mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
Bill Situ <Bill.Situ@Oracle.com>
On branch cna/Oracle/CPU2021Jul3rd Changes to be committed: modified: 2012/0xxx/CVE-2012-0881.json modified: 2014/0xxx/CVE-2014-0107.json modified: 2015/0xxx/CVE-2015-0254.json modified: 2016/0xxx/CVE-2016-0762.json modified: 2016/4xxx/CVE-2016-4429.json modified: 2016/7xxx/CVE-2016-7103.json modified: 2017/14xxx/CVE-2017-14735.json modified: 2017/16xxx/CVE-2017-16931.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/5xxx/CVE-2017-5461.json modified: 2017/5xxx/CVE-2017-5637.json modified: 2017/7xxx/CVE-2017-7656.json modified: 2017/7xxx/CVE-2017-7657.json modified: 2017/7xxx/CVE-2017-7658.json modified: 2017/9xxx/CVE-2017-9735.json modified: 2018/0xxx/CVE-2018-0737.json modified: 2018/0xxx/CVE-2018-0739.json modified: 2018/15xxx/CVE-2018-15686.json modified: 2018/15xxx/CVE-2018-15756.json modified: 2018/21xxx/CVE-2018-21010.json modified: 2018/7xxx/CVE-2018-7160.json modified: 2018/7xxx/CVE-2018-7183.json modified: 2019/0xxx/CVE-2019-0190.json modified: 2019/0xxx/CVE-2019-0201.json modified: 2019/0xxx/CVE-2019-0205.json modified: 2019/0xxx/CVE-2019-0210.json modified: 2019/0xxx/CVE-2019-0219.json modified: 2019/0xxx/CVE-2019-0228.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10173.json modified: 2019/10xxx/CVE-2019-10746.json modified: 2019/11xxx/CVE-2019-11358.json modified: 2019/12xxx/CVE-2019-12260.json modified: 2019/12xxx/CVE-2019-12399.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/12xxx/CVE-2019-12415.json modified: 2019/12xxx/CVE-2019-12973.json modified: 2019/13xxx/CVE-2019-13990.json modified: 2019/15xxx/CVE-2019-15604.json modified: 2019/15xxx/CVE-2019-15605.json modified: 2019/15xxx/CVE-2019-15606.json modified: 2019/16xxx/CVE-2019-16942.json modified: 2019/16xxx/CVE-2019-16943.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17531.json modified: 2019/17xxx/CVE-2019-17543.json modified: 2019/17xxx/CVE-2019-17545.json modified: 2019/17xxx/CVE-2019-17566.json modified: 2019/20xxx/CVE-2019-20330.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/3xxx/CVE-2019-3773.json modified: 2019/5xxx/CVE-2019-5063.json modified: 2019/5xxx/CVE-2019-5064.json modified: 2020/10xxx/CVE-2020-10531.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10683.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11612.json modified: 2020/11xxx/CVE-2020-11868.json modified: 2020/11xxx/CVE-2020-11973.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/11xxx/CVE-2020-11987.json modified: 2020/11xxx/CVE-2020-11988.json modified: 2020/11xxx/CVE-2020-11998.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13934.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13949.json modified: 2020/13xxx/CVE-2020-13956.json modified: 2020/14xxx/CVE-2020-14060.json modified: 2020/14xxx/CVE-2020-14061.json modified: 2020/14xxx/CVE-2020-14062.json modified: 2020/14xxx/CVE-2020-14195.json modified: 2020/15xxx/CVE-2020-15389.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17527.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1941.json modified: 2020/1xxx/CVE-2020-1945.json modified: 2020/1xxx/CVE-2020-1967.json modified: 2020/1xxx/CVE-2020-1968.json modified: 2020/1xxx/CVE-2020-1971.json modified: 2020/24xxx/CVE-2020-24553.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/25xxx/CVE-2020-25638.json modified: 2020/25xxx/CVE-2020-25648.json modified: 2020/25xxx/CVE-2020-25649.json modified: 2020/26xxx/CVE-2020-26217.json modified: 2020/26xxx/CVE-2020-26870.json modified: 2020/27xxx/CVE-2020-27193.json modified: 2020/27xxx/CVE-2020-27216.json modified: 2020/27xxx/CVE-2020-27218.json modified: 2020/27xxx/CVE-2020-27783.json modified: 2020/27xxx/CVE-2020-27814.json modified: 2020/27xxx/CVE-2020-27841.json modified: 2020/27xxx/CVE-2020-27842.json modified: 2020/27xxx/CVE-2020-27843.json modified: 2020/27xxx/CVE-2020-27844.json modified: 2020/27xxx/CVE-2020-27845.json modified: 2020/28xxx/CVE-2020-28052.json modified: 2020/28xxx/CVE-2020-28196.json modified: 2020/28xxx/CVE-2020-28500.json modified: 2020/28xxx/CVE-2020-28928.json modified: 2020/29xxx/CVE-2020-29582.json modified: 2020/35xxx/CVE-2020-35490.json modified: 2020/35xxx/CVE-2020-35491.json modified: 2020/35xxx/CVE-2020-35728.json modified: 2020/36xxx/CVE-2020-36179.json modified: 2020/36xxx/CVE-2020-36180.json modified: 2020/36xxx/CVE-2020-36181.json modified: 2020/36xxx/CVE-2020-36182.json modified: 2020/36xxx/CVE-2020-36183.json modified: 2020/36xxx/CVE-2020-36184.json modified: 2020/36xxx/CVE-2020-36185.json modified: 2020/36xxx/CVE-2020-36186.json modified: 2020/36xxx/CVE-2020-36187.json modified: 2020/36xxx/CVE-2020-36188.json modified: 2020/36xxx/CVE-2020-36189.json modified: 2020/5xxx/CVE-2020-5258.json modified: 2020/5xxx/CVE-2020-5397.json modified: 2020/5xxx/CVE-2020-5398.json modified: 2020/5xxx/CVE-2020-5413.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/7xxx/CVE-2020-7016.json modified: 2020/7xxx/CVE-2020-7017.json modified: 2020/7xxx/CVE-2020-7712.json modified: 2020/7xxx/CVE-2020-7733.json modified: 2020/7xxx/CVE-2020-7760.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8203.json modified: 2020/8xxx/CVE-2020-8277.json modified: 2020/8xxx/CVE-2020-8284.json modified: 2020/8xxx/CVE-2020-8285.json modified: 2020/8xxx/CVE-2020-8286.json modified: 2020/8xxx/CVE-2020-8554.json modified: 2020/8xxx/CVE-2020-8908.json modified: 2020/9xxx/CVE-2020-9484.json modified: 2020/9xxx/CVE-2020-9489.json modified: 2021/20xxx/CVE-2021-20190.json modified: 2021/20xxx/CVE-2021-20227.json modified: 2021/21xxx/CVE-2021-21275.json modified: 2021/21xxx/CVE-2021-21290.json modified: 2021/21xxx/CVE-2021-21341.json modified: 2021/21xxx/CVE-2021-21342.json modified: 2021/21xxx/CVE-2021-21343.json modified: 2021/21xxx/CVE-2021-21344.json modified: 2021/21xxx/CVE-2021-21345.json modified: 2021/21xxx/CVE-2021-21346.json modified: 2021/21xxx/CVE-2021-21347.json modified: 2021/21xxx/CVE-2021-21348.json modified: 2021/21xxx/CVE-2021-21349.json