From d31a3e2c342a4e633cd7001a6b56dddf399951f6 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 21 Jan 2022 14:01:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/19xxx/CVE-2020-19860.json | 61 ++++++++++-- 2022/0xxx/CVE-2022-0318.json | 168 ++++++++++++++++----------------- 2022/0xxx/CVE-2022-0329.json | 6 +- 2022/21xxx/CVE-2022-21279.json | 5 + 2022/21xxx/CVE-2022-21280.json | 5 + 2022/21xxx/CVE-2022-21284.json | 5 + 2022/21xxx/CVE-2022-21286.json | 5 + 2022/21xxx/CVE-2022-21287.json | 5 + 2022/21xxx/CVE-2022-21288.json | 5 + 2022/21xxx/CVE-2022-21289.json | 5 + 2022/21xxx/CVE-2022-21290.json | 5 + 2022/21xxx/CVE-2022-21307.json | 5 + 2022/21xxx/CVE-2022-21308.json | 5 + 2022/21xxx/CVE-2022-21309.json | 5 + 2022/21xxx/CVE-2022-21310.json | 5 + 2022/21xxx/CVE-2022-21311.json | 5 + 2022/21xxx/CVE-2022-21312.json | 5 + 2022/21xxx/CVE-2022-21313.json | 5 + 2022/21xxx/CVE-2022-21314.json | 5 + 2022/21xxx/CVE-2022-21315.json | 5 + 2022/21xxx/CVE-2022-21316.json | 5 + 2022/21xxx/CVE-2022-21317.json | 5 + 2022/21xxx/CVE-2022-21319.json | 5 + 2022/21xxx/CVE-2022-21320.json | 5 + 2022/21xxx/CVE-2022-21321.json | 5 + 2022/21xxx/CVE-2022-21322.json | 5 + 2022/21xxx/CVE-2022-21323.json | 5 + 2022/21xxx/CVE-2022-21324.json | 5 + 2022/21xxx/CVE-2022-21326.json | 5 + 2022/21xxx/CVE-2022-21328.json | 5 + 2022/21xxx/CVE-2022-21329.json | 5 + 2022/21xxx/CVE-2022-21330.json | 5 + 2022/21xxx/CVE-2022-21331.json | 5 + 2022/21xxx/CVE-2022-21332.json | 5 + 2022/21xxx/CVE-2022-21333.json | 5 + 2022/21xxx/CVE-2022-21334.json | 5 + 2022/21xxx/CVE-2022-21335.json | 5 + 2022/21xxx/CVE-2022-21336.json | 5 + 2022/21xxx/CVE-2022-21337.json | 5 + 2022/21xxx/CVE-2022-21355.json | 5 + 2022/21xxx/CVE-2022-21356.json | 5 + 2022/21xxx/CVE-2022-21357.json | 5 + 2022/21xxx/CVE-2022-21380.json | 5 + 43 files changed, 342 insertions(+), 93 deletions(-) diff --git a/2020/19xxx/CVE-2020-19860.json b/2020/19xxx/CVE-2020-19860.json index 009d5178706..36e93ad8043 100644 --- a/2020/19xxx/CVE-2020-19860.json +++ b/2020/19xxx/CVE-2020-19860.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-19860", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-19860", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/NLnetLabs/ldns/issues/50", + "refsource": "MISC", + "name": "https://github.com/NLnetLabs/ldns/issues/50" + }, + { + "url": "https://github.com/NLnetLabs/ldns/commit/15d96206996bea969fbc918eb0a4a346f514b9f3", + "refsource": "MISC", + "name": "https://github.com/NLnetLabs/ldns/commit/15d96206996bea969fbc918eb0a4a346f514b9f3" } ] } diff --git a/2022/0xxx/CVE-2022-0318.json b/2022/0xxx/CVE-2022-0318.json index d3a30ce5f40..c89aadfc0a6 100644 --- a/2022/0xxx/CVE-2022-0318.json +++ b/2022/0xxx/CVE-2022-0318.json @@ -1,89 +1,89 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-0318", - "STATE": "PUBLIC", - "TITLE": "Heap-based Buffer Overflow in vim/vim" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "vim/vim", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "8.2" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-0318", + "STATE": "PUBLIC", + "TITLE": "Heap-based Buffer Overflow in vim/vim" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vim/vim", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.2" + } + ] + } + } + ] + }, + "vendor_name": "vim" } - } ] - }, - "vendor_name": "vim" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Heap-based Buffer Overflow in vim/vim prior to 8.2." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.6, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-122 Heap-based Buffer Overflow" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Heap-based Buffer Overflow in vim/vim prior to 8.2." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" - }, - { - "name": "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", - "refsource": "MISC", - "url": "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" - } - ] - }, - "source": { - "advisory": "0d10ba02-b138-4e68-a284-67f781a62d08", - "discovery": "EXTERNAL" - } -} + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-122 Heap-based Buffer Overflow" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08" + }, + { + "name": "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc", + "refsource": "MISC", + "url": "https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc" + } + ] + }, + "source": { + "advisory": "0d10ba02-b138-4e68-a284-67f781a62d08", + "discovery": "EXTERNAL" + } +} \ No newline at end of file diff --git a/2022/0xxx/CVE-2022-0329.json b/2022/0xxx/CVE-2022-0329.json index b2cfca52a60..dd53be2fc6c 100644 --- a/2022/0xxx/CVE-2022-0329.json +++ b/2022/0xxx/CVE-2022-0329.json @@ -16,8 +16,8 @@ "version": { "version_data": [ { - "version_affected": "<", - "version_value": "master" + "version_affected": "<=", + "version_value": "0.5.3" } ] } @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Code Injection in Conda loguru prior to master." + "value": "Code Injection in PyPi loguru prior to and including 0.5.3." } ] }, diff --git a/2022/21xxx/CVE-2022-21279.json b/2022/21xxx/CVE-2022-21279.json index 64aab48c411..38bad16fbd5 100644 --- a/2022/21xxx/CVE-2022-21279.json +++ b/2022/21xxx/CVE-2022-21279.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-083/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-083/" } ] } diff --git a/2022/21xxx/CVE-2022-21280.json b/2022/21xxx/CVE-2022-21280.json index 7e1224708ad..1ea8b21f586 100644 --- a/2022/21xxx/CVE-2022-21280.json +++ b/2022/21xxx/CVE-2022-21280.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-084/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-084/" } ] } diff --git a/2022/21xxx/CVE-2022-21284.json b/2022/21xxx/CVE-2022-21284.json index 9472c306a3c..1e704fe6b9d 100644 --- a/2022/21xxx/CVE-2022-21284.json +++ b/2022/21xxx/CVE-2022-21284.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-091/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-091/" } ] } diff --git a/2022/21xxx/CVE-2022-21286.json b/2022/21xxx/CVE-2022-21286.json index 2948881784b..2dc615ca3e6 100644 --- a/2022/21xxx/CVE-2022-21286.json +++ b/2022/21xxx/CVE-2022-21286.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-088/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-088/" } ] } diff --git a/2022/21xxx/CVE-2022-21287.json b/2022/21xxx/CVE-2022-21287.json index 5625cddf0a6..621f7193c1d 100644 --- a/2022/21xxx/CVE-2022-21287.json +++ b/2022/21xxx/CVE-2022-21287.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-087/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-087/" } ] } diff --git a/2022/21xxx/CVE-2022-21288.json b/2022/21xxx/CVE-2022-21288.json index cf87cd4a950..e57653d0806 100644 --- a/2022/21xxx/CVE-2022-21288.json +++ b/2022/21xxx/CVE-2022-21288.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-085/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-085/" } ] } diff --git a/2022/21xxx/CVE-2022-21289.json b/2022/21xxx/CVE-2022-21289.json index dcf53661ec3..ab06f0fdae0 100644 --- a/2022/21xxx/CVE-2022-21289.json +++ b/2022/21xxx/CVE-2022-21289.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-090/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-090/" } ] } diff --git a/2022/21xxx/CVE-2022-21290.json b/2022/21xxx/CVE-2022-21290.json index 28a1bd9cb6c..7f97c3365c3 100644 --- a/2022/21xxx/CVE-2022-21290.json +++ b/2022/21xxx/CVE-2022-21290.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-086/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-086/" } ] } diff --git a/2022/21xxx/CVE-2022-21307.json b/2022/21xxx/CVE-2022-21307.json index e6f6c07e86e..632beb92ade 100644 --- a/2022/21xxx/CVE-2022-21307.json +++ b/2022/21xxx/CVE-2022-21307.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-092/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-092/" } ] } diff --git a/2022/21xxx/CVE-2022-21308.json b/2022/21xxx/CVE-2022-21308.json index f726a302564..be3c59748ea 100644 --- a/2022/21xxx/CVE-2022-21308.json +++ b/2022/21xxx/CVE-2022-21308.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-093/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-093/" } ] } diff --git a/2022/21xxx/CVE-2022-21309.json b/2022/21xxx/CVE-2022-21309.json index c6df8164ebb..f5ccf56d60b 100644 --- a/2022/21xxx/CVE-2022-21309.json +++ b/2022/21xxx/CVE-2022-21309.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-094/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-094/" } ] } diff --git a/2022/21xxx/CVE-2022-21310.json b/2022/21xxx/CVE-2022-21310.json index e1ad39c90b7..24a076d9b34 100644 --- a/2022/21xxx/CVE-2022-21310.json +++ b/2022/21xxx/CVE-2022-21310.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-095/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-095/" } ] } diff --git a/2022/21xxx/CVE-2022-21311.json b/2022/21xxx/CVE-2022-21311.json index 4baf61499ea..d0ceb1feca4 100644 --- a/2022/21xxx/CVE-2022-21311.json +++ b/2022/21xxx/CVE-2022-21311.