diff --git a/2020/4xxx/CVE-2020-4301.json b/2020/4xxx/CVE-2020-4301.json index 5f23d3a302d..15cbfeb3041 100644 --- a/2020/4xxx/CVE-2020-4301.json +++ b/2020/4xxx/CVE-2020-4301.json @@ -20,6 +20,11 @@ "refsource": "XF", "title": "X-Force Vulnerability Report", "name": "ibm-cognos-cve20204301-csrf (176609)" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] }, diff --git a/2021/20xxx/CVE-2021-20468.json b/2021/20xxx/CVE-2021-20468.json index 7b9b8314280..a3677d35d05 100644 --- a/2021/20xxx/CVE-2021-20468.json +++ b/2021/20xxx/CVE-2021-20468.json @@ -21,6 +21,11 @@ "name": "ibm-cognos-cve202120468-csrf (196825)", "title": "X-Force Vulnerability Report", "refsource": "XF" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] }, diff --git a/2021/29xxx/CVE-2021-29823.json b/2021/29xxx/CVE-2021-29823.json index 04ea08ed036..3d7ff48924e 100644 --- a/2021/29xxx/CVE-2021-29823.json +++ b/2021/29xxx/CVE-2021-29823.json @@ -20,6 +20,11 @@ "refsource": "XF", "name": "ibm-cognos-cve202129823-csrf (204465)", "title": "X-Force Vulnerability Report" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] }, diff --git a/2021/39xxx/CVE-2021-39009.json b/2021/39xxx/CVE-2021-39009.json index 0915403babe..00b2893b33d 100644 --- a/2021/39xxx/CVE-2021-39009.json +++ b/2021/39xxx/CVE-2021-39009.json @@ -90,6 +90,11 @@ "title": "X-Force Vulnerability Report", "name": "ibm-cognos-cve202139009-info-disc (213554)", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/213554" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] } diff --git a/2021/39xxx/CVE-2021-39045.json b/2021/39xxx/CVE-2021-39045.json index c39502bfa5d..c289b46dd36 100644 --- a/2021/39xxx/CVE-2021-39045.json +++ b/2021/39xxx/CVE-2021-39045.json @@ -90,6 +90,11 @@ "name": "ibm-cognos-cve202139045-info-disc (214345)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/214345" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] } diff --git a/2021/3xxx/CVE-2021-3807.json b/2021/3xxx/CVE-2021-3807.json index 408d5cf7625..b9fdd724edb 100644 --- a/2021/3xxx/CVE-2021-3807.json +++ b/2021/3xxx/CVE-2021-3807.json @@ -92,6 +92,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0002/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0002/" } ] }, diff --git a/2021/43xxx/CVE-2021-43466.json b/2021/43xxx/CVE-2021-43466.json index 2f63cf4f1b0..56f632596ae 100644 --- a/2021/43xxx/CVE-2021-43466.json +++ b/2021/43xxx/CVE-2021-43466.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://vuldb.com/?id.186365", "url": "https://vuldb.com/?id.186365" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0001/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0001/" } ] } diff --git a/2022/1xxx/CVE-2022-1259.json b/2022/1xxx/CVE-2022-1259.json index 74a6a272e73..74d8144ba60 100644 --- a/2022/1xxx/CVE-2022-1259.json +++ b/2022/1xxx/CVE-2022-1259.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2022-1259", "url": "https://access.redhat.com/security/cve/CVE-2022-1259" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0006/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0006/" } ] }, diff --git a/2022/1xxx/CVE-2022-1319.json b/2022/1xxx/CVE-2022-1319.json index bcb707d4072..60af7c71ef5 100644 --- a/2022/1xxx/CVE-2022-1319.json +++ b/2022/1xxx/CVE-2022-1319.json @@ -68,6 +68,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2022-1319", "url": "https://access.redhat.com/security/cve/CVE-2022-1319" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0006/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0006/" } ] }, diff --git a/2022/1xxx/CVE-2022-1354.json b/2022/1xxx/CVE-2022-1354.json index b4883ecdfae..733efeef447 100644 --- a/2022/1xxx/CVE-2022-1354.json +++ b/2022/1xxx/CVE-2022-1354.