-2020-13956.json
	modified:   2020/14xxx/CVE-2020-14060.json
	modified:   2020/14xxx/CVE-2020-14061.json
	modified:   2020/14xxx/CVE-2020-14062.json
	modified:   2020/14xxx/CVE-2020-14195.json
	modified:   2020/15xxx/CVE-2020-15389.json
	modified:   2020/17xxx/CVE-2020-17521.json
	modified:   2020/17xxx/CVE-2020-17527.json
	modified:   2020/17xxx/CVE-2020-17530.json
	modified:   2020/1xxx/CVE-2020-1941.json
	modified:   2020/1xxx/CVE-2020-1945.json
	modified:   2020/1xxx/CVE-2020-1967.json
	modified:   2020/1xxx/CVE-2020-1968.json
	modified:   2020/1xxx/CVE-2020-1971.json
	modified:   2020/24xxx/CVE-2020-24553.json
	modified:   2020/24xxx/CVE-2020-24616.json
	modified:   2020/24xxx/CVE-2020-24750.json
	modified:   2020/25xxx/CVE-2020-25638.json
	modified:   2020/25xxx/CVE-2020-25648.json
	modified:   2020/25xxx/CVE-2020-25649.json
	modified:   2020/26xxx/CVE-2020-26217.json
	modified:   2020/26xxx/CVE-2020-26870.json
	modified:   2020/27xxx/CVE-2020-27193.json
	modified:   2020/27xxx/CVE-2020-27216.json
	modified:   2020/27xxx/CVE-2020-27218.json
	modified:   2020/27xxx/CVE-2020-27783.json
	modified:   2020/27xxx/CVE-2020-27814.json
	modified:   2020/27xxx/CVE-2020-27841.json
	modified:   2020/27xxx/CVE-2020-27842.json
	modified:   2020/27xxx/CVE-2020-27843.json
	modified:   2020/27xxx/CVE-2020-27844.json
	modified:   2020/27xxx/CVE-2020-27845.json
	modified:   2020/28xxx/CVE-2020-28052.json
	modified:   2020/28xxx/CVE-2020-28196.json
	modified:   2020/28xxx/CVE-2020-28500.json
	modified:   2020/28xxx/CVE-2020-28928.json
	modified:   2020/29xxx/CVE-2020-29582.json
	modified:   2020/35xxx/CVE-2020-35490.json
	modified:   2020/35xxx/CVE-2020-35491.json
	modified:   2020/35xxx/CVE-2020-35728.json
	modified:   2020/36xxx/CVE-2020-36179.json
	modified:   2020/36xxx/CVE-2020-36180.json
	modified:   2020/36xxx/CVE-2020-36181.json
	modified:   2020/36xxx/CVE-2020-36182.json
	modified:   2020/36xxx/CVE-2020-36183.json
	modified:   2020/36xxx/CVE-2020-36184.json
	modified:   2020/36xxx/CVE-2020-36185.json
	modified:   2020/36xxx/CVE-2020-36186.json
	modified:   2020/36xxx/CVE-2020-36187.json
	modified:   2020/36xxx/CVE-2020-36188.json
	modified:   2020/36xxx/CVE-2020-36189.json
	modified:   2020/5xxx/CVE-2020-5258.json
	modified:   2020/5xxx/CVE-2020-5397.json
	modified:   2020/5xxx/CVE-2020-5398.json
	modified:   2020/5xxx/CVE-2020-5413.json
	modified:   2020/5xxx/CVE-2020-5421.json
	modified:   2020/7xxx/CVE-2020-7016.json
	modified:   2020/7xxx/CVE-2020-7017.json
	modified:   2020/7xxx/CVE-2020-7712.json
	modified:   2020/7xxx/CVE-2020-7733.json
	modified:   2020/7xxx/CVE-2020-7760.json
	modified:   2020/8xxx/CVE-2020-8172.json
	modified:   2020/8xxx/CVE-2020-8174.json
	modified:   2020/8xxx/CVE-2020-8203.json
