diff --git a/2020/14xxx/CVE-2020-14144.json b/2020/14xxx/CVE-2020-14144.json index ebc5acefb87..45e745dadce 100644 --- a/2020/14xxx/CVE-2020-14144.json +++ b/2020/14xxx/CVE-2020-14144.json @@ -76,6 +76,11 @@ "refsource": "MISC", "name": "https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script", "url": "https://docs.github.com/en/enterprise-server@2.19/admin/policies/creating-a-pre-receive-hook-script" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/162122/Gitea-Git-Hooks-Remote-Code-Execution.html" } ] } diff --git a/2020/15xxx/CVE-2020-15867.json b/2020/15xxx/CVE-2020-15867.json index b80c076e1e3..80f217f067c 100644 --- a/2020/15xxx/CVE-2020-15867.json +++ b/2020/15xxx/CVE-2020-15867.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/", "url": "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-3-schwachstelle-in-gitea-1125-und-gogs-0122-ermoeglicht-ausfuehrung-von-code-nach-authent/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/162123/Gogs-Git-Hooks-Remote-Code-Execution.html" } ] } diff --git a/2020/27xxx/CVE-2020-27170.json b/2020/27xxx/CVE-2020-27170.json index a1a5cf3ca38..736fa109822 100644 --- a/2020/27xxx/CVE-2020-27170.json +++ b/2020/27xxx/CVE-2020-27170.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2020/27xxx/CVE-2020-27171.json b/2020/27xxx/CVE-2020-27171.json index 86f499e9471..9b8c53787b6 100644 --- a/2020/27xxx/CVE-2020-27171.json +++ b/2020/27xxx/CVE-2020-27171.json @@ -91,6 +91,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2020/29xxx/CVE-2020-29372.json b/2020/29xxx/CVE-2020-29372.json index 2f4d4576639..1c2b27428d7 100644 --- a/2020/29xxx/CVE-2020-29372.json +++ b/2020/29xxx/CVE-2020-29372.json @@ -66,6 +66,11 @@ "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2029", "refsource": "MISC", "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2029" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2020/29xxx/CVE-2020-29374.json b/2020/29xxx/CVE-2020-29374.json index f9edf339a70..2ea0f19e2c3 100644 --- a/2020/29xxx/CVE-2020-29374.json +++ b/2020/29xxx/CVE-2020-29374.json @@ -71,6 +71,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210115-0002/", "url": "https://security.netapp.com/advisory/ntap-20210115-0002/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2020/3xxx/CVE-2020-3843.json b/2020/3xxx/CVE-2020-3843.json index 66f85af830d..4ee05de01d6 100644 --- a/2020/3xxx/CVE-2020-3843.json +++ b/2020/3xxx/CVE-2020-3843.json @@ -65,6 +65,11 @@ "url": "https://support.apple.com/HT211176", "refsource": "MISC", "name": "https://support.apple.com/HT211176" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html", + "url": "http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9906.json b/2020/9xxx/CVE-2020-9906.json index 23b68d0ac02..7293454577f 100644 --- a/2020/9xxx/CVE-2020-9906.json +++ b/2020/9xxx/CVE-2020-9906.json @@ -81,6 +81,11 @@ "url": "https://support.apple.com/kb/HT211291", "refsource": "MISC", "name": "https://support.apple.com/kb/HT211291" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html", + "url": "http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html" } ] }, diff --git a/2021/27xxx/CVE-2021-27363.json b/2021/27xxx/CVE-2021-27363.json index 7f8169a4121..abe5f3fcac5 100644 --- a/2021/27xxx/CVE-2021-27363.json +++ b/2021/27xxx/CVE-2021-27363.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2021/27xxx/CVE-2021-27364.json b/2021/27xxx/CVE-2021-27364.json index 62942a1d480..fe54e7deade 100644 --- a/2021/27xxx/CVE-2021-27364.json +++ b/2021/27xxx/CVE-2021-27364.json @@ -81,6 +81,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2021/27xxx/CVE-2021-27365.json b/2021/27xxx/CVE-2021-27365.json index 5cb2c5646ec..b85fe3d3d8e 100644 --- a/2021/27xxx/CVE-2021-27365.json +++ b/2021/27xxx/CVE-2021-27365.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] } diff --git a/2021/29xxx/CVE-2021-29641.json b/2021/29xxx/CVE-2021-29641.json index aa906f594a6..52769c4a7e0 100644 --- a/2021/29xxx/CVE-2021-29641.json +++ b/2021/29xxx/CVE-2021-29641.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/", "url": "https://sec-consult.com/vulnerability-lab/advisory/arbitrary-file-upload-and-bypassing-htaccess-rules-in-monospace-directus-headless-cms/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html", + "url": "http://packetstormsecurity.com/files/162118/Monospace-Directus-Headless-CMS-File-Upload-Rule-Bypass.html" } ] } diff --git a/2021/3xxx/CVE-2021-3444.json b/2021/3xxx/CVE-2021-3444.json index 6906523b8b0..2e3a004f9dc 100644 --- a/2021/3xxx/CVE-2021-3444.json +++ b/2021/3xxx/CVE-2021-3444.json @@ -110,6 +110,11 @@ "refsource": "MLIST", "name": "[oss-security] 20210323 [CVE-2021-3444] Linux kernel bpf verifier incorrect mod32 truncation", "url": "http://www.openwall.com/lists/oss-security/2021/03/23/2" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html", + "url": "http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html" } ] },