diff --git a/2021/20xxx/CVE-2021-20001.json b/2021/20xxx/CVE-2021-20001.json index b31a406c44a..8e2a81dd21b 100644 --- a/2021/20xxx/CVE-2021-20001.json +++ b/2021/20xxx/CVE-2021-20001.json @@ -60,6 +60,11 @@ "refsource": "MISC", "url": "https://salsa.debian.org/debian-edu/debian-edu-config/-/commit/4d39a5888d193567704238f8c035f8d17cfe34e5", "name": "https://salsa.debian.org/debian-edu/debian-edu-config/-/commit/4d39a5888d193567704238f8c035f8d17cfe34e5" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20220211 [SECURITY] [DLA 2918-1] debian-edu-config security update", + "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00012.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22002.json b/2022/22xxx/CVE-2022-22002.json index bc1f16f510b..866bd552d31 100644 --- a/2022/22xxx/CVE-2022-22002.json +++ b/2022/22xxx/CVE-2022-22002.json @@ -284,6 +284,11 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22002", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22002" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-317/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-317/" } ] }, diff --git a/2022/23xxx/CVE-2022-23633.json b/2022/23xxx/CVE-2022-23633.json index dc2e9c4cfb8..50a00183765 100644 --- a/2022/23xxx/CVE-2022-23633.json +++ b/2022/23xxx/CVE-2022-23633.json @@ -87,6 +87,11 @@ "name": "https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da", "refsource": "MISC", "url": "https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20220211 [CVE-2022-23633] Possible exposure of information vulnerability in Action Pack", + "url": "http://www.openwall.com/lists/oss-security/2022/02/11/5" } ] },