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-096/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-096/" } ] } diff --git a/2022/21xxx/CVE-2022-21312.json b/2022/21xxx/CVE-2022-21312.json index 14395b85295..20ed9123e6b 100644 --- a/2022/21xxx/CVE-2022-21312.json +++ b/2022/21xxx/CVE-2022-21312.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-097/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-097/" } ] } diff --git a/2022/21xxx/CVE-2022-21313.json b/2022/21xxx/CVE-2022-21313.json index f12979072fe..85ab2ae4ee0 100644 --- a/2022/21xxx/CVE-2022-21313.json +++ b/2022/21xxx/CVE-2022-21313.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-098/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-098/" } ] } diff --git a/2022/21xxx/CVE-2022-21314.json b/2022/21xxx/CVE-2022-21314.json index 467eb7f895c..72ec8100067 100644 --- a/2022/21xxx/CVE-2022-21314.json +++ b/2022/21xxx/CVE-2022-21314.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-099/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-099/" } ] } diff --git a/2022/21xxx/CVE-2022-21315.json b/2022/21xxx/CVE-2022-21315.json index 14fddb5f88c..a22606b2d81 100644 --- a/2022/21xxx/CVE-2022-21315.json +++ b/2022/21xxx/CVE-2022-21315.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-100/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-100/" } ] } diff --git a/2022/21xxx/CVE-2022-21316.json b/2022/21xxx/CVE-2022-21316.json index e148683942f..451f1c7508e 100644 --- a/2022/21xxx/CVE-2022-21316.json +++ b/2022/21xxx/CVE-2022-21316.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-101/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-101/" } ] } diff --git a/2022/21xxx/CVE-2022-21317.json b/2022/21xxx/CVE-2022-21317.json index 13b63e4db24..db2fbf395d3 100644 --- a/2022/21xxx/CVE-2022-21317.json +++ b/2022/21xxx/CVE-2022-21317.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-102/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-102/" } ] } diff --git a/2022/21xxx/CVE-2022-21319.json b/2022/21xxx/CVE-2022-21319.json index ef2d8d9fe6a..0aba0d5a7b8 100644 --- a/2022/21xxx/CVE-2022-21319.json +++ b/2022/21xxx/CVE-2022-21319.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-104/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-104/" } ] } diff --git a/2022/21xxx/CVE-2022-21320.json b/2022/21xxx/CVE-2022-21320.json index 64737d440ad..bd0b77788de 100644 --- a/2022/21xxx/CVE-2022-21320.json +++ b/2022/21xxx/CVE-2022-21320.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-105/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-105/" } ] } diff --git a/2022/21xxx/CVE-2022-21321.json b/2022/21xxx/CVE-2022-21321.json index 7e8a4c61ec4..6abe683d369 100644 --- a/2022/21xxx/CVE-2022-21321.json +++ b/2022/21xxx/CVE-2022-21321.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-106/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-106/" } ] } diff --git a/2022/21xxx/CVE-2022-21322.json b/2022/21xxx/CVE-2022-21322.json index b61364e5cb0..819aae9a7a9 100644 --- a/2022/21xxx/CVE-2022-21322.json +++ b/2022/21xxx/CVE-2022-21322.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-107/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-107/" } ] } diff --git a/2022/21xxx/CVE-2022-21323.json b/2022/21xxx/CVE-2022-21323.json index 5d12b012eb9..114b52d9384 100644 --- a/2022/21xxx/CVE-2022-21323.json +++ b/2022/21xxx/CVE-2022-21323.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-108/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-108/" } ] } diff --git a/2022/21xxx/CVE-2022-21324.json b/2022/21xxx/CVE-2022-21324.json index 54f9605f2bd..e8d3c49aa1d 100644 --- a/2022/21xxx/CVE-2022-21324.json +++ b/2022/21xxx/CVE-2022-21324.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-109/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-109/" } ] } diff --git a/2022/21xxx/CVE-2022-21326.json b/2022/21xxx/CVE-2022-21326.json index 2216e6cbc9a..5b5b3ec2da1 100644 --- a/2022/21xxx/CVE-2022-21326.json +++ b/2022/21xxx/CVE-2022-21326.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-111/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-111/" } ] } diff --git a/2022/21xxx/CVE-2022-21328.json b/2022/21xxx/CVE-2022-21328.json index 7b014ee8b86..53afa924de1 100644 --- a/2022/21xxx/CVE-2022-21328.json +++ b/2022/21xxx/CVE-2022-21328.