diff --git a/2017/7xxx/CVE-2017-7657.json b/2017/7xxx/CVE-2017-7657.json index f45ec5f53eb..ef8a9ea5e7f 100644 --- a/2017/7xxx/CVE-2017-7657.json +++ b/2017/7xxx/CVE-2017-7657.json @@ -128,6 +128,11 @@ "name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668", "refsource": "CONFIRM", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E" } ] } diff --git a/2017/7xxx/CVE-2017-7658.json b/2017/7xxx/CVE-2017-7658.json index ff8e7d1818f..cdfca703ffa 100644 --- a/2017/7xxx/CVE-2017-7658.json +++ b/2017/7xxx/CVE-2017-7658.json @@ -133,6 +133,11 @@ "name": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669", "refsource": "CONFIRM", "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669" + }, + { + "refsource": "MLIST", + "name": "[druid-commits] 20210226 [GitHub] [druid] kingnj opened a new issue #10926: Hello, are there any plans to fix the CVE-2017-7657 and CVE-2017-7658 vulnerabilities of Jetty", + "url": "https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E" } ] } diff --git a/2020/15xxx/CVE-2020-15810.json b/2020/15xxx/CVE-2020-15810.json index 22f4db5560a..fdd1f2641c5 100644 --- a/2020/15xxx/CVE-2020-15810.json +++ b/2020/15xxx/CVE-2020-15810.json @@ -106,6 +106,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0007/", "url": "https://security.netapp.com/advisory/ntap-20210219-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0006/" } ] } diff --git a/2020/15xxx/CVE-2020-15811.json b/2020/15xxx/CVE-2020-15811.json index 4ecf8f4be88..fcfa86dca4b 100644 --- a/2020/15xxx/CVE-2020-15811.json +++ b/2020/15xxx/CVE-2020-15811.json @@ -106,6 +106,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0007/", "url": "https://security.netapp.com/advisory/ntap-20210219-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0006/" } ] } diff --git a/2020/24xxx/CVE-2020-24606.json b/2020/24xxx/CVE-2020-24606.json index a03feaaf447..283962ef719 100644 --- a/2020/24xxx/CVE-2020-24606.json +++ b/2020/24xxx/CVE-2020-24606.json @@ -111,6 +111,16 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210219-0007/", "url": "https://security.netapp.com/advisory/ntap-20210219-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0007/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0007/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0006/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0006/" } ] }, diff --git a/2020/36xxx/CVE-2020-36221.json b/2020/36xxx/CVE-2020-36221.json index 84e647a8f88..260176efd89 100644 --- a/2020/36xxx/CVE-2020-36221.json +++ b/2020/36xxx/CVE-2020-36221.json @@ -86,6 +86,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36222.json b/2020/36xxx/CVE-2020-36222.json index dac38a7bd5a..08e944aa93e 100644 --- a/2020/36xxx/CVE-2020-36222.json +++ b/2020/36xxx/CVE-2020-36222.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36223.json b/2020/36xxx/CVE-2020-36223.json index 40f13095004..95dd6393a1e 100644 --- a/2020/36xxx/CVE-2020-36223.json +++ b/2020/36xxx/CVE-2020-36223.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36224.json b/2020/36xxx/CVE-2020-36224.json index 925adb21699..e115893d602 100644 --- a/2020/36xxx/CVE-2020-36224.json +++ b/2020/36xxx/CVE-2020-36224.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36225.json b/2020/36xxx/CVE-2020-36225.json index 6c92194365c..67418171178 100644 --- a/2020/36xxx/CVE-2020-36225.json +++ b/2020/36xxx/CVE-2020-36225.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36226.json b/2020/36xxx/CVE-2020-36226.json index ee1f35bee5a..88b411b9f14 100644 --- a/2020/36xxx/CVE-2020-36226.json +++ b/2020/36xxx/CVE-2020-36226.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36227.json b/2020/36xxx/CVE-2020-36227.json index bd61cb2be4c..0548e0a6616 100644 --- a/2020/36xxx/CVE-2020-36227.json +++ b/2020/36xxx/CVE-2020-36227.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36228.json b/2020/36xxx/CVE-2020-36228.json index d1724992f33..0e60de0048f 100644 --- a/2020/36xxx/CVE-2020-36228.json +++ b/2020/36xxx/CVE-2020-36228.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36229.json b/2020/36xxx/CVE-2020-36229.json index 70a4dda6d59..a4fe67a645a 100644 --- a/2020/36xxx/CVE-2020-36229.json +++ b/2020/36xxx/CVE-2020-36229.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2020/36xxx/CVE-2020-36230.json b/2020/36xxx/CVE-2020-36230.json index f1f46b013ad..c36f7defa7f 100644 --- a/2020/36xxx/CVE-2020-36230.json +++ b/2020/36xxx/CVE-2020-36230.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4845", "url": "https://www.debian.org/security/2021/dsa-4845" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0002/" } ] } diff --git a/2021/21xxx/CVE-2021-21284.json b/2021/21xxx/CVE-2021-21284.json index 97b67fc8cbd..d4e4f021eb7 100644 --- a/2021/21xxx/CVE-2021-21284.json +++ b/2021/21xxx/CVE-2021-21284.json @@ -96,6 +96,11 @@ "name": "https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c", "refsource": "MISC", "url": "https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0005/" } ] }, diff --git a/2021/21xxx/CVE-2021-21285.json b/2021/21xxx/CVE-2021-21285.json index ee50fcea00a..52f21232124 100644 --- a/2021/21xxx/CVE-2021-21285.json +++ b/2021/21xxx/CVE-2021-21285.json @@ -96,6 +96,11 @@ "name": "https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30", "refsource": "MISC", "url": "https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0005/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0005/" } ] }, diff --git a/2021/27xxx/CVE-2021-27737.json b/2021/27xxx/CVE-2021-27737.json new file mode 100644 index 00000000000..331ca5a0061 --- /dev/null +++ b/2021/27xxx/CVE-2021-27737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27738.json b/2021/27xxx/CVE-2021-27738.json new file mode 100644 index 00000000000..362b64810b6 --- /dev/null +++ b/2021/27xxx/CVE-2021-27738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3177.json b/2021/3xxx/CVE-2021-3177.json index 3ffd80df330..42f22bd6a4a 100644 --- a/2021/3xxx/CVE-2021-3177.json +++ b/2021/3xxx/CVE-2021-3177.json @@ -151,6 +151,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-907f3bacae", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0003/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0003/" } ] } diff --git a/2021/3xxx/CVE-2021-3281.json b/2021/3xxx/CVE-2021-3281.json index 90434a0c488..c50741093fb 100644 --- a/2021/3xxx/CVE-2021-3281.json +++ b/2021/3xxx/CVE-2021-3281.json @@ -71,6 +71,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-5329c680f7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210226-0004/", + "url": "https://security.netapp.com/advisory/ntap-20210226-0004/" } ] }