diff --git a/2020/10xxx/CVE-2020-10004.json b/2020/10xxx/CVE-2020-10004.json index 0aa2217cb24..5909b59e93d 100644 --- a/2020/10xxx/CVE-2020-10004.json +++ b/2020/10xxx/CVE-2020-10004.json @@ -56,6 +56,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT211930", + "url": "https://support.apple.com/kb/HT211930" + }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211931", diff --git a/2020/10xxx/CVE-2020-10013.json b/2020/10xxx/CVE-2020-10013.json index d9ee322ea40..7faf7b17642 100644 --- a/2020/10xxx/CVE-2020-10013.json +++ b/2020/10xxx/CVE-2020-10013.json @@ -56,6 +56,11 @@ }, "references": { "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT211849", + "url": "https://support.apple.com/kb/HT211849" + }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211843", diff --git a/2020/13xxx/CVE-2020-13933.json b/2020/13xxx/CVE-2020-13933.json index 5922c87bebd..e7b0e9d022b 100644 --- a/2020/13xxx/CVE-2020-13933.json +++ b/2020/13xxx/CVE-2020-13933.json @@ -98,6 +98,11 @@ "refsource": "MLIST", "name": "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix", "url": "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix", + "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17510.json b/2020/17xxx/CVE-2020-17510.json index 1415a8ab4b4..a10ff922fcf 100644 --- a/2020/17xxx/CVE-2020-17510.json +++ b/2020/17xxx/CVE-2020-17510.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[shiro-dev] 20210130 Re: Request for assistance to backport CVE-2020-13933 fix", "url": "https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[shiro-dev] 20210316 Re: Request for assistance to backport CVE-2020-13933 fix", + "url": "https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E" } ] }, diff --git a/2020/26xxx/CVE-2020-26238.json b/2020/26xxx/CVE-2020-26238.json index 7f8b69e20ff..815d8140739 100644 --- a/2020/26xxx/CVE-2020-26238.json +++ b/2020/26xxx/CVE-2020-26238.json @@ -93,6 +93,11 @@ "refsource": "MLIST", "name": "[hive-dev] 20210316 [jira] [Created] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", "url": "https://lists.apache.org/thread.html/r5f601d15292e3302ad0ae0e89527029546945b1cd5837af7e838d354@%3Cdev.hive.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hive-issues] 20210316 [jira] [Work started] (HIVE-24890) Upgrade to cron-utils 9.1.3 due to CVE-2020-26238", + "url": "https://lists.apache.org/thread.html/ra9e81244d323898dde3c979dd7df6996e4037d14a01b6629ea443548@%3Cissues.hive.apache.org%3E" } ] }, diff --git a/2020/9xxx/CVE-2020-9972.json b/2020/9xxx/CVE-2020-9972.json index 0f1d1a90ee2..ed711c2e21b 100644 --- a/2020/9xxx/CVE-2020-9972.json +++ b/2020/9xxx/CVE-2020-9972.json @@ -54,6 +54,16 @@ "refsource": "CONFIRM", "name": "https://support.apple.com/kb/HT212011", "url": "https://support.apple.com/kb/HT212011" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212005", + "url": "https://support.apple.com/kb/HT212005" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212003", + "url": "https://support.apple.com/kb/HT212003" } ] }, diff --git a/2021/22xxx/CVE-2021-22643.json b/2021/22xxx/CVE-2021-22643.json index 015d1b8b0da..601c9b56377 100644 --- a/2021/22xxx/CVE-2021-22643.json +++ b/2021/22xxx/CVE-2021-22643.json @@ -83,6 +83,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/" } ] }, diff --git a/2021/22xxx/CVE-2021-22645.json b/2021/22xxx/CVE-2021-22645.json index 1162025f683..ec61ec9c887 100644 --- a/2021/22xxx/CVE-2021-22645.json +++ b/2021/22xxx/CVE-2021-22645.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/" } ] }, diff --git a/2021/22xxx/CVE-2021-22647.json b/2021/22xxx/CVE-2021-22647.json index 275f0b7033c..a6849f4863b 100644 --- a/2021/22xxx/CVE-2021-22647.json +++ b/2021/22xxx/CVE-2021-22647.json @@ -83,6 +83,31 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/" } ] }, diff --git a/2021/22xxx/CVE-2021-22649.json b/2021/22xxx/CVE-2021-22649.json index 78d26130380..49e07c302bd 100644 --- a/2021/22xxx/CVE-2021-22649.json +++ b/2021/22xxx/CVE-2021-22649.json @@ -83,6 +83,16 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/" } ] }, diff --git a/2021/22xxx/CVE-2021-22651.json b/2021/22xxx/CVE-2021-22651.json index bd1b245be76..f764f5dc8a1 100644 --- a/2021/22xxx/CVE-2021-22651.json +++ b/2021/22xxx/CVE-2021-22651.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/" } ] },