mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
Oracle Critical Patch Updates 3rd party CVEs part 1
Committer: Bill Situ <bill.situ@oracle.com> On branch cna/Oracle/CPU2022Apr3rdPart1 Changes to be committed: modified: 2012/5xxx/CVE-2012-5351.json modified: 2013/4xxx/CVE-2013-4002.json modified: 2014/0xxx/CVE-2014-0097.json modified: 2016/10xxx/CVE-2016-10228.json modified: 2017/1000xxx/CVE-2017-1000353.json modified: 2017/14xxx/CVE-2017-14159.json modified: 2017/17xxx/CVE-2017-17740.json modified: 2017/9xxx/CVE-2017-9287.json modified: 2018/1000xxx/CVE-2018-1000067.json modified: 2018/1000xxx/CVE-2018-1000068.json modified: 2018/1000xxx/CVE-2018-1000192.json modified: 2018/1000xxx/CVE-2018-1000193.json modified: 2018/1000xxx/CVE-2018-1000194.json modified: 2018/1000xxx/CVE-2018-1000195.json modified: 2018/11xxx/CVE-2018-11212.json modified: 2018/1999xxx/CVE-2018-1999001.json modified: 2018/1999xxx/CVE-2018-1999002.json modified: 2018/1999xxx/CVE-2018-1999003.json modified: 2018/1999xxx/CVE-2018-1999004.json modified: 2018/1999xxx/CVE-2018-1999005.json modified: 2018/1999xxx/CVE-2018-1999007.json modified: 2018/1xxx/CVE-2018-1285.json modified: 2018/6xxx/CVE-2018-6356.json modified: 2018/8xxx/CVE-2018-8032.json modified: 2019/0xxx/CVE-2019-0227.json modified: 2019/1003xxx/CVE-2019-1003049.json modified: 2019/1003xxx/CVE-2019-1003050.json modified: 2019/10xxx/CVE-2019-10086.json modified: 2019/10xxx/CVE-2019-10247.json modified: 2019/10xxx/CVE-2019-10383.json modified: 2019/10xxx/CVE-2019-10384.json modified: 2019/12xxx/CVE-2019-12086.json modified: 2019/12xxx/CVE-2019-12399.json modified: 2019/12xxx/CVE-2019-12402.json modified: 2019/13xxx/CVE-2019-13038.json modified: 2019/13xxx/CVE-2019-13057.json modified: 2019/13xxx/CVE-2019-13565.json modified: 2019/14xxx/CVE-2019-14822.json modified: 2019/14xxx/CVE-2019-14862.json modified: 2019/16xxx/CVE-2019-16785.json modified: 2019/16xxx/CVE-2019-16786.json modified: 2019/16xxx/CVE-2019-16789.json modified: 2019/16xxx/CVE-2019-16792.json modified: 2019/17xxx/CVE-2019-17195.json modified: 2019/17xxx/CVE-2019-17571.json modified: 2019/18xxx/CVE-2019-18276.json modified: 2019/20xxx/CVE-2019-20388.json modified: 2019/20xxx/CVE-2019-20916.json modified: 2019/25xxx/CVE-2019-25013.json modified: 2019/3xxx/CVE-2019-3738.json modified: 2019/3xxx/CVE-2019-3739.json modified: 2019/3xxx/CVE-2019-3740.json modified: 2019/3xxx/CVE-2019-3799.json modified: 2019/9xxx/CVE-2019-9169.json modified: 2020/10xxx/CVE-2020-10531.json modified: 2020/10xxx/CVE-2020-10543.json modified: 2020/10xxx/CVE-2020-10693.json modified: 2020/10xxx/CVE-2020-10878.json modified: 2020/11xxx/CVE-2020-11022.json modified: 2020/11xxx/CVE-2020-11023.json modified: 2020/11xxx/CVE-2020-11080.json modified: 2020/11xxx/CVE-2020-11612.json modified: 2020/11xxx/CVE-2020-11971.json modified: 2020/11xxx/CVE-2020-11979.json modified: 2020/12xxx/CVE-2020-12243.json modified: 2020/12xxx/CVE-2020-12723.json modified: 2020/13xxx/CVE-2020-13434.json modified: 2020/13xxx/CVE-2020-13543.json modified: 2020/13xxx/CVE-2020-13935.json modified: 2020/13xxx/CVE-2020-13936.json modified: 2020/13xxx/CVE-2020-13954.json modified: 2020/13xxx/CVE-2020-13956.json modified: 2020/14xxx/CVE-2020-14155.json modified: 2020/14xxx/CVE-2020-14340.json modified: 2020/14xxx/CVE-2020-14343.json modified: 2020/15xxx/CVE-2020-15250.json modified: 2020/15xxx/CVE-2020-15358.json modified: 2020/15xxx/CVE-2020-15719.json modified: 2020/16xxx/CVE-2020-16135.json modified: 2020/17xxx/CVE-2020-17521.json modified: 2020/17xxx/CVE-2020-17527.json modified: 2020/17xxx/CVE-2020-17530.json modified: 2020/1xxx/CVE-2020-1968.json modified: 2020/1xxx/CVE-2020-1971.json modified: 2020/24xxx/CVE-2020-24616.json modified: 2020/24xxx/CVE-2020-24750.json modified: 2020/24xxx/CVE-2020-24977.json modified: 2020/25xxx/CVE-2020-25638.json modified: 2020/25xxx/CVE-2020-25648.json modified: 2020/25xxx/CVE-2020-25649.json modified: 2020/25xxx/CVE-2020-25659.json modified: 2020/26xxx/CVE-2020-26217.json modified: 2020/27xxx/CVE-2020-27218.json modified: 2020/27xxx/CVE-2020-27618.json modified: 2020/28xxx/CVE-2020-28052.json modified: 2020/28xxx/CVE-2020-28196.json modified: 2020/28xxx/CVE-2020-28895.json modified: 2020/29xxx/CVE-2020-29363.json modified: 2020/29xxx/CVE-2020-29582.json modified: 2020/35xxx/CVE-2020-35198.json modified: 2020/35xxx/CVE-2020-35490.json modified: 2020/35xxx/CVE-2020-35491.json modified: 2020/35xxx/CVE-2020-35728.json modified: 2020/36xxx/CVE-2020-36179.json modified: 2020/36xxx/CVE-2020-36180.json modified: 2020/36xxx/CVE-2020-36181.json modified: 2020/36xxx/CVE-2020-36182.json modified: 2020/36xxx/CVE-2020-36183.json modified: 2020/36xxx/CVE-2020-36184.json modified: 2020/36xxx/CVE-2020-36185.json modified: 2020/36xxx/CVE-2020-36186.json modified: 2020/36xxx/CVE-2020-36187.json modified: 2020/36xxx/CVE-2020-36188.json modified: 2020/36xxx/CVE-2020-36189.json modified: 2020/36xxx/CVE-2020-36242.json modified: 2020/36xxx/CVE-2020-36518.json modified: 2020/5xxx/CVE-2020-5245.json modified: 2020/5xxx/CVE-2020-5413.json modified: 2020/5xxx/CVE-2020-5421.json modified: 2020/6xxx/CVE-2020-6950.json modified: 2020/7xxx/CVE-2020-7226.json modified: 2020/7xxx/CVE-2020-7595.json modified: 2020/7xxx/CVE-2020-7760.json modified: 2020/8xxx/CVE-2020-8172.json modified: 2020/8xxx/CVE-2020-8174.json modified: 2020/8xxx/CVE-2020-8203.json modified: 2020/8xxx/CVE-2020-8231.json modified: 2020/8xxx/CVE-2020-8277.json modified: 2020/8xxx/CVE-2020-8284.json modified: 2020/8xxx/CVE-2020-8285.json modified: 2020/8xxx/CVE-2020-8286.json modified: 2020/8xxx/CVE-2020-8554.json modified: 2020/8xxx/CVE-2020-8908.json modified: 2020/9xxx/CVE-2020-9488.json modified: 2021/20xxx/CVE-2021-20289.json modified: 2021/21xxx/CVE-2021-21275.json modified: 2021/21xxx/CVE-2021-21290.json modified: 2021/21xxx/CVE-2021-21295.json modified: 2021/21xxx/CVE-2021-21409.json modified: 2021/21xxx/CVE-2021-21703.json modified: 2021/22xxx/CVE-2021-22060.json modified: 2021/22xxx/CVE-2021-22096.json modified: 2021/22xxx/CVE-2021-22118.json modified: 2021/22xxx/CVE-2021-22132.json modified: 2021/22xxx/CVE-2021-22134.json modified: 2021/22xxx/CVE-2021-22144.json modified: 2021/22xxx/CVE-2021-22145.json modified: 2021/22xxx/CVE-2021-22569.json modified: 2021/22xxx/CVE-2021-22570.json modified: 2021/22xxx/CVE-2021-22696.json
