diff --git a/2016/6xxx/CVE-2016-6814.json b/2016/6xxx/CVE-2016-6814.json index e8131c079bbb..8348c1b10389 100644 --- a/2016/6xxx/CVE-2016-6814.json +++ b/2016/6xxx/CVE-2016-6814.json @@ -132,6 +132,9 @@ "name": "http://mail-archives.apache.org/mod_mbox/www-announce/201701.mbox/%3CCADRx3PMZ2hBCGDTY35zYXFGaDnjAs0tc5-upaVs6QN2sYUejyA%40mail.gmail.com%3E", "refsource": "MISC", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201701.mbox/%3CCADRx3PMZ2hBCGDTY35zYXFGaDnjAs0tc5-upaVs6QN2sYUejyA%40mail.gmail.com%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2018/18xxx/CVE-2018-18893.json b/2018/18xxx/CVE-2018-18893.json index 735f41e61f24..fd277b6f8208 100644 --- a/2018/18xxx/CVE-2018-18893.json +++ b/2018/18xxx/CVE-2018-18893.json @@ -61,6 +61,9 @@ "name": "https://github.com/HubSpot/jinjava/pull/230", "refsource": "MISC", "url": "https://github.com/HubSpot/jinjava/pull/230" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2018/1xxx/CVE-2018-1285.json b/2018/1xxx/CVE-2018-1285.json index 331ea83423fc..f7d7ddc62165 100644 --- a/2018/1xxx/CVE-2018-1285.json +++ b/2018/1xxx/CVE-2018-1285.json @@ -128,6 +128,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220909-0001/", "url": "https://security.netapp.com/advisory/ntap-20220909-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2018/1xxx/CVE-2018-1311.json b/2018/1xxx/CVE-2018-1311.json index b5eeaaa13b50..60c23fa9690f 100644 --- a/2018/1xxx/CVE-2018-1311.json +++ b/2018/1xxx/CVE-2018-1311.json @@ -93,6 +93,9 @@ "refsource": "CONFIRM", "name": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2", "url": "https://marc.info/?l=xerces-c-users&m=157653840106914&w=2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2018/25xxx/CVE-2018-25032.json b/2018/25xxx/CVE-2018-25032.json index d88ab4bf6f49..62bb03a3e73e 100644 --- a/2018/25xxx/CVE-2018-25032.json +++ b/2018/25xxx/CVE-2018-25032.json @@ -196,6 +196,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2018/5xxx/CVE-2018-5158.json b/2018/5xxx/CVE-2018-5158.json index 359c9acf55c2..6696d4f0ff50 100644 --- a/2018/5xxx/CVE-2018-5158.json +++ b/2018/5xxx/CVE-2018-5158.json @@ -118,6 +118,9 @@ "name": "104136", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104136" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2018/8xxx/CVE-2018-8032.json b/2018/8xxx/CVE-2018-8032.json index b0c3a6ca33f5..264ebab05a96 100644 --- a/2018/8xxx/CVE-2018-8032.json +++ b/2018/8xxx/CVE-2018-8032.json @@ -122,6 +122,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/0xxx/CVE-2019-0227.json b/2019/0xxx/CVE-2019-0227.json index 8f831fd6ddd7..f93042812749 100644 --- a/2019/0xxx/CVE-2019-0227.json +++ b/2019/0xxx/CVE-2019-0227.json @@ -103,6 +103,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10086.json b/2019/10xxx/CVE-2019-10086.json index 0bb381604923..5f74884cc2c4 100644 --- a/2019/10xxx/CVE-2019-10086.json +++ b/2019/10xxx/CVE-2019-10086.json @@ -318,6 +318,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/10xxx/CVE-2019-10092.json b/2019/10xxx/CVE-2019-10092.json index dd4825d450f2..2c7695039ab0 100644 --- a/2019/10xxx/CVE-2019-10092.json +++ b/2019/10xxx/CVE-2019-10092.json @@ -213,6 +213,9 @@ "refsource": "MLIST", "name": "[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12402.json b/2019/12xxx/CVE-2019-12402.json index b3eb72775c1d..35698a54a0ad 100644 --- a/2019/12xxx/CVE-2019-12402.json +++ b/2019/12xxx/CVE-2019-12402.json @@ -188,6 +188,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12415.json b/2019/12xxx/CVE-2019-12415.json index e60933d1935f..16db90556a24 100644 --- a/2019/12xxx/CVE-2019-12415.json +++ b/2019/12xxx/CVE-2019-12415.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/17xxx/CVE-2019-17195.json b/2019/17xxx/CVE-2019-17195.json index 8897f19aa388..039bfaea28b0 100644 --- a/2019/17xxx/CVE-2019-17195.json +++ b/2019/17xxx/CVE-2019-17195.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/17xxx/CVE-2019-17566.json b/2019/17xxx/CVE-2019-17566.json index 74b850c2694f..44bfa11e2d08 100644 --- a/2019/17xxx/CVE-2019-17566.json +++ b/2019/17xxx/CVE-2019-17566.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/19xxx/CVE-2019-19956.json b/2019/19xxx/CVE-2019-19956.json index e5b53d0f418c..a4045fa3a7c7 100644 --- a/2019/19xxx/CVE-2019-19956.json +++ b/2019/19xxx/CVE-2019-19956.json @@ -111,6 +111,9 @@ "refsource": "CONFIRM", "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/1xxx/CVE-2019-1543.json b/2019/1xxx/CVE-2019-1543.json index 83719487120e..0ffd12c960ba 100644 --- a/2019/1xxx/CVE-2019-1543.json +++ b/2019/1xxx/CVE-2019-1543.json @@ -134,6 +134,9 @@ "refsource": "CONFIRM", "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/20xxx/CVE-2019-20388.json b/2019/20xxx/CVE-2019-20388.json index c90f5dda8874..4198853d2c0b 100644 --- a/2019/20xxx/CVE-2019-20388.json +++ b/2019/20xxx/CVE-2019-20388.json @@ -111,6 +111,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/20xxx/CVE-2019-20838.json b/2019/20xxx/CVE-2019-20838.json index 718ae3e4a28b..2f54fad534e0 100644 --- a/2019/20xxx/CVE-2019-20838.json +++ b/2019/20xxx/CVE-2019-20838.json @@ -86,6 +86,9 @@ "refsource": "MLIST", "name": "[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar", "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2019/3xxx/CVE-2019-3855.json b/2019/3xxx/CVE-2019-3855.json index adb09b790627..f7f6ddf8ba1f 100644 --- a/2019/3xxx/CVE-2019-3855.json +++ b/2019/3xxx/CVE-2019-3855.json @@ -186,6 +186,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3856.json b/2019/3xxx/CVE-2019-3856.json index f7a8273c57c5..48d0f7a937f3 100644 --- a/2019/3xxx/CVE-2019-3856.json +++ b/2019/3xxx/CVE-2019-3856.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3857.json b/2019/3xxx/CVE-2019-3857.json index c7aca24474ee..faea1318dbd5 100644 --- a/2019/3xxx/CVE-2019-3857.json +++ b/2019/3xxx/CVE-2019-3857.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3858.json b/2019/3xxx/CVE-2019-3858.json index 7b96f899b3f5..53b3dfcc518a 100644 --- a/2019/3xxx/CVE-2019-3858.json +++ b/2019/3xxx/CVE-2019-3858.json @@ -128,6 +128,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3859.json b/2019/3xxx/CVE-2019-3859.json index 6c10a281a0a3..1cb57eb5674e 100644 --- a/2019/3xxx/CVE-2019-3859.json +++ b/2019/3xxx/CVE-2019-3859.json @@ -143,6 +143,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3860.json b/2019/3xxx/CVE-2019-3860.json index ba9c7d752d3d..9fc8aa7b78cd 100644 --- a/2019/3xxx/CVE-2019-3860.json +++ b/2019/3xxx/CVE-2019-3860.json @@ -103,6 +103,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3861.json b/2019/3xxx/CVE-2019-3861.json index cb915dce332b..08b0a5ec696b 100644 --- a/2019/3xxx/CVE-2019-3861.json +++ b/2019/3xxx/CVE-2019-3861.json @@ -98,6 +98,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3862.json b/2019/3xxx/CVE-2019-3862.json index a6f2bc0ecb9c..fa583165490d 100644 --- a/2019/3xxx/CVE-2019-3862.json +++ b/2019/3xxx/CVE-2019-3862.json @@ -133,6 +133,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3863.json b/2019/3xxx/CVE-2019-3863.json index 45d1d9b224f3..dfb50a913142 100644 --- a/2019/3xxx/CVE-2019-3863.json +++ b/2019/3xxx/CVE-2019-3863.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10543.json b/2020/10xxx/CVE-2020-10543.json index 1bea1884141d..251299772195 100644 --- a/2020/10xxx/CVE-2020-10543.json +++ b/2020/10xxx/CVE-2020-10543.json @@ -121,6 +121,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10672.json b/2020/10xxx/CVE-2020-10672.json index d868d3241480..1aefd1c8f25e 100644 --- a/2020/10xxx/CVE-2020-10672.json +++ b/2020/10xxx/CVE-2020-10672.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10673.json b/2020/10xxx/CVE-2020-10673.json index 4ce59d0e0224..8a3897348f25 100644 --- a/2020/10xxx/CVE-2020-10673.json +++ b/2020/10xxx/CVE-2020-10673.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index cb986bb767cc..2ec0d3e2180f 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -151,6 +151,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10878.json b/2020/10xxx/CVE-2020-10878.json index 5c9a928006ee..8b41e8e787b1 100644 --- a/2020/10xxx/CVE-2020-10878.json +++ b/2020/10xxx/CVE-2020-10878.json @@ -126,6 +126,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10968.json b/2020/10xxx/CVE-2020-10968.json index 82e58cdd7c6b..b8be8cd0dff0 100644 --- a/2020/10xxx/CVE-2020-10968.json +++ b/2020/10xxx/CVE-2020-10968.