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-113/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-113/" } ] } diff --git a/2022/21xxx/CVE-2022-21329.json b/2022/21xxx/CVE-2022-21329.json index 75f0fd2e5dd..3c359e1a515 100644 --- a/2022/21xxx/CVE-2022-21329.json +++ b/2022/21xxx/CVE-2022-21329.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-114/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-114/" } ] } diff --git a/2022/21xxx/CVE-2022-21330.json b/2022/21xxx/CVE-2022-21330.json index 278476b4752..125872fd952 100644 --- a/2022/21xxx/CVE-2022-21330.json +++ b/2022/21xxx/CVE-2022-21330.json @@ -77,6 +77,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-115/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-115/" } ] } diff --git a/2022/21xxx/CVE-2022-21331.json b/2022/21xxx/CVE-2022-21331.json index f4eb7e77fa4..1b7c977878f 100644 --- a/2022/21xxx/CVE-2022-21331.json +++ b/2022/21xxx/CVE-2022-21331.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-116/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-116/" } ] } diff --git a/2022/21xxx/CVE-2022-21332.json b/2022/21xxx/CVE-2022-21332.json index c71b7141e9c..cd30c33ac10 100644 --- a/2022/21xxx/CVE-2022-21332.json +++ b/2022/21xxx/CVE-2022-21332.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-117/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-117/" } ] } diff --git a/2022/21xxx/CVE-2022-21333.json b/2022/21xxx/CVE-2022-21333.json index aa26e9af667..06292cf6b8f 100644 --- a/2022/21xxx/CVE-2022-21333.json +++ b/2022/21xxx/CVE-2022-21333.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-118/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-118/" } ] } diff --git a/2022/21xxx/CVE-2022-21334.json b/2022/21xxx/CVE-2022-21334.json index fe4d139c1e7..76c53f95213 100644 --- a/2022/21xxx/CVE-2022-21334.json +++ b/2022/21xxx/CVE-2022-21334.json @@ -69,6 +69,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-119/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-119/" } ] } diff --git a/2022/21xxx/CVE-2022-21335.json b/2022/21xxx/CVE-2022-21335.json index 5c898ef2255..2672a49c9dd 100644 --- a/2022/21xxx/CVE-2022-21335.json +++ b/2022/21xxx/CVE-2022-21335.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-120/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-120/" } ] } diff --git a/2022/21xxx/CVE-2022-21336.json b/2022/21xxx/CVE-2022-21336.json index 579cffe4107..fa6e787a823 100644 --- a/2022/21xxx/CVE-2022-21336.json +++ b/2022/21xxx/CVE-2022-21336.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-121/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-121/" } ] } diff --git a/2022/21xxx/CVE-2022-21337.json b/2022/21xxx/CVE-2022-21337.json index 0d3c2ed33b5..8bdf9842f24 100644 --- a/2022/21xxx/CVE-2022-21337.json +++ b/2022/21xxx/CVE-2022-21337.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-122/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-122/" } ] } diff --git a/2022/21xxx/CVE-2022-21355.json b/2022/21xxx/CVE-2022-21355.json index 097d9976c62..0c4ec913a84 100644 --- a/2022/21xxx/CVE-2022-21355.json +++ b/2022/21xxx/CVE-2022-21355.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-124/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-124/" } ] } diff --git a/2022/21xxx/CVE-2022-21356.json b/2022/21xxx/CVE-2022-21356.json index 81ea1b80d46..129ab147528 100644 --- a/2022/21xxx/CVE-2022-21356.json +++ b/2022/21xxx/CVE-2022-21356.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-126/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-126/" } ] } diff --git a/2022/21xxx/CVE-2022-21357.json b/2022/21xxx/CVE-2022-21357.json index 90e1a4dca4d..896e0d6ad07 100644 --- a/2022/21xxx/CVE-2022-21357.json +++ b/2022/21xxx/CVE-2022-21357.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-125/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-125/" } ] } diff --git a/2022/21xxx/CVE-2022-21380.json b/2022/21xxx/CVE-2022-21380.json index a3521567283..e4444acaf87 100644 --- a/2022/21xxx/CVE-2022-21380.json +++ b/2022/21xxx/CVE-2022-21380.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220121-0008/", "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" + }, + { + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-127/", + "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-127/" } ] }