diff --git a/2022/2xxx/CVE-2022-2327.json b/2022/2xxx/CVE-2022-2327.json index 7a636899b1a..11dcb71b0e0 100644 --- a/2022/2xxx/CVE-2022-2327.json +++ b/2022/2xxx/CVE-2022-2327.json @@ -82,6 +82,11 @@ "refsource": "MISC", "url": "https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859", "name": "https://kernel.dance/#df3f3bb5059d20ef094d6b2f0256c4bf4127a859" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0009/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0009/" } ] }, diff --git a/2022/2xxx/CVE-2022-2601.json b/2022/2xxx/CVE-2022-2601.json index 221cc26ef13..7f35abdc330 100644 --- a/2022/2xxx/CVE-2022-2601.json +++ b/2022/2xxx/CVE-2022-2601.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0004/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0004/" } ] }, diff --git a/2022/3xxx/CVE-2022-3570.json b/2022/3xxx/CVE-2022-3570.json index 5584da48480..d02c1aed870 100644 --- a/2022/3xxx/CVE-2022-3570.json +++ b/2022/3xxx/CVE-2022-3570.json @@ -73,6 +73,11 @@ "refsource": "DEBIAN", "name": "DSA-5333", "url": "https://www.debian.org/security/2023/dsa-5333" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0002/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0002/" } ] }, diff --git a/2022/42xxx/CVE-2022-42719.json b/2022/42xxx/CVE-2022-42719.json index ee8f76eb5e5..d15d6fed84e 100644 --- a/2022/42xxx/CVE-2022-42719.json +++ b/2022/42xxx/CVE-2022-42719.json @@ -96,6 +96,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0008/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0008/" } ] } diff --git a/2022/42xxx/CVE-2022-42720.json b/2022/42xxx/CVE-2022-42720.json index e972d2690fc..51ed42732d2 100644 --- a/2022/42xxx/CVE-2022-42720.json +++ b/2022/42xxx/CVE-2022-42720.json @@ -96,6 +96,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html", "url": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0008/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0008/" } ] } diff --git a/2022/42xxx/CVE-2022-42721.json b/2022/42xxx/CVE-2022-42721.json index 965e9bc3609..6ebc36b1dd6 100644 --- a/2022/42xxx/CVE-2022-42721.json +++ b/2022/42xxx/CVE-2022-42721.json @@ -96,6 +96,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html", "url": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0008/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0008/" } ] } diff --git a/2022/42xxx/CVE-2022-42722.json b/2022/42xxx/CVE-2022-42722.json index 550e0a39a01..757aa987213 100644 --- a/2022/42xxx/CVE-2022-42722.json +++ b/2022/42xxx/CVE-2022-42722.json @@ -96,6 +96,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html", "url": "http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0008/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0008/" } ] } diff --git a/2022/46xxx/CVE-2022-46908.json b/2022/46xxx/CVE-2022-46908.json index aa37a7e92a4..bee52faedf0 100644 --- a/2022/46xxx/CVE-2022-46908.json +++ b/2022/46xxx/CVE-2022-46908.json @@ -66,6 +66,11 @@ "url": "https://sqlite.org/src/info/cefc032473ac5ad2", "refsource": "MISC", "name": "https://sqlite.org/src/info/cefc032473ac5ad2" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0005/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0005/" } ] } diff --git a/2022/4xxx/CVE-2022-4293.json b/2022/4xxx/CVE-2022-4293.json index a4f47efc438..232de779105 100644 --- a/2022/4xxx/CVE-2022-4293.json +++ b/2022/4xxx/CVE-2022-4293.json @@ -1,89 +1,94 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-4293", - "STATE": "PUBLIC", - "TITLE": "Floating Point Comparison with Incorrect Operator in vim/vim" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "vim/vim", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "9.0.0804" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-4293", + "STATE": "PUBLIC", + "TITLE": "Floating Point Comparison with Incorrect Operator in vim/vim" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "vim/vim", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "9.0.0804" + } + ] + } + } + ] + }, + "vendor_name": "vim" } - } ] - }, - "vendor_name": "vim" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "LOCAL", - "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-1077 Floating Point Comparison with Incorrect Operator" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143" - }, - { - "name": "https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b", - "refsource": "MISC", - "url": "https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b" - } - ] - }, - "source": { - "advisory": "385a835f-6e33-4d00-acce-ac99f3939143", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1077 Floating Point Comparison with Incorrect Operator" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143" + }, + { + "name": "https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b", + "refsource": "MISC", + "url": "https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b" + }, + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20230203-0007/", + "url": "https://security.netapp.com/advisory/ntap-20230203-0007/" + } + ] + }, + "source": { + "advisory": "385a835f-6e33-4d00-acce-ac99f3939143", + "discovery": "EXTERNAL" + } } \ No newline at end of file