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/10xxx/CVE-2020-10969.json b/2020/10xxx/CVE-2020-10969.json index dff5697c4b49..0351abd75392 100644 --- a/2020/10xxx/CVE-2020-10969.json +++ b/2020/10xxx/CVE-2020-10969.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/11xxx/CVE-2020-11022.json b/2020/11xxx/CVE-2020-11022.json index e5e13d65e041..489736c8a11a 100644 --- a/2020/11xxx/CVE-2020-11022.json +++ b/2020/11xxx/CVE-2020-11022.json @@ -278,6 +278,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11023.json b/2020/11xxx/CVE-2020-11023.json index 4c9d20de3a45..41624c7a8057 100644 --- a/2020/11xxx/CVE-2020-11023.json +++ b/2020/11xxx/CVE-2020-11023.json @@ -388,6 +388,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/11xxx/CVE-2020-11111.json b/2020/11xxx/CVE-2020-11111.json index e15ab38e7612..a7cc3b134336 100644 --- a/2020/11xxx/CVE-2020-11111.json +++ b/2020/11xxx/CVE-2020-11111.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/11xxx/CVE-2020-11112.json b/2020/11xxx/CVE-2020-11112.json index 5da0a777a4d6..442fc3b36dba 100644 --- a/2020/11xxx/CVE-2020-11112.json +++ b/2020/11xxx/CVE-2020-11112.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/11xxx/CVE-2020-11113.json b/2020/11xxx/CVE-2020-11113.json index 9e2a3a005f55..f74a00d2d16c 100644 --- a/2020/11xxx/CVE-2020-11113.json +++ b/2020/11xxx/CVE-2020-11113.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 74126170b8f8..628dbcddaf7c 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -93,6 +93,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12723.json b/2020/12xxx/CVE-2020-12723.json index 7a73f1a7b1cc..54baf2833501 100644 --- a/2020/12xxx/CVE-2020-12723.json +++ b/2020/12xxx/CVE-2020-12723.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/13xxx/CVE-2020-13936.json b/2020/13xxx/CVE-2020-13936.json index 8453fe3ede68..bc995c7619f5 100644 --- a/2020/13xxx/CVE-2020-13936.json +++ b/2020/13xxx/CVE-2020-13936.json @@ -184,6 +184,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 886835935ce1..f823724d665b 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -358,6 +358,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220210-0002/", "url": "https://security.netapp.com/advisory/ntap-20220210-0002/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14155.json b/2020/14xxx/CVE-2020-14155.json index e63d2f078d79..452d5db1a386 100644 --- a/2020/14xxx/CVE-2020-14155.json +++ b/2020/14xxx/CVE-2020-14155.json @@ -101,6 +101,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221028-0010/", "url": "https://security.netapp.com/advisory/ntap-20221028-0010/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/14xxx/CVE-2020-14195.json b/2020/14xxx/CVE-2020-14195.json index 1f4a6e13c37c..df78884530f2 100644 --- a/2020/14xxx/CVE-2020-14195.json +++ b/2020/14xxx/CVE-2020-14195.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/16xxx/CVE-2020-16856.json b/2020/16xxx/CVE-2020-16856.json index f958a6f90b83..33cbf27245c0 100644 --- a/2020/16xxx/CVE-2020-16856.json +++ b/2020/16xxx/CVE-2020-16856.json @@ -102,6 +102,9 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16856", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16856" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/16xxx/CVE-2020-16874.json b/2020/16xxx/CVE-2020-16874.json index 4cab7269da61..2d1ce1b0e6ca 100644 --- a/2020/16xxx/CVE-2020-16874.json +++ b/2020/16xxx/CVE-2020-16874.json @@ -102,6 +102,9 @@ "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16874", "refsource": "MISC", "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16874" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/17xxx/CVE-2020-17521.json b/2020/17xxx/CVE-2020-17521.json index 39fb70a76346..c75c3b6809fa 100644 --- a/2020/17xxx/CVE-2020-17521.json +++ b/2020/17xxx/CVE-2020-17521.json @@ -112,6 +112,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/1xxx/CVE-2020-1934.json b/2020/1xxx/CVE-2020-1934.json index 2e2893092aa8..059a70cb8cb8 100644 --- a/2020/1xxx/CVE-2020-1934.json +++ b/2020/1xxx/CVE-2020-1934.json @@ -158,6 +158,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210709 [SECURITY] [DLA 2706-1] apache2 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/24xxx/CVE-2020-24977.json b/2020/24xxx/CVE-2020-24977.json index 6071397829ef..4974ba19c671 100644 --- a/2020/24xxx/CVE-2020-24977.json +++ b/2020/24xxx/CVE-2020-24977.json @@ -161,6 +161,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/25xxx/CVE-2020-25649.json b/2020/25xxx/CVE-2020-25649.json index c7b0987a84c3..7616101dc4b2 100644 --- a/2020/25xxx/CVE-2020-25649.json +++ b/2020/25xxx/CVE-2020-25649.json @@ -398,6 +398,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27218.json b/2020/27xxx/CVE-2020-27218.json index 00ad31ae133f..25e4802febf5 100644 --- a/2020/27xxx/CVE-2020-27218.json +++ b/2020/27xxx/CVE-2020-27218.json @@ -637,6 +637,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/28xxx/CVE-2020-28052.json b/2020/28xxx/CVE-2020-28052.json index aeb55976b9cb..d11542900ee6 100644 --- a/2020/28xxx/CVE-2020-28052.json +++ b/2020/28xxx/CVE-2020-28052.json @@ -181,6 +181,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/29xxx/CVE-2020-29508.json b/2020/29xxx/CVE-2020-29508.json index 2a060455f560..5248a00b03a2 100644 --- a/2020/29xxx/CVE-2020-29508.json +++ b/2020/29xxx/CVE-2020-29508.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/29xxx/CVE-2020-29582.json b/2020/29xxx/CVE-2020-29582.json index 19980aa1819f..44b434454872 100644 --- a/2020/29xxx/CVE-2020-29582.json +++ b/2020/29xxx/CVE-2020-29582.json @@ -81,6 +81,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35163.json b/2020/35xxx/CVE-2020-35163.json index b48ee72695aa..da95b5a5bdea 100644 --- a/2020/35xxx/CVE-2020-35163.json +++ b/2020/35xxx/CVE-2020-35163.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35164.json b/2020/35xxx/CVE-2020-35164.json index a627e6504810..060fa77a9c4f 100644 --- a/2020/35xxx/CVE-2020-35164.json +++ b/2020/35xxx/CVE-2020-35164.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35166.json b/2020/35xxx/CVE-2020-35166.json index bebe4cf6227c..c62a2a9df83d 100644 --- a/2020/35xxx/CVE-2020-35166.json +++ b/2020/35xxx/CVE-2020-35166.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35167.json b/2020/35xxx/CVE-2020-35167.json index d840f571b639..7e492eb1f2b5 100644 --- a/2020/35xxx/CVE-2020-35167.json +++ b/2020/35xxx/CVE-2020-35167.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35168.json b/2020/35xxx/CVE-2020-35168.json index ac3ad0db3be6..285e33cb0f23 100644 --- a/2020/35xxx/CVE-2020-35168.json +++ b/2020/35xxx/CVE-2020-35168.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/35xxx/CVE-2020-35169.json b/2020/35xxx/CVE-2020-35169.json index ce92deac4dbb..a1fdc3ed83c8 100644 --- a/2020/35xxx/CVE-2020-35169.json +++ b/2020/35xxx/CVE-2020-35169.json @@ -71,6 +71,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/36xxx/CVE-2020-36189.json b/2020/36xxx/CVE-2020-36189.json index d7bbf75fde0b..47cf517e2e9e 100644 --- a/2020/36xxx/CVE-2020-36189.json +++ b/2020/36xxx/CVE-2020-36189.json @@ -101,6 +101,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/36xxx/CVE-2020-36518.json b/2020/36xxx/CVE-2020-36518.json index b22ff3f86b9a..234948bec855 100644 --- a/2020/36xxx/CVE-2020-36518.json +++ b/2020/36xxx/CVE-2020-36518.json @@ -86,6 +86,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/5xxx/CVE-2020-5421.json b/2020/5xxx/CVE-2020-5421.json index 07fbc54cf899..8abb0a22fe76 100644 --- a/2020/5xxx/CVE-2020-5421.json +++ b/2020/5xxx/CVE-2020-5421.json @@ -193,6 +193,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/6xxx/CVE-2020-6950.json b/2020/6xxx/CVE-2020-6950.json index 67f6ebab070d..058087529c13 100644 --- a/2020/6xxx/CVE-2020-6950.json +++ b/2020/6xxx/CVE-2020-6950.json @@ -73,6 +73,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7069.json b/2020/7xxx/CVE-2020-7069.json index 4b060f3a8e44..9145e3ed63d0 100644 --- a/2020/7xxx/CVE-2020-7069.json +++ b/2020/7xxx/CVE-2020-7069.json @@ -155,6 +155,9 @@ "refsource": "CONFIRM", "name": "https://www.tenable.com/security/tns-2021-14", "url": "https://www.tenable.com/security/tns-2021-14" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7595.json b/2020/7xxx/CVE-2020-7595.json index f92fceffd8ac..66919a73c912 100644 --- a/2020/7xxx/CVE-2020-7595.json +++ b/2020/7xxx/CVE-2020-7595.json @@ -126,6 +126,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/7xxx/CVE-2020-7712.json b/2020/7xxx/CVE-2020-7712.json index 119bded59508..33962ed4c168 100644 --- a/2020/7xxx/CVE-2020-7712.json +++ b/2020/7xxx/CVE-2020-7712.json @@ -156,6 +156,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/8xxx/CVE-2020-8908.json b/2020/8xxx/CVE-2020-8908.json index 4f00ccb5456c..9272b3ef0160 100644 --- a/2020/8xxx/CVE-2020-8908.json +++ b/2020/8xxx/CVE-2020-8908.json @@ -291,6 +291,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220210-0003/", "url": "https://security.netapp.com/advisory/ntap-20220210-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9484.json b/2020/9xxx/CVE-2020-9484.json index 21c3a424bce0..f4d9d08f8f7c 100644 --- a/2020/9xxx/CVE-2020-9484.json +++ b/2020/9xxx/CVE-2020-9484.json @@ -253,6 +253,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9492.json b/2020/9xxx/CVE-2020-9492.json index 884c3d8c0132..ef49f0cff032 100644 --- a/2020/9xxx/CVE-2020-9492.json +++ b/2020/9xxx/CVE-2020-9492.json @@ -123,6 +123,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210304-0001/", "url": "https://security.netapp.com/advisory/ntap-20210304-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2020/9xxx/CVE-2020-9546.json b/2020/9xxx/CVE-2020-9546.json index 3c635a5f81fe..70880ad31421 100644 --- a/2020/9xxx/CVE-2020-9546.json +++ b/2020/9xxx/CVE-2020-9546.json @@ -136,6 +136,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/9xxx/CVE-2020-9547.json b/2020/9xxx/CVE-2020-9547.json index aafb5aabf0ac..51946661a4ce 100644 --- a/2020/9xxx/CVE-2020-9547.json +++ b/2020/9xxx/CVE-2020-9547.json @@ -166,6 +166,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2020/9xxx/CVE-2020-9548.json b/2020/9xxx/CVE-2020-9548.json index 713d990b3177..c43f8dab4614 100644 --- a/2020/9xxx/CVE-2020-9548.json +++ b/2020/9xxx/CVE-2020-9548.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 2df17932e255..91f301689524 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -271,6 +271,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220210-0011/", "url": "https://security.netapp.com/advisory/ntap-20220210-0011/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21295.json b/2021/21xxx/CVE-2021-21295.json index b8e7ac784723..c71093c06ac2 100644 --- a/2021/21xxx/CVE-2021-21295.json +++ b/2021/21xxx/CVE-2021-21295.json @@ -523,6 +523,9 @@ "refsource": "MISC", "name": "https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21345.json b/2021/21xxx/CVE-2021-21345.json index 6b9aee85859c..b220fbeb36ff 100644 --- a/2021/21xxx/CVE-2021-21345.json +++ b/2021/21xxx/CVE-2021-21345.json @@ -156,6 +156,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21409.json b/2021/21xxx/CVE-2021-21409.json index fabbd4d69862..103d44f315c5 100644 --- a/2021/21xxx/CVE-2021-21409.json +++ b/2021/21xxx/CVE-2021-21409.json @@ -363,6 +363,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21702.json b/2021/21xxx/CVE-2021-21702.json index 3b68a9eeb85f..c05dda97411b 100644 --- a/2021/21xxx/CVE-2021-21702.json +++ b/2021/21xxx/CVE-2021-21702.json @@ -125,6 +125,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210312-0005/", "url": "https://security.netapp.com/advisory/ntap-20210312-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21703.json b/2021/21xxx/CVE-2021-21703.json index 7b939cb8f6bf..a89ba69941d8 100644 --- a/2021/21xxx/CVE-2021-21703.json +++ b/2021/21xxx/CVE-2021-21703.json @@ -164,6 +164,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-20", "url": "https://security.gentoo.org/glsa/202209-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21707.json b/2021/21xxx/CVE-2021-21707.json index a64ccd7b247c..1f84855626e0 100644 --- a/2021/21xxx/CVE-2021-21707.json +++ b/2021/21xxx/CVE-2021-21707.json @@ -115,6 +115,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21708.json b/2021/21xxx/CVE-2021-21708.json index 947d2ad79c7e..d567e34f8908 100644 --- a/2021/21xxx/CVE-2021-21708.json +++ b/2021/21xxx/CVE-2021-21708.json @@ -105,6 +105,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-20", "url": "https://security.gentoo.org/glsa/202209-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21783.json b/2021/21xxx/CVE-2021-21783.json index 4217d11fb812..97527cf08ca8 100644 --- a/2021/21xxx/CVE-2021-21783.json +++ b/2021/21xxx/CVE-2021-21783.json @@ -58,6 +58,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22118.json b/2021/22xxx/CVE-2021-22118.json index f02f47cb3b18..35aeeff610c7 100644 --- a/2021/22xxx/CVE-2021-22118.json +++ b/2021/22xxx/CVE-2021-22118.json @@ -78,6 +78,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22119.json b/2021/22xxx/CVE-2021-22119.json index 60b2b211335e..514d4bb45f9c 100644 --- a/2021/22xxx/CVE-2021-22119.json +++ b/2021/22xxx/CVE-2021-22119.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22144.json b/2021/22xxx/CVE-2021-22144.json index 4fa83274c83f..d2815e3f4a60 100644 --- a/2021/22xxx/CVE-2021-22144.json +++ b/2021/22xxx/CVE-2021-22144.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210827-0006/", "url": "https://security.netapp.com/advisory/ntap-20210827-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22901.json b/2021/22xxx/CVE-2021-22901.json index 2f874a4b9879..e4abe0380614 100644 --- a/2021/22xxx/CVE-2021-22901.json +++ b/2021/22xxx/CVE-2021-22901.json @@ -93,6 +93,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22946.json b/2021/22xxx/CVE-2021-22946.json index 2f6c58adf784..e8051a39a3a5 100644 --- a/2021/22xxx/CVE-2021-22946.json +++ b/2021/22xxx/CVE-2021-22946.json @@ -123,6 +123,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/22xxx/CVE-2021-22947.json b/2021/22xxx/CVE-2021-22947.json index 97ea7a53e038..6e1661af0aed 100644 --- a/2021/22xxx/CVE-2021-22947.json +++ b/2021/22xxx/CVE-2021-22947.json @@ -118,6 +118,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23450.json b/2021/23xxx/CVE-2021-23450.json index 14fa4bfdc513..e39e104752c0 100644 --- a/2021/23xxx/CVE-2021-23450.json +++ b/2021/23xxx/CVE-2021-23450.json @@ -91,6 +91,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230129 [SECURITY] [DLA 3289-1] dojo security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23926.json b/2021/23xxx/CVE-2021-23926.json index 8b415c05bd76..d17b6cdb8f5f 100644 --- a/2021/23xxx/CVE-2021-23926.json +++ b/2021/23xxx/CVE-2021-23926.json @@ -98,6 +98,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25122.json b/2021/25xxx/CVE-2021-25122.json index 77e279b7d01e..880349bf181f 100644 --- a/2021/25xxx/CVE-2021-25122.json +++ b/2021/25xxx/CVE-2021-25122.json @@ -148,6 +148,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/25xxx/CVE-2021-25329.json b/2021/25xxx/CVE-2021-25329.json index 82830c086c07..bc0c088fe0fc 100644 --- a/2021/25xxx/CVE-2021-25329.json +++ b/2021/25xxx/CVE-2021-25329.json @@ -169,6 +169,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26291.json b/2021/26xxx/CVE-2021-26291.json index b74cc23d4e17..454c79e950a9 100644 --- a/2021/26xxx/CVE-2021-26291.json +++ b/2021/26xxx/CVE-2021-26291.json @@ -283,6 +283,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26690.json b/2021/26xxx/CVE-2021-26690.json index 5b9edd17696c..069324ad43f4 100644 --- a/2021/26xxx/CVE-2021-26690.json +++ b/2021/26xxx/CVE-2021-26690.json @@ -268,6 +268,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210702-0001/", "url": "https://security.netapp.com/advisory/ntap-20210702-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26691.json b/2021/26xxx/CVE-2021-26691.json index 4399e90b5f29..c6f9146686d1 100644 --- a/2021/26xxx/CVE-2021-26691.json +++ b/2021/26xxx/CVE-2021-26691.json @@ -273,6 +273,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/28xxx/CVE-2021-28163.json b/2021/28xxx/CVE-2021-28163.json index 527cef21266b..90268c1f2c8e 100644 --- a/2021/28xxx/CVE-2021-28163.json +++ b/2021/28xxx/CVE-2021-28163.json @@ -209,6 +209,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/28xxx/CVE-2021-28164.json b/2021/28xxx/CVE-2021-28164.json index 7c83d1dfd887..19a145ca945f 100644 --- a/2021/28xxx/CVE-2021-28164.json +++ b/2021/28xxx/CVE-2021-28164.json @@ -196,6 +196,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/28xxx/CVE-2021-28165.json b/2021/28xxx/CVE-2021-28165.json index d6eb0567e11e..44c5a340dbe5 100644 --- a/2021/28xxx/CVE-2021-28165.json +++ b/2021/28xxx/CVE-2021-28165.json @@ -622,6 +622,9 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/28xxx/CVE-2021-28490.json b/2021/28xxx/CVE-2021-28490.json index 42c854b3d8b5..a79492e4d94e 100644 --- a/2021/28xxx/CVE-2021-28490.json +++ b/2021/28xxx/CVE-2021-28490.json @@ -61,6 +61,9 @@ "refsource": "MISC", "name": "https://github.com/reidmefirst/vuln-disclosure/blob/main/2021-01.txt", "url": "https://github.com/reidmefirst/vuln-disclosure/blob/main/2021-01.txt" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/29xxx/CVE-2021-29425.json b/2021/29xxx/CVE-2021-29425.json index 3c5aa41bbeb5..d278747091fc 100644 --- a/2021/29xxx/CVE-2021-29425.json +++ b/2021/29xxx/CVE-2021-29425.json @@ -312,6 +312,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30129.json b/2021/30xxx/CVE-2021-30129.json index 491801ebe454..e4bb82b03b4f 100644 --- a/2021/30xxx/CVE-2021-30129.json +++ b/2021/30xxx/CVE-2021-30129.json @@ -95,6 +95,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30639.json b/2021/30xxx/CVE-2021-30639.json index ca8ac5fe6202..1a1657b1d24d 100644 --- a/2021/30xxx/CVE-2021-30639.json +++ b/2021/30xxx/CVE-2021-30639.json @@ -105,6 +105,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31805.json b/2021/31xxx/CVE-2021-31805.json index df8ef2e5e4ec..91a8d68a195d 100644 --- a/2021/31xxx/CVE-2021-31805.json +++ b/2021/31xxx/CVE-2021-31805.json @@ -84,6 +84,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220420-0001/", "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/33xxx/CVE-2021-33037.json b/2021/33xxx/CVE-2021-33037.json index 4c400a9834bd..213aae9fe484 100644 --- a/2021/33xxx/CVE-2021-33037.json +++ b/2021/33xxx/CVE-2021-33037.json @@ -156,6 +156,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/34xxx/CVE-2021-34429.json b/2021/34xxx/CVE-2021-34429.json index 9acede705060..543d35f8a435 100644 --- a/2021/34xxx/CVE-2021-34429.json +++ b/2021/34xxx/CVE-2021-34429.json @@ -277,6 +277,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/34xxx/CVE-2021-34798.json b/2021/34xxx/CVE-2021-34798.json index 64300c272a98..6e7db4fe219f 100644 --- a/2021/34xxx/CVE-2021-34798.json +++ b/2021/34xxx/CVE-2021-34798.json @@ -153,6 +153,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35515.json b/2021/35xxx/CVE-2021-35515.json index 556b13ad6a1c..48c3e1099c28 100644 --- a/2021/35xxx/CVE-2021-35515.json +++ b/2021/35xxx/CVE-2021-35515.json @@ -178,6 +178,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35516.json b/2021/35xxx/CVE-2021-35516.json index 8c2fe3de1cb5..93a7320c4929 100644 --- a/2021/35xxx/CVE-2021-35516.json +++ b/2021/35xxx/CVE-2021-35516.json @@ -163,6 +163,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35517.json b/2021/35xxx/CVE-2021-35517.json index 366586639fe1..3fc09cf621fe 100644 --- a/2021/35xxx/CVE-2021-35517.json +++ b/2021/35xxx/CVE-2021-35517.json @@ -181,6 +181,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36090.json b/2021/36xxx/CVE-2021-36090.json index de98856822a6..f9703cfe32f2 100644 --- a/2021/36xxx/CVE-2021-36090.json +++ b/2021/36xxx/CVE-2021-36090.json @@ -236,6 +236,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36373.json b/2021/36xxx/CVE-2021-36373.json index 0c1ba33282e4..32f0114d82b3 100644 --- a/2021/36xxx/CVE-2021-36373.json +++ b/2021/36xxx/CVE-2021-36373.json @@ -141,6 +141,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36374.json b/2021/36xxx/CVE-2021-36374.json index 41b3f10805ee..1ad61fdd6650 100644 --- a/2021/36xxx/CVE-2021-36374.json +++ b/2021/36xxx/CVE-2021-36374.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36483.json b/2021/36xxx/CVE-2021-36483.json index b51be1087881..8ad909976267 100644 --- a/2021/36xxx/CVE-2021-36483.json +++ b/2021/36xxx/CVE-2021-36483.json @@ -81,6 +81,9 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/38xxx/CVE-2021-38153.json b/2021/38xxx/CVE-2021-38153.json index d8f738b0713e..4f7d6b003a37 100644 --- a/2021/38xxx/CVE-2021-38153.json +++ b/2021/38xxx/CVE-2021-38153.json @@ -163,6 +163,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/38xxx/CVE-2021-38604.json b/2021/38xxx/CVE-2021-38604.json index d2f1a10f3132..1f5fbf5402a3 100644 --- a/2021/38xxx/CVE-2021-38604.json +++ b/2021/38xxx/CVE-2021-38604.json @@ -91,6 +91,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-24", "url": "https://security.gentoo.org/glsa/202208-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/39xxx/CVE-2021-39275.json b/2021/39xxx/CVE-2021-39275.json index 5835c1023a5e..253928089d44 100644 --- a/2021/39xxx/CVE-2021-39275.json +++ b/2021/39xxx/CVE-2021-39275.json @@ -143,6 +143,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3426.json b/2021/3xxx/CVE-2021-3426.json index df9ed8551fea..7e9c3eba0845 100644 --- a/2021/3xxx/CVE-2021-3426.json +++ b/2021/3xxx/CVE-2021-3426.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3517.json b/2021/3xxx/CVE-2021-3517.json index 54e00b44d3f6..256d986a870e 100644 --- a/2021/3xxx/CVE-2021-3517.json +++ b/2021/3xxx/CVE-2021-3517.json @@ -108,6 +108,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3518.json b/2021/3xxx/CVE-2021-3518.json index 073295ded7da..00e014f6d353 100644 --- a/2021/3xxx/CVE-2021-3518.json +++ b/2021/3xxx/CVE-2021-3518.json @@ -138,6 +138,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3537.json b/2021/3xxx/CVE-2021-3537.json index 664298eb3a21..9d3ba240cae1 100644 --- a/2021/3xxx/CVE-2021-3537.json +++ b/2021/3xxx/CVE-2021-3537.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3597.json b/2021/3xxx/CVE-2021-3597.json index 785c6ad9f7e7..c84957f5dc7c 100644 --- a/2021/3xxx/CVE-2021-3597.json +++ b/2021/3xxx/CVE-2021-3597.json @@ -53,6 +53,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220804-0003/", "url": "https://security.netapp.com/advisory/ntap-20220804-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3737.json b/2021/3xxx/CVE-2021-3737.json index cfc3ae424462..d0924d6ffd95 100644 --- a/2021/3xxx/CVE-2021-3737.json +++ b/2021/3xxx/CVE-2021-3737.json @@ -83,6 +83,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0009/", "url": "https://security.netapp.com/advisory/ntap-20220407-0009/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3918.json b/2021/3xxx/CVE-2021-3918.json index c7ddb7769338..ac8a04117c31 100644 --- a/2021/3xxx/CVE-2021-3918.json +++ b/2021/3xxx/CVE-2021-3918.json @@ -84,6 +84,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3228-1] node-json-schema security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/40xxx/CVE-2021-40528.json b/2021/40xxx/CVE-2021-40528.json index e9ba053c4637..05e981110cec 100644 --- a/2021/40xxx/CVE-2021-40528.json +++ b/2021/40xxx/CVE-2021-40528.json @@ -76,6 +76,9 @@ "refsource": "GENTOO", "name": "GLSA-202210-13", "url": "https://security.gentoo.org/glsa/202210-13" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/40xxx/CVE-2021-40690.json b/2021/40xxx/CVE-2021-40690.json index 531cc88b139a..ff98eadbae71 100644 --- a/2021/40xxx/CVE-2021-40690.json +++ b/2021/40xxx/CVE-2021-40690.json @@ -131,6 +131,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41164.json b/2021/41xxx/CVE-2021-41164.json index 8695f2a26dcd..592577303f50 100644 --- a/2021/41xxx/CVE-2021-41164.json +++ b/2021/41xxx/CVE-2021-41164.json @@ -108,6 +108,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-4c634ee466", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41165.json b/2021/41xxx/CVE-2021-41165.json index 4554e44806e8..9ba4eea4ccd5 100644 --- a/2021/41xxx/CVE-2021-41165.json +++ b/2021/41xxx/CVE-2021-41165.json @@ -98,6 +98,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41182.json b/2021/41xxx/CVE-2021-41182.json index 577b7ad7cc48..1230d78b354b 100644 --- a/2021/41xxx/CVE-2021-41182.json +++ b/2021/41xxx/CVE-2021-41182.json @@ -124,10 +124,18 @@ "refsource": "MISC", "name": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-bf18450366", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" + }, { "url": "https://www.drupal.org/sa-core-2022-002", "refsource": "MISC", "name": "https://www.drupal.org/sa-core-2022-002" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41183.json b/2021/41xxx/CVE-2021-41183.json index 62e775297500..818ce0309b63 100644 --- a/2021/41xxx/CVE-2021-41183.json +++ b/2021/41xxx/CVE-2021-41183.json @@ -135,9 +135,18 @@ "name": "https://www.drupal.org/sa-core-2022-002" }, { + "refsource": "FEDORA", + "name": "FEDORA-2022-bf18450366", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" "url": "https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4", "refsource": "MISC", "name": "https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41184.json b/2021/41xxx/CVE-2021-41184.json index 0d99f834937b..e994de4ae015 100644 --- a/2021/41xxx/CVE-2021-41184.json +++ b/2021/41xxx/CVE-2021-41184.json @@ -115,9 +115,18 @@ "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/" }, { + "refsource": "FEDORA", + "name": "FEDORA-2022-bf18450366", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41495.json b/2021/41xxx/CVE-2021-41495.json index 4f9c54ebad33..ed6520c44c5a 100644 --- a/2021/41xxx/CVE-2021-41495.json +++ b/2021/41xxx/CVE-2021-41495.json @@ -59,6 +59,9 @@ }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/41xxx/CVE-2021-41496.json b/2021/41xxx/CVE-2021-41496.json index d04e3cb65cb5..1df9a93e7b76 100644 --- a/2021/41xxx/CVE-2021-41496.json +++ b/2021/41xxx/CVE-2021-41496.json @@ -59,6 +59,9 @@ }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/42xxx/CVE-2021-42340.json b/2021/42xxx/CVE-2021-42340.json index 560e058dd9c4..24e017f7bc4b 100644 --- a/2021/42xxx/CVE-2021-42340.json +++ b/2021/42xxx/CVE-2021-42340.json @@ -120,6 +120,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43396.json b/2021/43xxx/CVE-2021-43396.json index bfddf552e79f..8927b18a7356 100644 --- a/2021/43xxx/CVE-2021-43396.json +++ b/2021/43xxx/CVE-2021-43396.json @@ -69,6 +69,9 @@ }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/43xxx/CVE-2021-43527.json b/2021/43xxx/CVE-2021-43527.json index 2b86666332dc..62c2659acfb5 100644 --- a/2021/43xxx/CVE-2021-43527.json +++ b/2021/43xxx/CVE-2021-43527.json @@ -93,6 +93,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-05", "url": "https://security.gentoo.org/glsa/202212-05" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43797.json b/2021/43xxx/CVE-2021-43797.json index 1f2d1dd9380d..382868b75a19 100644 --- a/2021/43xxx/CVE-2021-43797.json +++ b/2021/43xxx/CVE-2021-43797.json @@ -103,6 +103,9 @@ "refsource": "DEBIAN", "name": "DSA-5316", "url": "https://www.debian.org/security/2023/dsa-5316" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/43xxx/CVE-2021-43859.json b/2021/43xxx/CVE-2021-43859.json index f1a57294e32c..f7adb017ae1d 100644 --- a/2021/43xxx/CVE-2021-43859.json +++ b/2021/43xxx/CVE-2021-43859.json @@ -113,6 +113,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44228.json b/2021/44xxx/CVE-2021-44228.json index e86af6127a5a..0dc22cc8fdbb 100644 --- a/2021/44xxx/CVE-2021-44228.json +++ b/2021/44xxx/CVE-2021-44228.json @@ -384,6 +384,9 @@ "refsource": "FULLDISC", "name": "20221208 Intel Data Center Manager <= 5.1 Local Privileges Escalation", "url": "http://seclists.org/fulldisclosure/2022/Dec/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44790.json b/2021/44xxx/CVE-2021-44790.json index 8338a614b2fa..699cd9268084 100644 --- a/2021/44xxx/CVE-2021-44790.json +++ b/2021/44xxx/CVE-2021-44790.json @@ -167,6 +167,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44832.json b/2021/44xxx/CVE-2021-44832.json index fc8466d2b986..b7ed5273dc86 100644 --- a/2021/44xxx/CVE-2021-44832.json +++ b/2021/44xxx/CVE-2021-44832.json @@ -155,6 +155,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/45xxx/CVE-2021-45046.json b/2021/45xxx/CVE-2021-45046.json index 3e44891f37ea..9d3e3349bb59 100644 --- a/2021/45xxx/CVE-2021-45046.json +++ b/2021/45xxx/CVE-2021-45046.json @@ -162,6 +162,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/45xxx/CVE-2021-45105.json b/2021/45xxx/CVE-2021-45105.json index 2d42fd618ba2..58efc3c679b9 100644 --- a/2021/45xxx/CVE-2021-45105.json +++ b/2021/45xxx/CVE-2021-45105.json @@ -166,6 +166,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4034.json b/2021/4xxx/CVE-2021-4034.json index 03e101ab285a..125837961466 100644 --- a/2021/4xxx/CVE-2021-4034.json +++ b/2021/4xxx/CVE-2021-4034.json @@ -103,6 +103,9 @@ "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/", "refsource": "MISC", "name": "https://www.starwindsoftware.com/security/sw-20220818-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2021/4xxx/CVE-2021-4048.json b/2021/4xxx/CVE-2021-4048.json index 0824a2d9c326..c68ec421fc50 100644 --- a/2021/4xxx/CVE-2021-4048.json +++ b/2021/4xxx/CVE-2021-4048.json @@ -88,6 +88,9 @@ "refsource": "FEDORA", "name": "FEDORA-2021-aec9d01057", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4104.json b/2021/4xxx/CVE-2021-4104.json index 41ee26ae01ca..9a7c849a6c67 100644 --- a/2021/4xxx/CVE-2021-4104.json +++ b/2021/4xxx/CVE-2021-4104.json @@ -115,6 +115,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-02", "url": "https://security.gentoo.org/glsa/202209-02" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4178.json b/2021/4xxx/CVE-2021-4178.json index 67281b5f44d3..a6b39279a270 100644 --- a/2021/4xxx/CVE-2021-4178.json +++ b/2021/4xxx/CVE-2021-4178.json @@ -63,6 +63,9 @@ "refsource": "MISC", "name": "https://github.com/fabric8io/kubernetes-client/issues/3653", "url": "https://github.com/fabric8io/kubernetes-client/issues/3653" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0778.json b/2022/0xxx/CVE-2022-0778.json index aaefa71ab6a0..611da793fa45 100644 --- a/2022/0xxx/CVE-2022-0778.json +++ b/2022/0xxx/CVE-2022-0778.json @@ -212,6 +212,9 @@ "refsource": "GENTOO", "name": "GLSA-202210-02", "url": "https://security.gentoo.org/glsa/202210-02" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/1xxx/CVE-2022-1154.json b/2022/1xxx/CVE-2022-1154.json index 36adeb4dd0d4..550e3a26f86f 100644 --- a/2022/1xxx/CVE-2022-1154.json +++ b/2022/1xxx/CVE-2022-1154.json @@ -109,6 +109,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1292.json b/2022/1xxx/CVE-2022-1292.json index 11f2e011430d..f458ad8e08d9 100644 --- a/2022/1xxx/CVE-2022-1292.json +++ b/2022/1xxx/CVE-2022-1292.json @@ -142,6 +142,9 @@ "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/1xxx/CVE-2022-1586.json b/2022/1xxx/CVE-2022-1586.json index d5346a596120..8db8ca7a3a1f 100644 --- a/2022/1xxx/CVE-2022-1586.json +++ b/2022/1xxx/CVE-2022-1586.json @@ -88,6 +88,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update", "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/1xxx/CVE-2022-1587.json b/2022/1xxx/CVE-2022-1587.json index eba85a89b8b1..f627530a2272 100644 --- a/2022/1xxx/CVE-2022-1587.json +++ b/2022/1xxx/CVE-2022-1587.json @@ -83,6 +83,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update", "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21123.json b/2022/21xxx/CVE-2022-21123.json index 1566f640b9e4..ed82032f6ee8 100644 --- a/2022/21xxx/CVE-2022-21123.json +++ b/2022/21xxx/CVE-2022-21123.json @@ -103,6 +103,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-23", "url": "https://security.gentoo.org/glsa/202208-23" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21125.json b/2022/21xxx/CVE-2022-21125.json index eebec1d4a49e..7dd0b998f86d 100644 --- a/2022/21xxx/CVE-2022-21125.json +++ b/2022/21xxx/CVE-2022-21125.json @@ -108,6 +108,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-23", "url": "https://security.gentoo.org/glsa/202208-23" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21127.json b/2022/21xxx/CVE-2022-21127.json index f0961718ef88..6775a8d32249 100644 --- a/2022/21xxx/CVE-2022-21127.json +++ b/2022/21xxx/CVE-2022-21127.json @@ -63,6 +63,9 @@ "refsource": "DEBIAN", "name": "DSA-5178", "url": "https://www.debian.org/security/2022/dsa-5178" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21166.json b/2022/21xxx/CVE-2022-21166.json index