This commit is contained in:
parent
4dadf09b79
commit
fdeba26796
@ -61,6 +61,9 @@
|
||||
"name": "apache-axis2-saml-sec-bypass(79487)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79487"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -291,6 +291,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
|
||||
"url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://pivotal.io/security/cve-2014-0097",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://pivotal.io/security/cve-2014-0097"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html",
|
||||
"url": "http://packetstormsecurity.com/files/159266/Jenkins-2.56-CLI-Deserialization-Code-Execution.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -56,6 +56,9 @@
|
||||
"name": "http://www.openldap.org/its/index.cgi?findid=8703",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.openldap.org/its/index.cgi?findid=8703"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -86,6 +86,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-506",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-506"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,6 +63,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-717",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-02-14/#SECURITY-717"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-771",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-771"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-786",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-786"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-788"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-794",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-05-09/#SECURITY-794"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git",
|
||||
"url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -64,6 +64,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-891",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-891"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -59,6 +59,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-07-18/#SECURITY-390"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -118,6 +118,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[logging-dev] 20210817 Solution for vulnerability",
|
||||
"url": "https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
"name": "https://jenkins.io/security/advisory/2018-02-14/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://jenkins.io/security/advisory/2018-02-14/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -112,6 +112,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211117 [SECURITY] [DLA 2821-1] axis security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -93,6 +93,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
"url": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -66,6 +66,9 @@
|
||||
"url": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327",
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1327"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -308,6 +308,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -153,6 +153,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4949",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4949"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3144",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3144"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2019:3144",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:3144"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -251,6 +251,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuApr2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -176,6 +176,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[kafka-commits] 20210921 [kafka-site] branch asf-site updated: Add CVE-2021-38153 (#375)",
|
||||
"url": "https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -183,6 +183,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -71,6 +71,9 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4291-1",
|
||||
"url": "https://usn.ubuntu.com/4291-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -116,6 +116,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
|
||||
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,6 +58,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://usn.ubuntu.com/4134-3/",
|
||||
"url": "https://usn.ubuntu.com/4134-3/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -63,6 +63,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,6 +100,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0720",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,6 +100,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0720",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -100,6 +100,9 @@
|
||||
"refsource": "REDHAT",
|
||||
"name": "RHSA-2020:0720",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2020:0720"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -85,6 +85,9 @@
|
||||
"name": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -126,6 +126,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -598,6 +598,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[bookkeeper-issues] 20211018 [GitHub] [bookkeeper] RaulGracia commented on pull request #2816: Issue 2815: Upgrade to log4j2 to get rid of CVE-2019-17571",
|
||||
"url": "https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202105-34",
|
||||
"url": "https://security.gentoo.org/glsa/202105-34"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "SUSE",
|
||||
"name": "openSUSE-SU-2020:1613",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202107-07",
|
||||
"url": "https://security.gentoo.org/glsa/202107-07"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -95,6 +95,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -90,6 +90,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -90,6 +90,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://pivotal.io/security/cve-2019-3799",