	modified:   2020/8xxx/CVE-2020-8277.json
	modified:   2020/8xxx/CVE-2020-8284.json
	modified:   2020/8xxx/CVE-2020-8285.json
	modified:   2020/8xxx/CVE-2020-8286.json
	modified:   2020/8xxx/CVE-2020-8554.json
	modified:   2020/8xxx/CVE-2020-8908.json
	modified:   2020/9xxx/CVE-2020-9484.json
	modified:   2020/9xxx/CVE-2020-9489.json
	modified:   2021/20xxx/CVE-2021-20190.json
	modified:   2021/20xxx/CVE-2021-20227.json
	modified:   2021/21xxx/CVE-2021-21275.json
	modified:   2021/21xxx/CVE-2021-21290.json
	modified:   2021/21xxx/CVE-2021-21341.json
	modified:   2021/21xxx/CVE-2021-21342.json
	modified:   2021/21xxx/CVE-2021-21343.json
	modified:   2021/21xxx/CVE-2021-21344.json
	modified:   2021/21xxx/CVE-2021-21345.json
	modified:   2021/21xxx/CVE-2021-21346.json
	modified:   2021/21xxx/CVE-2021-21347.json
	modified:   2021/21xxx/CVE-2021-21348.json
	modified:   2021/21xxx/CVE-2021-21349.json
	modified:   2021/21xxx/CVE-2021-21350.json
	modified:   2021/21xxx/CVE-2021-21351.json
	modified:   2021/21xxx/CVE-2021-21409.json
	modified:   2021/22xxx/CVE-2021-22112.json
	modified:   2021/22xxx/CVE-2021-22118.json
	modified:   2021/22xxx/CVE-2021-22876.json
	modified:   2021/22xxx/CVE-2021-22883.json
	modified:   2021/22xxx/CVE-2021-22884.json
	modified:   2021/22xxx/CVE-2021-22890.json
	modified:   2021/22xxx/CVE-2021-22897.json
	modified:   2021/22xxx/CVE-2021-22898.json
	modified:   2021/22xxx/CVE-2021-22901.json
	modified:   2021/23xxx/CVE-2021-23336.json
	modified:   2021/23xxx/CVE-2021-23337.json
	modified:   2021/23xxx/CVE-2021-23839.json
	modified:   2021/23xxx/CVE-2021-23840.json
	modified:   2021/23xxx/CVE-2021-23841.json
	modified:   2021/24xxx/CVE-2021-24122.json
	modified:   2021/25xxx/CVE-2021-25122.json
	modified:   2021/25xxx/CVE-2021-25329.json
	modified:   2021/26xxx/CVE-2021-26117.json
	modified:   2021/26xxx/CVE-2021-26271.json
	modified:   2021/26xxx/CVE-2021-26272.json
	modified:   2021/27xxx/CVE-2021-27568.json
	modified:   2021/27xxx/CVE-2021-27807.json
	modified:   2021/27xxx/CVE-2021-27906.json
	modified:   2021/28xxx/CVE-2021-28041.json
	modified:   2021/28xxx/CVE-2021-28165.json
	modified:   2021/29xxx/CVE-2021-29921.json
	modified:   2021/30xxx/CVE-2021-30640.json
	modified:   2021/31xxx/CVE-2021-31811.json
	modified:   2021/33xxx/CVE-2021-33037.json
	modified:   2021/3xxx/CVE-2021-3156.json
	modified:   2021/3xxx/CVE-2021-3177.json
	modified:   2021/3xxx/CVE-2021-3345.json
	modified:   2021/3xxx/CVE-2021-3449.json
	modified:   2021/3xxx/CVE-2021-3450.json
	modified:   2021/3xxx/CVE-2021-3520.json
This commit is contained in:
Bill Situ 2021-07-20 14:01:27 -07:00
parent 1ea2bbf390
commit dabd1be726
196 changed files with 595 additions and 4 deletions