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2022-1354", "url": "https://access.redhat.com/security/cve/CVE-2022-1354" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0007/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0007/" } ] }, diff --git a/2022/1xxx/CVE-2022-1355.json b/2022/1xxx/CVE-2022-1355.json index eed62c5ea21..1e329cb4696 100644 --- a/2022/1xxx/CVE-2022-1355.json +++ b/2022/1xxx/CVE-2022-1355.json @@ -63,6 +63,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2022-1355", "url": "https://access.redhat.com/security/cve/CVE-2022-1355" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0007/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0007/" } ] }, diff --git a/2022/28xxx/CVE-2022-28697.json b/2022/28xxx/CVE-2022-28697.json index 6e5afe321a3..b1e964d50b9 100644 --- a/2022/28xxx/CVE-2022-28697.json +++ b/2022/28xxx/CVE-2022-28697.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0004/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] }, diff --git a/2022/2xxx/CVE-2022-2764.json b/2022/2xxx/CVE-2022-2764.json index 62d245491ee..42b76aec25a 100644 --- a/2022/2xxx/CVE-2022-2764.json +++ b/2022/2xxx/CVE-2022-2764.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117506" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0006/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0006/" } ] }, diff --git a/2022/2xxx/CVE-2022-2953.json b/2022/2xxx/CVE-2022-2953.json index 0f317f29cf4..5855887d5cf 100644 --- a/2022/2xxx/CVE-2022-2953.json +++ b/2022/2xxx/CVE-2022-2953.json @@ -58,6 +58,11 @@ "name": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json", "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2953.json", "refsource": "CONFIRM" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0008/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0008/" } ] }, diff --git a/2022/30xxx/CVE-2022-30601.json b/2022/30xxx/CVE-2022-30601.json index 8ed341928b8..69ffe1fb507 100644 --- a/2022/30xxx/CVE-2022-30601.json +++ b/2022/30xxx/CVE-2022-30601.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0004/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] }, diff --git a/2022/30xxx/CVE-2022-30614.json b/2022/30xxx/CVE-2022-30614.json index fb46ce69d9b..81882f27cd7 100644 --- a/2022/30xxx/CVE-2022-30614.json +++ b/2022/30xxx/CVE-2022-30614.json @@ -12,6 +12,11 @@ "refsource": "XF", "name": "ibm-cognos-cve202230614-dos (227591)", "title": "X-Force Vulnerability Report" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] }, diff --git a/2022/30xxx/CVE-2022-30944.json b/2022/30xxx/CVE-2022-30944.json index af9e5083c60..3fbfee87a14 100644 --- a/2022/30xxx/CVE-2022-30944.json +++ b/2022/30xxx/CVE-2022-30944.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0004/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] }, diff --git a/2022/31xxx/CVE-2022-31129.json b/2022/31xxx/CVE-2022-31129.json index 3ed7df4c801..8fd1155170b 100644 --- a/2022/31xxx/CVE-2022-31129.json +++ b/2022/31xxx/CVE-2022-31129.json @@ -108,6 +108,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-798fd95813", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMX5YHELQVCGKKQVFXIYOTBMN23YYSRO/" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0003/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0003/" } ] }, diff --git a/2022/36xxx/CVE-2022-36773.json b/2022/36xxx/CVE-2022-36773.json index ec79568c820..acf7ad404bf 100644 --- a/2022/36xxx/CVE-2022-36773.json +++ b/2022/36xxx/CVE-2022-36773.json @@ -90,6 +90,11 @@ "title": "X-Force Vulnerability Report", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/233571" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20221014-0005/", + "url": "https://security.netapp.com/advisory/ntap-20221014-0005/" } ] }