|
||||
"name": "https://pivotal.io/security/cve-2019-3799"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -101,6 +101,9 @@
|
||||
"refsource": "UBUNTU",
|
||||
"name": "USN-4416-1",
|
||||
"url": "https://usn.ubuntu.com/4416-1/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -136,6 +136,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -116,6 +116,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -63,6 +63,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219",
|
||||
"url": "https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -121,6 +121,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -268,6 +268,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -378,6 +378,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -128,6 +128,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update",
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00011.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -271,6 +271,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,6 +113,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[activemq-users] 20210831 RE: Security issues",
|
||||
"url": "https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -149,6 +149,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -106,6 +106,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT211289",
|
||||
"url": "https://support.apple.com/kb/HT211289"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -126,6 +126,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -156,6 +156,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://support.apple.com/kb/HT211935",
|
||||
"url": "https://support.apple.com/kb/HT211935"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202012-10",
|
||||
"url": "https://security.gentoo.org/glsa/202012-10"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -123,6 +123,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -179,6 +179,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -137,6 +137,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -353,6 +353,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20220210-0002/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20220210-0002/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -91,6 +91,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar",
|
||||
"url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,6 +53,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -258,6 +258,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[knox-dev] 20211008 [GitHub] [knox] smolnar82 merged pull request #505: KNOX-2674 - Upgrade junit to 4.13.2 due to CVE-2020-15250",
|
||||
"url": "https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -156,6 +156,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -81,6 +81,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
|
||||
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -91,6 +91,9 @@
|
||||
"refsource": "GENTOO",
|
||||
"name": "GLSA-202011-05",
|
||||
"url": "https://security.gentoo.org/glsa/202011-05"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -102,6 +102,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -188,6 +188,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -93,6 +93,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[oss-security] 20220412 CVE-2021-31805: Apache Struts: Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2022/04/12/6"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -106,6 +106,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -189,6 +189,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
|
||||
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -96,6 +96,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -151,6 +151,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2",
|
||||
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -73,6 +73,9 @@
|
||||
"refsource": "MLIST",
|
||||
"name": "[turbine-commits] 20211018 [turbine-fulcrum-security] 02/02: disable module hibernate (JIRA issue TRB-103), update docs, remove suppression",
|
||||
"url": "https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -83,6 +83,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -388,6 +388,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -48,6 +48,9 @@
|
||||
"refsource": "MISC",
|
||||
"name": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b",
|
||||
"url": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -138,6 +138,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -632,6 +632,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpuoct2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"refsource": "CONFIRM",
|
||||
"name": "https://security.netapp.com/advisory/ntap-20210401-0006/",
|
||||
"url": "https://security.netapp.com/advisory/ntap-20210401-0006/"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -171,6 +171,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -116,6 +116,9 @@
|
||||
"url": "https://www.oracle.com//security-alerts/cpujul2021.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com//security-alerts/cpujul2021.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -87,6 +87,9 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-28895",
|
||||
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-28895"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -66,6 +66,9 @@
|
||||
"refsource": "DEBIAN",
|
||||
"name": "DSA-4822",
|
||||
"url": "https://www.debian.org/security/2021/dsa-4822"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -76,6 +76,9 @@
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2022.html",
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.oracle.com/security-alerts/cpujan2022.html"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -61,6 +61,9 @@
|
||||
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-35198",
|
||||
"refsource": "MISC",
|
||||
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2020-35198"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user