View File

@ -96,6 +96,9 @@
"refsource": "MLIST",
"name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
"url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -226,6 +226,9 @@
"refsource": "MLIST",
"name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -161,6 +161,9 @@
"refsource": "MLIST",
"name": "[portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-792) Upgrade to taglibs-standard-impl-1.2.3 due to CVE-2015-0254",
"url": "https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -174,6 +174,9 @@
"refsource": "UBUNTU",
"name": "USN-4557-1",
"url": "https://usn.ubuntu.com/4557-1/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20200628 [SECURITY] [DLA 2256-1] libtirpc security update",
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -161,6 +161,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190416-0007/",
"url": "https://security.netapp.com/advisory/ntap-20190416-0007/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -91,6 +91,9 @@
"name": "https://github.com/nahsra/antisamy/issues/10",
"refsource": "CONFIRM",
"url": "https://github.com/nahsra/antisamy/issues/10"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -71,6 +71,9 @@
"name": "https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3",
"refsource": "CONFIRM",
"url": "https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -180,6 +180,9 @@
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -178,6 +178,9 @@
"name": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -110,6 +110,9 @@
"name": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -123,6 +123,9 @@
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -143,6 +143,9 @@
"refsource": "MLIST",
"name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
"url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -148,6 +148,9 @@
"refsource": "MLIST",
"name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
"url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -111,6 +111,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -234,6 +234,9 @@
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -234,6 +234,9 @@
"refsource": "GENTOO",
"name": "GLSA-202007-53",
"url": "https://security.gentoo.org/glsa/202007-53"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -126,6 +126,9 @@
"refsource": "MLIST",
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -176,6 +176,9 @@
"refsource": "MLIST",
"name": "[debian-lts-announce] 20210423 [SECURITY] [DLA 2635-1] libspring-java security update",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -66,6 +66,9 @@
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -62,6 +62,9 @@
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K63025104?utm_source=f5support&amp;utm_medium=RSS",
"url": "https://support.f5.com/csp/article/K63025104?utm_source=f5support&amp;utm_medium=RSS"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"refsource": "CONFIRM",
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -147,6 +147,9 @@
"refsource": "MLIST",
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -136,6 +136,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -218,6 +218,9 @@
"refsource": "GENTOO",
"name": "GLSA-202107-32",
"url": "https://security.gentoo.org/glsa/202107-32"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -93,6 +93,9 @@
"refsource": "GENTOO",
"name": "GLSA-202107-32",
"url": "https://security.gentoo.org/glsa/202107-32"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -58,6 +58,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -93,6 +93,9 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E",
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -248,6 +248,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -93,6 +93,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -58,6 +58,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2020-4a8f110332",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -391,6 +391,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"refsource": "CONFIRM",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -166,6 +166,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -173,6 +173,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -98,6 +98,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -91,6 +91,9 @@
"refsource": "GENTOO",
"name": "GLSA-202101-29",
"url": "https://security.gentoo.org/glsa/202101-29"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -116,6 +116,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -118,6 +118,9 @@
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -143,6 +143,9 @@
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -118,6 +118,9 @@
"refsource": "DEBIAN",
"name": "DSA-4669",
"url": "https://www.debian.org/security/2020/dsa-4669"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -191,6 +191,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -181,6 +181,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -111,6 +111,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -141,6 +141,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -136,6 +136,9 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E",
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2019-f511b38b1f",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -68,6 +68,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -211,6 +211,9 @@
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -85,6 +85,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -80,6 +80,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -80,6 +80,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -76,6 +76,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -53,6 +53,9 @@
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -58,6 +58,9 @@
"refsource": "MISC",
"name": "https://github.com/opencv/opencv/issues/15857",
"url": "https://github.com/opencv/opencv/issues/15857"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -131,6 +131,9 @@
"url": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca",
"refsource": "MISC",
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -101,6 +101,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -126,6 +126,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -106,6 +106,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -248,6 +248,9 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -358,6 +358,9 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html",
"url": "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -118,6 +118,9 @@
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -266,6 +266,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -86,6 +86,9 @@
"refsource": "GENTOO",
"name": "GLSA-202007-12",
"url": "https://security.gentoo.org/glsa/202007-12"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -68,6 +68,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -134,6 +134,9 @@
"refsource": "MLIST",
"name": "[creadur-dev] 20210621 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8",
"url": "https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -73,6 +73,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -73,6 +73,9 @@
"refsource": "FEDORA",
"name": "FEDORA-2021-c07a9e79cf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -68,6 +68,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -111,6 +111,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -98,6 +98,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -108,6 +108,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -498,6 +498,9 @@
"refsource": "GENTOO",
"name": "GLSA-202107-32",
"url": "https://security.gentoo.org/glsa/202107-32"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -258,6 +258,9 @@
"refsource": "MLIST",
"name": "[jackrabbit-dev] 20210706 [GitHub] [jackrabbit-oak] reschke removed a comment on pull request #310: OAK-9482: upgrade httpclient to 4.5.13",
"url": "https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -86,6 +86,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -86,6 +86,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -86,6 +86,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"refsource": "DEBIAN",
"name": "DSA-4882",
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -87,6 +87,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -178,6 +178,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20201210-0003/",
"url": "https://security.netapp.com/advisory/ntap-20201210-0003/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -73,6 +73,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -78,6 +78,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -288,6 +288,9 @@
"refsource": "MLIST",
"name": "[creadur-dev] 20210621 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8",
"url": "https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -216,6 +216,9 @@
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-10",
"url": "https://www.tenable.com/security/tns-2021-10"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -169,6 +169,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -96,6 +96,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200924-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200924-0003/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -81,6 +81,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -58,6 +58,9 @@
"refsource": "DEBIAN",
"name": "DSA-4908",
"url": "https://www.debian.org/security/2021/dsa-4908"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -73,6 +73,9 @@
"refsource": "MLIST",
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -343,6 +343,9 @@
"refsource": "MLIST",
"name": "[spark-user] 20210621 Re: CVEs",
"url": "https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -118,6 +118,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210409-0004/",
"url": "https://security.netapp.com/advisory/ntap-20210409-0004/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -76,7 +76,10 @@
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870",
"refsource":"MS",
"name": "Visual Studio Remote Code Execution Vulnerability"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}
}
}

View File

@ -71,6 +71,9 @@
"refsource": "CONFIRM",
"name": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/",
"url": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -745,6 +745,9 @@
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -622,6 +622,9 @@
"refsource": "MISC",
"name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E",
"url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
}

View File

@ -78,6 +78,9 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210521-0003/",
"url": "https://security.netapp.com/advisory/ntap-20210521-0003/"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

View File

@ -68,6 +68,9 @@
"refsource": "DEBIAN",
"name": "DSA-4882",
"url": "https://www.debian.org/security/2021/dsa-4882"
},
{
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
}
]
},

Some files were not shown because too many files have changed in this diff Show More