diff --git a/2020/28xxx/CVE-2020-28243.json b/2020/28xxx/CVE-2020-28243.json index 419cc97f7fd..f6d5dac82b6 100644 --- a/2020/28xxx/CVE-2020-28243.json +++ b/2020/28xxx/CVE-2020-28243.json @@ -86,6 +86,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2020/28xxx/CVE-2020-28972.json b/2020/28xxx/CVE-2020-28972.json index 9bdec434190..13a42d61e33 100644 --- a/2020/28xxx/CVE-2020-28972.json +++ b/2020/28xxx/CVE-2020-28972.json @@ -76,6 +76,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2020/35xxx/CVE-2020-35662.json b/2020/35xxx/CVE-2020-35662.json index f6f161cf72e..14c6a94fd56 100644 --- a/2020/35xxx/CVE-2020-35662.json +++ b/2020/35xxx/CVE-2020-35662.json @@ -76,6 +76,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25281.json b/2021/25xxx/CVE-2021-25281.json index 85ad1e89dfd..0aa17ac91ea 100644 --- a/2021/25xxx/CVE-2021-25281.json +++ b/2021/25xxx/CVE-2021-25281.json @@ -91,6 +91,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html", "url": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/25xxx/CVE-2021-25282.json b/2021/25xxx/CVE-2021-25282.json index b385886e1bc..9453e0866d8 100644 --- a/2021/25xxx/CVE-2021-25282.json +++ b/2021/25xxx/CVE-2021-25282.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html", "url": "http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/25xxx/CVE-2021-25283.json b/2021/25xxx/CVE-2021-25283.json index 2daebf0759e..d13a419f1de 100644 --- a/2021/25xxx/CVE-2021-25283.json +++ b/2021/25xxx/CVE-2021-25283.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/25xxx/CVE-2021-25284.json b/2021/25xxx/CVE-2021-25284.json index fe3b1ce316d..1fd8d70de02 100644 --- a/2021/25xxx/CVE-2021-25284.json +++ b/2021/25xxx/CVE-2021-25284.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/30xxx/CVE-2021-30814.json b/2021/30xxx/CVE-2021-30814.json index 4b3685ef408..f2d6dcefe17 100644 --- a/2021/30xxx/CVE-2021-30814.json +++ b/2021/30xxx/CVE-2021-30814.json @@ -81,6 +81,11 @@ "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212815", "name": "https://support.apple.com/en-us/HT212815" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/30xxx/CVE-2021-30823.json b/2021/30xxx/CVE-2021-30823.json index 65a5010c9e5..424c9a97ecc 100644 --- a/2021/30xxx/CVE-2021-30823.json +++ b/2021/30xxx/CVE-2021-30823.json @@ -113,6 +113,11 @@ "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212869", "name": "https://support.apple.com/en-us/HT212869" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/30xxx/CVE-2021-30835.json b/2021/30xxx/CVE-2021-30835.json index 46487628870..f79adfa1cac 100644 --- a/2021/30xxx/CVE-2021-30835.json +++ b/2021/30xxx/CVE-2021-30835.json @@ -128,6 +128,11 @@ "refsource": "FULLDISC", "name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15", "url": "http://seclists.org/fulldisclosure/2021/Oct/61" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/30xxx/CVE-2021-30847.json b/2021/30xxx/CVE-2021-30847.json index c477d9db889..2f2c3d501a7 100644 --- a/2021/30xxx/CVE-2021-30847.json +++ b/2021/30xxx/CVE-2021-30847.json @@ -149,6 +149,11 @@ "refsource": "FULLDISC", "name": "20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15", "url": "http://seclists.org/fulldisclosure/2021/Oct/61" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/30xxx/CVE-2021-30849.json b/2021/30xxx/CVE-2021-30849.json index 1d16ee5e0e4..8e03757d975 100644 --- a/2021/30xxx/CVE-2021-30849.json +++ b/2021/30xxx/CVE-2021-30849.json @@ -169,6 +169,11 @@ "refsource": "MLIST", "name": "[oss-security] 20211027 Re: WebKitGTK and WPE WebKit Security Advisory WSA-2021-0006", "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/30xxx/CVE-2021-30852.json b/2021/30xxx/CVE-2021-30852.json index de40f02d0ef..0cdbc0186f4 100644 --- a/2021/30xxx/CVE-2021-30852.json +++ b/2021/30xxx/CVE-2021-30852.json @@ -97,6 +97,11 @@ "refsource": "MISC", "url": "https://support.apple.com/en-us/HT212815", "name": "https://support.apple.com/en-us/HT212815" + }, + { + "refsource": "CONFIRM", + "name": "https://support.apple.com/kb/HT212953", + "url": "https://support.apple.com/kb/HT212953" } ] }, diff --git a/2021/31xxx/CVE-2021-31607.json b/2021/31xxx/CVE-2021-31607.json index f1314a8f851..a84e8c8611d 100644 --- a/2021/31xxx/CVE-2021-31607.json +++ b/2021/31xxx/CVE-2021-31607.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-158e9c6eb9", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/38xxx/CVE-2021-38648.json b/2021/38xxx/CVE-2021-38648.json index 16b4414d906..8e3ea154ae0 100644 --- a/2021/38xxx/CVE-2021-38648.json +++ b/2021/38xxx/CVE-2021-38648.json @@ -56,6 +56,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html", + "url": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" } ] } diff --git a/2021/3xxx/CVE-2021-3144.json b/2021/3xxx/CVE-2021-3144.json index ba1e0ca0849..a926bcfd16c 100644 --- a/2021/3xxx/CVE-2021-3144.json +++ b/2021/3xxx/CVE-2021-3144.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/3xxx/CVE-2021-3148.json b/2021/3xxx/CVE-2021-3148.json index 8538bdf2023..9f2b1aaa9e3 100644 --- a/2021/3xxx/CVE-2021-3148.json +++ b/2021/3xxx/CVE-2021-3148.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/3xxx/CVE-2021-3197.json b/2021/3xxx/CVE-2021-3197.json index 2530728f2a5..3ad10edbc2e 100644 --- a/2021/3xxx/CVE-2021-3197.json +++ b/2021/3xxx/CVE-2021-3197.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202103-01", "url": "https://security.gentoo.org/glsa/202103-01" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update", + "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html" } ] } diff --git a/2021/40xxx/CVE-2021-40449.json b/2021/40xxx/CVE-2021-40449.json index c5ea15223bd..6bb2dadf255 100644 --- a/2021/40xxx/CVE-2021-40449.json +++ b/2021/40xxx/CVE-2021-40449.json @@ -318,6 +318,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html" } ] }