modified: 2021/21xxx/CVE-2021-21350.json modified: 2021/21xxx/CVE-2021-21351.json modified: 2021/21xxx/CVE-2021-21409.json modified: 2021/22xxx/CVE-2021-22112.json modified: 2021/22xxx/CVE-2021-22118.json modified: 2021/22xxx/CVE-2021-22876.json modified: 2021/22xxx/CVE-2021-22883.json modified: 2021/22xxx/CVE-2021-22884.json modified: 2021/22xxx/CVE-2021-22890.json modified: 2021/22xxx/CVE-2021-22897.json modified: 2021/22xxx/CVE-2021-22898.json modified: 2021/22xxx/CVE-2021-22901.json modified: 2021/23xxx/CVE-2021-23336.json modified: 2021/23xxx/CVE-2021-23337.json modified: 2021/23xxx/CVE-2021-23839.json modified: 2021/23xxx/CVE-2021-23840.json modified: 2021/23xxx/CVE-2021-23841.json modified: 2021/24xxx/CVE-2021-24122.json modified: 2021/25xxx/CVE-2021-25122.json modified: 2021/25xxx/CVE-2021-25329.json modified: 2021/26xxx/CVE-2021-26117.json modified: 2021/26xxx/CVE-2021-26271.json modified: 2021/26xxx/CVE-2021-26272.json modified: 2021/27xxx/CVE-2021-27568.json modified: 2021/27xxx/CVE-2021-27807.json modified: 2021/27xxx/CVE-2021-27906.json modified: 2021/28xxx/CVE-2021-28041.json modified: 2021/28xxx/CVE-2021-28165.json modified: 2021/29xxx/CVE-2021-29921.json modified: 2021/30xxx/CVE-2021-30640.json modified: 2021/31xxx/CVE-2021-31811.json modified: 2021/33xxx/CVE-2021-33037.json modified: 2021/3xxx/CVE-2021-3156.json modified: 2021/3xxx/CVE-2021-3177.json modified: 2021/3xxx/CVE-2021-3345.json modified: 2021/3xxx/CVE-2021-3449.json modified: 2021/3xxx/CVE-2021-3450.json modified: 2021/3xxx/CVE-2021-3520.json
This commit is contained in:
parent
1ea2bbf390
commit
dabd1be726
@ -96,6 +96,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
|
||||
"url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -226,6 +226,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
|
||||
"url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-792) Upgrade to taglibs-standard-impl-1.2.3 due to CVE-2015-0254",
|
||||
"url": "https://lists.apache.org/thread.html/r6c93d8ade3788dbc00f5a37238bc278e7d859f2446b885460783a16f@%3Cpluto-dev.portals.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -174,6 +174,9 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4557-1",
|
||||
"url": "https://usn.ubuntu.com/4557-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20200628 [SECURITY] [DLA 2256-1] libtirpc security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -161,6 +161,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20190416-0007/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190416-0007/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,9 @@
|
||||
"name": "https://github.com/nahsra/antisamy/issues/10",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/nahsra/antisamy/issues/10"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"name": "https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -180,6 +180,9 @@
|
||||
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -178,6 +178,9 @@
|
||||
"name": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/#CVE-2017-5461"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -110,6 +110,9 @@
|
||||
"name": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://issues.apache.org/jira/browse/ZOOKEEPER-2693"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -123,6 +123,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -143,6 +143,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
|
||||
"url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -148,6 +148,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[druid-commits] 20210304 [GitHub] [druid] suneet-s closed issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty",
|
||||
"url": "https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210514 [SECURITY] [DLA 2661-1] jetty9 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -234,6 +234,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuapr2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -234,6 +234,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-53",
|
||||
"url": "https://security.gentoo.org/glsa/202007-53"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
|
||||
"url": "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -176,6 +176,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20210423 [SECURITY] [DLA 2635-1] libspring-java security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202101-29",
|
||||
"url": "https://security.gentoo.org/glsa/202101-29"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,6 +62,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.f5.com/csp/article/K63025104?utm_source=f5support&utm_medium=RSS",
|
||||
"url": "https://support.f5.com/csp/article/K63025104?utm_source=f5support&utm_medium=RSS"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us",
|
||||
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -147,6 +147,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
|
||||
"url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -136,6 +136,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -218,6 +218,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-32",
|
||||
"url": "https://security.gentoo.org/glsa/202107-32"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-32",
|
||||
"url": "https://security.gentoo.org/glsa/202107-32"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -248,6 +248,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,9 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2020-4a8f110332",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -391,6 +391,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -166,6 +166,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -173,6 +173,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -98,6 +98,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202101-29",
|
||||
"url": "https://security.gentoo.org/glsa/202101-29"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -116,6 +116,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -143,6 +143,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,6 +118,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4669",