e9e2af25f2cf..a3666471504e 100644 --- a/2022/21xxx/CVE-2022-21166.json +++ b/2022/21xxx/CVE-2022-21166.json @@ -103,6 +103,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-23", "url": "https://security.gentoo.org/glsa/202208-23" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21540.json b/2022/21xxx/CVE-2022-21540.json index fe295d3bba70..fef31523b8ac 100644 --- a/2022/21xxx/CVE-2022-21540.json +++ b/2022/21xxx/CVE-2022-21540.json @@ -112,6 +112,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-19b6f21746", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/21xxx/CVE-2022-21541.json b/2022/21xxx/CVE-2022-21541.json index 54a1508ca09f..1b177646c6f7 100644 --- a/2022/21xxx/CVE-2022-21541.json +++ b/2022/21xxx/CVE-2022-21541.json @@ -117,6 +117,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-ae563934f7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/21xxx/CVE-2022-21549.json b/2022/21xxx/CVE-2022-21549.json index be34bfcb8c3f..44589a0a1d73 100644 --- a/2022/21xxx/CVE-2022-21549.json +++ b/2022/21xxx/CVE-2022-21549.json @@ -92,6 +92,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-64431bccec", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKJCLA2GDNF4B7ZRKORQ2TIR56AHJ4VC/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/22xxx/CVE-2022-22720.json b/2022/22xxx/CVE-2022-22720.json index 03ac3749814c..3affd59b08e6 100644 --- a/2022/22xxx/CVE-2022-22720.json +++ b/2022/22xxx/CVE-2022-22720.json @@ -148,6 +148,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22965.json b/2022/22xxx/CVE-2022-22965.json index dab2f52d69c8..18f52b574d8c 100644 --- a/2022/22xxx/CVE-2022-22965.json +++ b/2022/22xxx/CVE-2022-22965.json @@ -83,6 +83,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22968.json b/2022/22xxx/CVE-2022-22968.json index 9a94998b2a78..61c148cc68a8 100644 --- a/2022/22xxx/CVE-2022-22968.json +++ b/2022/22xxx/CVE-2022-22968.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220602-0004/", "url": "https://security.netapp.com/advisory/ntap-20220602-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22970.json b/2022/22xxx/CVE-2022-22970.json index e8329f547f13..38461fc9162e 100644 --- a/2022/22xxx/CVE-2022-22970.json +++ b/2022/22xxx/CVE-2022-22970.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0006/", "url": "https://security.netapp.com/advisory/ntap-20220616-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22971.json b/2022/22xxx/CVE-2022-22971.json index 885d297e07c4..78c84d51be01 100644 --- a/2022/22xxx/CVE-2022-22971.json +++ b/2022/22xxx/CVE-2022-22971.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0003/", "url": "https://security.netapp.com/advisory/ntap-20220616-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22976.json b/2022/22xxx/CVE-2022-22976.json index c96d31348e4d..6f147abb55c9 100644 --- a/2022/22xxx/CVE-2022-22976.json +++ b/2022/22xxx/CVE-2022-22976.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220707-0003/", "url": "https://security.netapp.com/advisory/ntap-20220707-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22978.json b/2022/22xxx/CVE-2022-22978.json index c35cb86c7543..975a0f09dc94 100644 --- a/2022/22xxx/CVE-2022-22978.json +++ b/2022/22xxx/CVE-2022-22978.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220707-0003/", "url": "https://security.netapp.com/advisory/ntap-20220707-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23181.json b/2022/23xxx/CVE-2022-23181.json index 5afbba4a1be6..08585b3d7775 100644 --- a/2022/23xxx/CVE-2022-23181.json +++ b/2022/23xxx/CVE-2022-23181.json @@ -107,6 +107,9 @@ "refsource": "DEBIAN", "name": "DSA-5265", "url": "https://www.debian.org/security/2022/dsa-5265" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23218.json b/2022/23xxx/CVE-2022-23218.json index 12b5e7ef4b63..9bab1340aa4e 100644 --- a/2022/23xxx/CVE-2022-23218.json +++ b/2022/23xxx/CVE-2022-23218.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/23xxx/CVE-2022-23219.json b/2022/23xxx/CVE-2022-23219.json index 0561d8b17932..6bb94203f6a1 100644 --- a/2022/23xxx/CVE-2022-23219.json +++ b/2022/23xxx/CVE-2022-23219.json @@ -71,6 +71,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/23xxx/CVE-2022-23302.json b/2022/23xxx/CVE-2022-23302.json index 46cae5f3abd6..7f4bf069c190 100644 --- a/2022/23xxx/CVE-2022-23302.json +++ b/2022/23xxx/CVE-2022-23302.json @@ -101,6 +101,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23305.json b/2022/23xxx/CVE-2022-23305.json index 5ea35c68b2b5..5868f87f3cd4 100644 --- a/2022/23xxx/CVE-2022-23305.json +++ b/2022/23xxx/CVE-2022-23305.json @@ -101,6 +101,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23307.json b/2022/23xxx/CVE-2022-23307.json index aecec69720c3..13cd97f9e545 100644 --- a/2022/23xxx/CVE-2022-23307.json +++ b/2022/23xxx/CVE-2022-23307.json @@ -91,6 +91,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23308.json b/2022/23xxx/CVE-2022-23308.json index be7f40f1438b..656656f717a7 100644 --- a/2022/23xxx/CVE-2022-23308.json +++ b/2022/23xxx/CVE-2022-23308.json @@ -146,6 +146,9 @@ "refsource": "GENTOO", "name": "GLSA-202210-03", "url": "https://security.gentoo.org/glsa/202210-03" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/23xxx/CVE-2022-23437.json b/2022/23xxx/CVE-2022-23437.json index 209954724514..f5a3dbae75ef 100644 --- a/2022/23xxx/CVE-2022-23437.json +++ b/2022/23xxx/CVE-2022-23437.json @@ -93,6 +93,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221028-0005/", "url": "https://security.netapp.com/advisory/ntap-20221028-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23457.json b/2022/23xxx/CVE-2022-23457.json index 965ad0f4ff04..d14fe5c4c5aa 100644 --- a/2022/23xxx/CVE-2022-23457.json +++ b/2022/23xxx/CVE-2022-23457.json @@ -98,6 +98,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230127-0014/", "url": "https://security.netapp.com/advisory/ntap-20230127-0014/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23632.json b/2022/23xxx/CVE-2022-23632.json index ae9ce9b2ac78..eb4fca05fc6f 100644 --- a/2022/23xxx/CVE-2022-23632.json +++ b/2022/23xxx/CVE-2022-23632.json @@ -88,6 +88,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23943.json b/2022/23xxx/CVE-2022-23943.json index f656f299e8dc..24db518b1577 100644 --- a/2022/23xxx/CVE-2022-23943.json +++ b/2022/23xxx/CVE-2022-23943.json @@ -131,6 +131,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23990.json b/2022/23xxx/CVE-2022-23990.json index 9bd3003d96e5..a84dc99897fb 100644 --- a/2022/23xxx/CVE-2022-23990.json +++ b/2022/23xxx/CVE-2022-23990.json @@ -91,6 +91,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/24xxx/CVE-2022-24675.json b/2022/24xxx/CVE-2022-24675.json index c1c14d3c061d..c977e698d071 100644 --- a/2022/24xxx/CVE-2022-24675.json +++ b/2022/24xxx/CVE-2022-24675.json @@ -106,7 +106,11 @@ "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } + ] } } \ No newline at end of file diff --git a/2022/24xxx/CVE-2022-24728.json b/2022/24xxx/CVE-2022-24728.json index 2fed76382959..c78c5fbd0627 100644 --- a/2022/24xxx/CVE-2022-24728.json +++ b/2022/24xxx/CVE-2022-24728.json @@ -103,6 +103,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-4c634ee466", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24729.json b/2022/24xxx/CVE-2022-24729.json index 2ed423ff46f3..99404963b28c 100644 --- a/2022/24xxx/CVE-2022-24729.json +++ b/2022/24xxx/CVE-2022-24729.json @@ -98,6 +98,9 @@ "refsource": "FEDORA", "name": "FEDORA-2022-4c634ee466", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24761.json b/2022/24xxx/CVE-2022-24761.json index c43f6a2734c6..7f7d99d40d5d 100644 --- a/2022/24xxx/CVE-2022-24761.json +++ b/2022/24xxx/CVE-2022-24761.json @@ -93,6 +93,9 @@ "refsource": "DEBIAN", "name": "DSA-5138", "url": "https://www.debian.org/security/2022/dsa-5138" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24785.json b/2022/24xxx/CVE-2022-24785.json index fb2cb70601b3..96be0a174650 100644 --- a/2022/24xxx/CVE-2022-24785.json +++ b/2022/24xxx/CVE-2022-24785.json @@ -111,6 +111,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24823.json b/2022/24xxx/CVE-2022-24823.json index 6bc462588047..1d2fc5e779d3 100644 --- a/2022/24xxx/CVE-2022-24823.json +++ b/2022/24xxx/CVE-2022-24823.json @@ -109,6 +109,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0004/", "url": "https://security.netapp.com/advisory/ntap-20220616-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24891.json b/2022/24xxx/CVE-2022-24891.json index 186fa9c23228..415c6fb06c1f 100644 --- a/2022/24xxx/CVE-2022-24891.json +++ b/2022/24xxx/CVE-2022-24891.json @@ -93,6 +93,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230127-0014/", "url": "https://security.netapp.com/advisory/ntap-20230127-0014/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25169.json b/2022/25xxx/CVE-2022-25169.json index 63b7785b587b..2331efe15d71 100644 --- a/2022/25xxx/CVE-2022-25169.json +++ b/2022/25xxx/CVE-2022-25169.json @@ -85,6 +85,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220804-0004/", "url": "https://security.netapp.com/advisory/ntap-20220804-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25235.json b/2022/25xxx/CVE-2022-25235.json index 7155ac1cf61d..9e2083590667 100644 --- a/2022/25xxx/CVE-2022-25235.json +++ b/2022/25xxx/CVE-2022-25235.json @@ -101,6 +101,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/25xxx/CVE-2022-25236.json b/2022/25xxx/CVE-2022-25236.json index 915d8e336f2f..35590d8eafa0 100644 --- a/2022/25xxx/CVE-2022-25236.json +++ b/2022/25xxx/CVE-2022-25236.json @@ -106,6 +106,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/25xxx/CVE-2022-25313.json b/2022/25xxx/CVE-2022-25313.json index 538617b87c23..77bed44bcfd8 100644 --- a/2022/25xxx/CVE-2022-25313.json +++ b/2022/25xxx/CVE-2022-25313.json @@ -101,6 +101,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/25xxx/CVE-2022-25314.json b/2022/25xxx/CVE-2022-25314.json index 2c814ac564ca..12689eedd2f9 100644 --- a/2022/25xxx/CVE-2022-25314.json +++ b/2022/25xxx/CVE-2022-25314.json @@ -96,6 +96,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/25xxx/CVE-2022-25315.json b/2022/25xxx/CVE-2022-25315.json index b1aed586200e..d62c4d912d6e 100644 --- a/2022/25xxx/CVE-2022-25315.json +++ b/2022/25xxx/CVE-2022-25315.json @@ -101,6 +101,9 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/25xxx/CVE-2022-25647.json b/2022/25xxx/CVE-2022-25647.json index b4da1fc4027a..073076491072 100644 --- a/2022/25xxx/CVE-2022-25647.json +++ b/2022/25xxx/CVE-2022-25647.json @@ -86,6 +86,9 @@ "refsource": "DEBIAN", "name": "DSA-5227", "url": "https://www.debian.org/security/2022/dsa-5227" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25857.json b/2022/25xxx/CVE-2022-25857.json index 71f839bb19fd..60de6e6e4550 100644 --- a/2022/25xxx/CVE-2022-25857.json +++ b/2022/25xxx/CVE-2022-25857.json @@ -75,6 +75,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/26xxx/CVE-2022-26377.json b/2022/26xxx/CVE-2022-26377.json index 2d0b21f6f5cf..d82db9ee29c7 100644 --- a/2022/26xxx/CVE-2022-26377.json +++ b/2022/26xxx/CVE-2022-26377.json @@ -98,6 +98,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27778.json b/2022/27xxx/CVE-2022-27778.json index bab2cf070953..fa04b5d4e5ee 100644 --- a/2022/27xxx/CVE-2022-27778.json +++ b/2022/27xxx/CVE-2022-27778.json @@ -63,6 +63,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220729-0004/", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27779.json b/2022/27xxx/CVE-2022-27779.json index 3a6c7aa25b09..38ad364f4ef9 100644 --- a/2022/27xxx/CVE-2022-27779.json +++ b/2022/27xxx/CVE-2022-27779.json @@ -58,6 +58,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27780.json b/2022/27xxx/CVE-2022-27780.json index b79def0d2808..f81181764c69 100644 --- a/2022/27xxx/CVE-2022-27780.json +++ b/2022/27xxx/CVE-2022-27780.json @@ -58,6 +58,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27781.json b/2022/27xxx/CVE-2022-27781.json index d95c95247347..faf7dccee8ff 100644 --- a/2022/27xxx/CVE-2022-27781.json +++ b/2022/27xxx/CVE-2022-27781.json @@ -68,6 +68,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27782.json b/2022/27xxx/CVE-2022-27782.json index c3d5b80f6e0a..9b9f3b520e32 100644 --- a/2022/27xxx/CVE-2022-27782.json +++ b/2022/27xxx/CVE-2022-27782.json @@ -73,6 +73,9 @@ "refsource": "MLIST", "name": "[oss-security] 20230320 [SECURITY ADVISORY] curl: CVE-2023-27538: SSH connection too eager reuse still", "url": "http://www.openwall.com/lists/oss-security/2023/03/20/6" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/28xxx/CVE-2022-28327.json b/2022/28xxx/CVE-2022-28327.json index f4c6255b8de3..816d13f8e659 100644 --- a/2022/28xxx/CVE-2022-28327.json +++ b/2022/28xxx/CVE-2022-28327.json @@ -111,6 +111,9 @@ "refsource": "MISC", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/28xxx/CVE-2022-28330.json b/2022/28xxx/CVE-2022-28330.json index 5a1a7e47496b..67cdbeb129cb 100644 --- a/2022/28xxx/CVE-2022-28330.json +++ b/2022/28xxx/CVE-2022-28330.json @@ -84,6 +84,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0005/", "url": "https://security.netapp.com/advisory/ntap-20220624-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/28xxx/CVE-2022-28614.json b/2022/28xxx/CVE-2022-28614.json index 831aa22dbc70..2deadb33973a 100644 --- a/2022/28xxx/CVE-2022-28614.json +++ b/2022/28xxx/CVE-2022-28614.json @@ -105,6 +105,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/28xxx/CVE-2022-28615.json b/2022/28xxx/CVE-2022-28615.json index bb21172e80ef..c252e0d8f594 100644 --- a/2022/28xxx/CVE-2022-28615.json +++ b/2022/28xxx/CVE-2022-28615.json @@ -98,6 +98,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29404.json b/2022/29xxx/CVE-2022-29404.json index 6a24510d386b..de5215e2c2b7 100644 --- a/2022/29xxx/CVE-2022-29404.json +++ b/2022/29xxx/CVE-2022-29404.json @@ -97,6 +97,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29577.json b/2022/29xxx/CVE-2022-29577.json index 05394b1e3168..cb715a0235cd 100644 --- a/2022/29xxx/CVE-2022-29577.json +++ b/2022/29xxx/CVE-2022-29577.json @@ -66,6 +66,9 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/29xxx/CVE-2022-29824.json b/2022/29xxx/CVE-2022-29824.json index 967cb1724a19..6e08738d9b62 100644 --- a/2022/29xxx/CVE-2022-29824.json +++ b/2022/29xxx/CVE-2022-29824.json @@ -121,6 +121,9 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html", "url": "http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/29xxx/CVE-2022-29885.json b/2022/29xxx/CVE-2022-29885.json index 2b9b7df73e5a..6fd680e1013d 100644 --- a/2022/29xxx/CVE-2022-29885.json +++ b/2022/29xxx/CVE-2022-29885.json @@ -108,6 +108,9 @@ "refsource": "DEBIAN", "name": "DSA-5265", "url": "https://www.debian.org/security/2022/dsa-5265" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2047.json b/2022/2xxx/CVE-2022-2047.json index a740189503c8..c88602d8cad8 100644 --- a/2022/2xxx/CVE-2022-2047.json +++ b/2022/2xxx/CVE-2022-2047.json @@ -98,6 +98,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220901-0006/", "url": "https://security.netapp.com/advisory/ntap-20220901-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/2xxx/CVE-2022-2048.json b/2022/2xxx/CVE-2022-2048.json index c7813087746e..148ba648ad18 100644 --- a/2022/2xxx/CVE-2022-2048.json +++ b/2022/2xxx/CVE-2022-2048.json @@ -112,6 +112,9 @@ "refsource": "MLIST", "name": "[oss-security] 20220909 Vulnerability in Jenkins", "url": "http://www.openwall.com/lists/oss-security/2022/09/09/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/2xxx/CVE-2022-2068.json b/2022/2xxx/CVE-2022-2068.json index a63f6c6be27b..28ae1ea8b076 100644 --- a/2022/2xxx/CVE-2022-2068.json +++ b/2022/2xxx/CVE-2022-2068.json @@ -117,6 +117,9 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/2xxx/CVE-2022-2097.json b/2022/2xxx/CVE-2022-2097.json index 000863e29c9c..635762371b95 100644 --- a/2022/2xxx/CVE-2022-2097.json +++ b/2022/2xxx/CVE-2022-2097.json @@ -124,6 +124,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230220 [SECURITY] [DLA 3325-1] openssl security update", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/2xxx/CVE-2022-2191.json b/2022/2xxx/CVE-2022-2191.json index a55d32d6880f..aa32c42bbe36 100644 --- a/2022/2xxx/CVE-2022-2191.json +++ b/2022/2xxx/CVE-2022-2191.json @@ -88,6 +88,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220909-0003/", "url": "https://security.netapp.com/advisory/ntap-20220909-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/30xxx/CVE-2022-30115.json