diff --git a/2021/40xxx/CVE-2021-40663.json b/2021/40xxx/CVE-2021-40663.json index 07f406bfa82..0b2572933f4 100644 --- a/2021/40xxx/CVE-2021-40663.json +++ b/2021/40xxx/CVE-2021-40663.json @@ -61,6 +61,11 @@ "url": "https://www.npmjs.com/package/deep.assign", "refsource": "MISC", "name": "https://www.npmjs.com/package/deep.assign" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0002/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0002/" } ] } diff --git a/2022/21xxx/CVE-2022-21151.json b/2022/21xxx/CVE-2022-21151.json index 0738fd8ead8..dc273be08d4 100644 --- a/2022/21xxx/CVE-2022-21151.json +++ b/2022/21xxx/CVE-2022-21151.json @@ -53,6 +53,11 @@ "refsource": "DEBIAN", "name": "DSA-5178", "url": "https://www.debian.org/security/2022/dsa-5178" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0003/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0003/" } ] }, diff --git a/2022/2xxx/CVE-2022-2056.json b/2022/2xxx/CVE-2022-2056.json index 8555ddbbabf..078c4715df9 100644 --- a/2022/2xxx/CVE-2022-2056.json +++ b/2022/2xxx/CVE-2022-2056.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-b9c2a3a2b7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0001/" } ] }, diff --git a/2022/2xxx/CVE-2022-2057.json b/2022/2xxx/CVE-2022-2057.json index 3849fcaeca2..0114d76d6da 100644 --- a/2022/2xxx/CVE-2022-2057.json +++ b/2022/2xxx/CVE-2022-2057.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-b9c2a3a2b7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0001/" } ] }, diff --git a/2022/2xxx/CVE-2022-2058.json b/2022/2xxx/CVE-2022-2058.json index 9483e98805c..de049111354 100644 --- a/2022/2xxx/CVE-2022-2058.json +++ b/2022/2xxx/CVE-2022-2058.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-b9c2a3a2b7", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXUMJXVEAYFWRO3U3YHKSULHIVDOLEQS/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0001/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0001/" } ] }, diff --git a/2022/31xxx/CVE-2022-31627.json b/2022/31xxx/CVE-2022-31627.json index 6ec6467f916..b89aacf20a8 100644 --- a/2022/31xxx/CVE-2022-31627.json +++ b/2022/31xxx/CVE-2022-31627.json @@ -85,6 +85,11 @@ "refsource": "MISC", "url": "https://bugs.php.net/bug.php?id=81723", "name": "https://bugs.php.net/bug.php?id=81723" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0008/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0008/" } ] }, diff --git a/2022/32xxx/CVE-2022-32083.json b/2022/32xxx/CVE-2022-32083.json index 85a99b8e335..396439791e5 100644 --- a/2022/32xxx/CVE-2022-32083.json +++ b/2022/32xxx/CVE-2022-32083.json @@ -56,6 +56,11 @@ "url": "https://jira.mariadb.org/browse/MDEV-26047", "refsource": "MISC", "name": "https://jira.mariadb.org/browse/MDEV-26047" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0006/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0006/" } ] } diff --git a/2022/32xxx/CVE-2022-32086.json b/2022/32xxx/CVE-2022-32086.json index dc54efa0112..e0b0ba560b0 100644 --- a/2022/32xxx/CVE-2022-32086.json +++ b/2022/32xxx/CVE-2022-32086.json @@ -56,6 +56,11 @@ "url": "https://jira.mariadb.org/browse/MDEV-26412", "refsource": "MISC", "name": "https://jira.mariadb.org/browse/MDEV-26412" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0007/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0007/" } ] } diff --git a/2022/34xxx/CVE-2022-34903.json b/2022/34xxx/CVE-2022-34903.json index 5b2ef3fe0fd..f63e6b43ddd 100644 --- a/2022/34xxx/CVE-2022-34903.json +++ b/2022/34xxx/CVE-2022-34903.json @@ -91,6 +91,16 @@ "refsource": "FEDORA", "name": "FEDORA-2022-0dbfb7e270", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2022-1747eea46c", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0005/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0005/" } ] } diff --git a/2022/34xxx/CVE-2022-34918.json b/2022/34xxx/CVE-2022-34918.json index 91b3df18908..3945fe32972 100644 --- a/2022/34xxx/CVE-2022-34918.json +++ b/2022/34xxx/CVE-2022-34918.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20220826-0004/", + "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" } ] } diff --git a/2022/38xxx/CVE-2022-38774.json b/2022/38xxx/CVE-2022-38774.json new file mode 100644 index 00000000000..8b23c9162f9 --- /dev/null +++ b/2022/38xxx/CVE-2022-38774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38775.json b/2022/38xxx/CVE-2022-38775.json new file mode 100644 index 00000000000..820d617fee0 --- /dev/null +++ b/2022/38xxx/CVE-2022-38775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38776.json b/2022/38xxx/CVE-2022-38776.json new file mode 100644 index 00000000000..9498c21f99f --- /dev/null +++ b/2022/38xxx/CVE-2022-38776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38777.json b/2022/38xxx/CVE-2022-38777.json new file mode 100644 index 00000000000..5fcf899245d --- /dev/null +++ b/2022/38xxx/CVE-2022-38777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38778.json b/2022/38xxx/CVE-2022-38778.json new file mode 100644 index 00000000000..581a838e96b --- /dev/null +++ b/2022/38xxx/CVE-2022-38778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38779.json b/2022/38xxx/CVE-2022-38779.json new file mode 100644 index 00000000000..ef9c3be5181 --- /dev/null +++ b/2022/38xxx/CVE-2022-38779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38780.json b/2022/38xxx/CVE-2022-38780.json new file mode 100644 index 00000000000..b63b93526c2 --- /dev/null +++ b/2022/38xxx/CVE-2022-38780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38781.json b/2022/38xxx/CVE-2022-38781.json new file mode 100644 index 00000000000..39a567233af --- /dev/null +++ b/2022/38xxx/CVE-2022-38781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38782.json b/2022/38xxx/CVE-2022-38782.json new file mode 100644 index 00000000000..dcec74108d5 --- /dev/null +++ b/2022/38xxx/CVE-2022-38782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/38xxx/CVE-2022-38783.json b/2022/38xxx/CVE-2022-38783.json new file mode 100644 index 00000000000..e2205ab89c3 --- /dev/null +++ b/2022/38xxx/CVE-2022-38783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-38783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3010.json b/2022/3xxx/CVE-2022-3010.json new file mode 100644 index 00000000000..e2fc46636b7 --- /dev/null +++ b/2022/3xxx/CVE-2022-3010.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-3010", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file