|
||||
"url": "https://www.debian.org/security/2020/dsa-4669"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -191,6 +191,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -181,6 +181,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -111,6 +111,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -141,6 +141,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -136,6 +136,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2019-f511b38b1f",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB7RRPCQP253XA5MYUOLHLRPKNGKVZNT/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -68,6 +68,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -211,6 +211,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2020.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -85,6 +85,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -80,6 +80,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -80,6 +80,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -53,6 +53,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852",
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -58,6 +58,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/opencv/opencv/issues/15857",
|
||||
"url": "https://github.com/opencv/opencv/issues/15857"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -131,6 +131,9 @@
|
||||
"url": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca",
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -248,6 +248,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html",
|
||||
"url": "http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -358,6 +358,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html",
|
||||
"url": "http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,6 +118,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -266,6 +266,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202007-12",
|
||||
"url": "https://security.gentoo.org/glsa/202007-12"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -134,6 +134,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[creadur-dev] 20210621 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8",
|
||||
"url": "https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "FEDORA",
|
||||
"name": "FEDORA-2021-c07a9e79cf",
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -111,6 +111,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -98,6 +98,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -108,6 +108,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -498,6 +498,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-32",
|
||||
"url": "https://security.gentoo.org/glsa/202107-32"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -258,6 +258,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[jackrabbit-dev] 20210706 [GitHub] [jackrabbit-oak] reschke removed a comment on pull request #310: OAK-9482: upgrade httpclient to 4.5.13",
|
||||
"url": "https://lists.apache.org/thread.html/rc0863892ccfd9fd0d0ae10091f24ee769fb39b8957fe4ebabfc11f17@%3Cdev.jackrabbit.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4882",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4882"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -178,6 +178,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20201210-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20201210-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -78,6 +78,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -288,6 +288,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[creadur-dev] 20210621 [jira] [Commented] (RAT-274) Update to at least Ant 1.10.8/1.9.15 in order to fix CVE-2020-11979 / raise compiler level to JDK8",
|
||||
"url": "https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a@%3Cdev.creadur.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -216,6 +216,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://www.tenable.com/security/tns-2021-10",
|
||||
"url": "https://www.tenable.com/security/tns-2021-10"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -169,6 +169,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210513-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210513-0002/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20200924-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20200924-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4908",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4908"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -343,6 +343,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[spark-user] 20210621 Re: CVEs",
|
||||
"url": "https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -118,6 +118,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210409-0004/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210409-0004/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -76,7 +76,10 @@
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870",
|
||||
"refsource":"MS",
|
||||
"name": "Visual Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
@ -71,6 +71,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/",
|
||||
"url": "https://ckeditor.com/blog/CKEditor-4.15.1-with-a-security-patch-released/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -745,6 +745,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -622,6 +622,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E",
|
||||
"url": "https://lists.apache.org/thread.html/rfa34d2a3e423421a4a1354cf457edba2ce78cee2d3ebd8aab151a559@%3Cdev.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -78,6 +78,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210521-0003/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210521-0003/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -68,6 +68,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4882",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4882"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user