b/2022/30xxx/CVE-2022-30115.json index e2acfbea3abb..61266ec3e99f 100644 --- a/2022/30xxx/CVE-2022-30115.json +++ b/2022/30xxx/CVE-2022-30115.json @@ -68,6 +68,9 @@ "refsource": "MLIST", "name": "[oss-security] 20221221 curl: CVE-2022-43551: Another HSTS bypass via IDN", "url": "http://www.openwall.com/lists/oss-security/2022/12/21/1" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30126.json b/2022/30xxx/CVE-2022-30126.json index 13862a5b4d30..1b0d11db0324 100644 --- a/2022/30xxx/CVE-2022-30126.json +++ b/2022/30xxx/CVE-2022-30126.json @@ -103,6 +103,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0004/", "url": "https://security.netapp.com/advisory/ntap-20220624-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30522.json b/2022/30xxx/CVE-2022-30522.json index 8793808c0d0e..31eab4cd6f30 100644 --- a/2022/30xxx/CVE-2022-30522.json +++ b/2022/30xxx/CVE-2022-30522.json @@ -97,6 +97,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30556.json b/2022/30xxx/CVE-2022-30556.json index 24bbbe3ef56a..af816b15acbe 100644 --- a/2022/30xxx/CVE-2022-30556.json +++ b/2022/30xxx/CVE-2022-30556.json @@ -97,6 +97,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31129.json b/2022/31xxx/CVE-2022-31129.json index e12621a52d68..741bb63db871 100644 --- a/2022/31xxx/CVE-2022-31129.json +++ b/2022/31xxx/CVE-2022-31129.json @@ -118,6 +118,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31813.json b/2022/31xxx/CVE-2022-31813.json index e5ef3010ca67..7feeb80e0979 100644 --- a/2022/31xxx/CVE-2022-31813.json +++ b/2022/31xxx/CVE-2022-31813.json @@ -98,6 +98,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32189.json b/2022/32xxx/CVE-2022-32189.json index f70b132d233a..4ffc7686e1b4 100644 --- a/2022/32xxx/CVE-2022-32189.json +++ b/2022/32xxx/CVE-2022-32189.json @@ -81,6 +81,10 @@ "url": "https://groups.google.com/g/golang-announce/c/YqYYG87xB10", "refsource": "MISC", "name": "https://groups.google.com/g/golang-announce/c/YqYYG87xB10" + + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32205.json b/2022/32xxx/CVE-2022-32205.json index c9aa3e0d3b04..96afa83ac6a2 100644 --- a/2022/32xxx/CVE-2022-32205.json +++ b/2022/32xxx/CVE-2022-32205.json @@ -88,6 +88,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32206.json b/2022/32xxx/CVE-2022-32206.json index 7db232b7ee72..b7fd87ce0498 100644 --- a/2022/32xxx/CVE-2022-32206.json +++ b/2022/32xxx/CVE-2022-32206.json @@ -98,6 +98,9 @@ "refsource": "MLIST", "name": "[oss-security] 20230215 curl: CVE-2023-23916: HTTP multi-header compression denial of service", "url": "http://www.openwall.com/lists/oss-security/2023/02/15/3" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32207.json b/2022/32xxx/CVE-2022-32207.json index 8e2267631659..5c1f59869b0c 100644 --- a/2022/32xxx/CVE-2022-32207.json +++ b/2022/32xxx/CVE-2022-32207.json @@ -83,6 +83,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32208.json b/2022/32xxx/CVE-2022-32208.json index 3707fd8a27b4..745bd04e8d09 100644 --- a/2022/32xxx/CVE-2022-32208.json +++ b/2022/32xxx/CVE-2022-32208.json @@ -88,6 +88,9 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32212.json b/2022/32xxx/CVE-2022-32212.json index b96aa531bf4a..2d15366939d7 100644 --- a/2022/32xxx/CVE-2022-32212.json +++ b/2022/32xxx/CVE-2022-32212.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1632921", "url": "https://hackerone.com/reports/1632921" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32213.json b/2022/32xxx/CVE-2022-32213.json index d8f47d1b718c..287357799176 100644 --- a/2022/32xxx/CVE-2022-32213.json +++ b/2022/32xxx/CVE-2022-32213.json @@ -78,6 +78,9 @@ "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32214.json b/2022/32xxx/CVE-2022-32214.json index 24a1e3aafaae..63ffea5f3f82 100644 --- a/2022/32xxx/CVE-2022-32214.json +++ b/2022/32xxx/CVE-2022-32214.json @@ -58,6 +58,9 @@ "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32215.json b/2022/32xxx/CVE-2022-32215.json index d22bc0784c77..20f960b35360 100644 --- a/2022/32xxx/CVE-2022-32215.json +++ b/2022/32xxx/CVE-2022-32215.json @@ -78,6 +78,9 @@ "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32222.json b/2022/32xxx/CVE-2022-32222.json index b5e97164d36d..5de8fdf671a2 100644 --- a/2022/32xxx/CVE-2022-32222.json +++ b/2022/32xxx/CVE-2022-32222.json @@ -48,6 +48,9 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1695596", "url": "https://hackerone.com/reports/1695596" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32223.json b/2022/32xxx/CVE-2022-32223.json index 5e4816fe4d5e..febb32abb904 100644 --- a/2022/32xxx/CVE-2022-32223.json +++ b/2022/32xxx/CVE-2022-32223.json @@ -58,6 +58,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220915-0001/", "url": "https://security.netapp.com/advisory/ntap-20220915-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32532.json b/2022/32xxx/CVE-2022-32532.json index 9c116bd334f3..9f9fa5217495 100644 --- a/2022/32xxx/CVE-2022-32532.json +++ b/2022/32xxx/CVE-2022-32532.json @@ -69,6 +69,9 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh", "name": "https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/33xxx/CVE-2022-33879.json b/2022/33xxx/CVE-2022-33879.json index 5866c2c8e1f7..fb1eb25891ab 100644 --- a/2022/33xxx/CVE-2022-33879.json +++ b/2022/33xxx/CVE-2022-33879.json @@ -88,6 +88,9 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220812-0004/", "url": "https://security.netapp.com/advisory/ntap-20220812-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/33xxx/CVE-2022-33980.json b/2022/33xxx/CVE-2022-33980.json index 56efa89a0f0b..80181840cd1e 100644 --- a/2022/33xxx/CVE-2022-33980.json +++ b/2022/33xxx/CVE-2022-33980.json @@ -92,6 +92,9 @@ "refsource": "DEBIAN", "name": "DSA-5290", "url": "https://www.debian.org/security/2022/dsa-5290" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/34xxx/CVE-2022-34169.json b/2022/34xxx/CVE-2022-34169.json index 50a1541db4fe..5684424ddabe 100644 --- a/2022/34xxx/CVE-2022-34169.json +++ b/2022/34xxx/CVE-2022-34169.json @@ -176,6 +176,9 @@ "refsource": "MLIST", "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/34xxx/CVE-2022-34305.json b/2022/34xxx/CVE-2022-34305.json index b12b8f240e63..b7be16332030 100644 --- a/2022/34xxx/CVE-2022-34305.json +++ b/2022/34xxx/CVE-2022-34305.json @@ -97,6 +97,9 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35737.json b/2022/35xxx/CVE-2022-35737.json index 539c68cbc564..33c8c2f1acb8 100644 --- a/2022/35xxx/CVE-2022-35737.json +++ b/2022/35xxx/CVE-2022-35737.json @@ -81,6 +81,9 @@ "refsource": "GENTOO", "name": "GLSA-202210-40", "url": "https://security.gentoo.org/glsa/202210-40" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] } diff --git a/2022/36xxx/CVE-2022-36033.json b/2022/36xxx/CVE-2022-36033.json index 97a7217f1e3d..b10622923b50 100644 --- a/2022/36xxx/CVE-2022-36033.json +++ b/2022/36xxx/CVE-2022-36033.json @@ -93,9 +93,13 @@ "url": "https://jsoup.org/news/release-1.15.3" }, { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221104-0006/", "url": "https://security.netapp.com/advisory/ntap-20221104-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38749.json b/2022/38xxx/CVE-2022-38749.json index 605933afcf29..2159920b9c3b 100644 --- a/2022/38xxx/CVE-2022-38749.json +++ b/2022/38xxx/CVE-2022-38749.json @@ -87,6 +87,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38750.json b/2022/38xxx/CVE-2022-38750.json index cc8848a4fd53..83ff4eadd1ce 100644 --- a/2022/38xxx/CVE-2022-38750.json +++ b/2022/38xxx/CVE-2022-38750.json @@ -87,6 +87,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38751.json b/2022/38xxx/CVE-2022-38751.json index 3b1971689bb1..5103809efb20 100644 --- a/2022/38xxx/CVE-2022-38751.json +++ b/2022/38xxx/CVE-2022-38751.json @@ -87,6 +87,9 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38752.json b/2022/38xxx/CVE-2022-38752.json index 3be5e76252a8..b2b07823b8d9 100644 --- a/2022/38xxx/CVE-2022-38752.json +++ b/2022/38xxx/CVE-2022-38752.json @@ -82,6 +82,9 @@ "refsource": "MISC", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081", "name": "https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpuoct2022.html" } ] },