diff --git a/2012/5xxx/CVE-2012-5351.json b/2012/5xxx/CVE-2012-5351.json index 015410e9c6f6..55dbf8dc670b 100644 --- a/2012/5xxx/CVE-2012-5351.json +++ b/2012/5xxx/CVE-2012-5351.json @@ -66,6 +66,11 @@ "name": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf", "refsource": "MISC", "url": "http://www.nds.rub.de/media/nds/veroeffentlichungen/2012/08/22/BreakingSAML_3.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2017/7xxx/CVE-2017-7536.json b/2017/7xxx/CVE-2017-7536.json index caae82093040..f0c5c289e736 100644 --- a/2017/7xxx/CVE-2017-7536.json +++ b/2017/7xxx/CVE-2017-7536.json @@ -153,6 +153,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2018/1xxx/CVE-2018-1273.json b/2018/1xxx/CVE-2018-1273.json index 531a64587881..7d60e1daa17d 100644 --- a/2018/1xxx/CVE-2018-1273.json +++ b/2018/1xxx/CVE-2018-1273.json @@ -67,6 +67,11 @@ "name": "https://pivotal.io/security/cve-2018-1273", "refsource": "CONFIRM", "url": "https://pivotal.io/security/cve-2018-1273" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2018/21xxx/CVE-2018-21010.json b/2018/21xxx/CVE-2018-21010.json index bb7661b07b37..31b724c84a4c 100644 --- a/2018/21xxx/CVE-2018-21010.json +++ b/2018/21xxx/CVE-2018-21010.json @@ -71,6 +71,11 @@ "url": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea", "refsource": "MISC", "name": "https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2018/25xxx/CVE-2018-25032.json b/2018/25xxx/CVE-2018-25032.json index d88ab4bf6f49..d1d39879d266 100644 --- a/2018/25xxx/CVE-2018-25032.json +++ b/2018/25xxx/CVE-2018-25032.json @@ -196,6 +196,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2018/7xxx/CVE-2018-7489.json b/2018/7xxx/CVE-2018-7489.json index 8f907aca445d..5d24d4184e82 100644 --- a/2018/7xxx/CVE-2018-7489.json +++ b/2018/7xxx/CVE-2018-7489.json @@ -191,6 +191,11 @@ "refsource": "MLIST", "name": "[druid-commits] 20210324 [GitHub] [druid] jihoonson opened a new pull request #11030: Suppress cves", "url": "https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2019/12xxx/CVE-2019-12402.json b/2019/12xxx/CVE-2019-12402.json index b3eb72775c1d..25a29c4eb8d1 100644 --- a/2019/12xxx/CVE-2019-12402.json +++ b/2019/12xxx/CVE-2019-12402.json @@ -188,6 +188,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12415.json b/2019/12xxx/CVE-2019-12415.json index e60933d1935f..a6848d82a509 100644 --- a/2019/12xxx/CVE-2019-12415.json +++ b/2019/12xxx/CVE-2019-12415.json @@ -108,6 +108,11 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2019/12xxx/CVE-2019-12973.json b/2019/12xxx/CVE-2019-12973.json index 689c6f948b9d..abdee0207cab 100644 --- a/2019/12xxx/CVE-2019-12973.json +++ b/2019/12xxx/CVE-2019-12973.json @@ -96,6 +96,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index 6eee9b1bf031..77f9747a73d1 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -608,6 +608,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2019/7xxx/CVE-2019-7317.json b/2019/7xxx/CVE-2019-7317.json index 97690526e168..00bf8b631344 100644 --- a/2019/7xxx/CVE-2019-7317.json +++ b/2019/7xxx/CVE-2019-7317.json @@ -261,6 +261,11 @@ "url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/0xxx/CVE-2020-0466.json b/2020/0xxx/CVE-2020-0466.json index abd15f80284a..8b5347a36293 100644 --- a/2020/0xxx/CVE-2020-0466.json +++ b/2020/0xxx/CVE-2020-0466.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://source.android.com/security/bulletin/2020-12-01", "url": "https://source.android.com/security/bulletin/2020-12-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10543.json b/2020/10xxx/CVE-2020-10543.json index 1bea1884141d..af828b5619b8 100644 --- a/2020/10xxx/CVE-2020-10543.json +++ b/2020/10xxx/CVE-2020-10543.json @@ -121,6 +121,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/10xxx/CVE-2020-10683.json b/2020/10xxx/CVE-2020-10683.json index cb986bb767cc..1fdd7fc8a6bd 100644 --- a/2020/10xxx/CVE-2020-10683.json +++ b/2020/10xxx/CVE-2020-10683.json @@ -151,6 +151,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/10xxx/CVE-2020-10693.json b/2020/10xxx/CVE-2020-10693.json index 1bf377265aad..11c5ad457c64 100644 --- a/2020/10xxx/CVE-2020-10693.json +++ b/2020/10xxx/CVE-2020-10693.json @@ -68,6 +68,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10693", "refsource": "CONFIRM" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/10xxx/CVE-2020-10735.json b/2020/10xxx/CVE-2020-10735.json index caef6a86e9d5..6b619f3cc932 100644 --- a/2020/10xxx/CVE-2020-10735.json +++ b/2020/10xxx/CVE-2020-10735.json @@ -182,6 +182,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/10xxx/CVE-2020-10878.json b/2020/10xxx/CVE-2020-10878.json index 5c9a928006ee..4c491de4679c 100644 --- a/2020/10xxx/CVE-2020-10878.json +++ b/2020/10xxx/CVE-2020-10878.json @@ -126,6 +126,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/11xxx/CVE-2020-11979.json b/2020/11xxx/CVE-2020-11979.json index 66fd30892f82..1f6d4e269c19 100644 --- a/2020/11xxx/CVE-2020-11979.json +++ b/2020/11xxx/CVE-2020-11979.json @@ -154,6 +154,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/11xxx/CVE-2020-11987.json b/2020/11xxx/CVE-2020-11987.json index 74126170b8f8..41f0166808a9 100644 --- a/2020/11xxx/CVE-2020-11987.json +++ b/2020/11xxx/CVE-2020-11987.json @@ -93,6 +93,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/12xxx/CVE-2020-12723.json b/2020/12xxx/CVE-2020-12723.json index 7a73f1a7b1cc..ba0a17d7ac84 100644 --- a/2020/12xxx/CVE-2020-12723.json +++ b/2020/12xxx/CVE-2020-12723.json @@ -131,6 +131,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/13xxx/CVE-2020-13920.json b/2020/13xxx/CVE-2020-13920.json index 988388a8e15b..ed478dc24811 100644 --- a/2020/13xxx/CVE-2020-13920.json +++ b/2020/13xxx/CVE-2020-13920.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[activemq-commits] 20210208 [activemq-website] branch master updated: Publish CVE-2020-13947", "url": "https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/13xxx/CVE-2020-13956.json b/2020/13xxx/CVE-2020-13956.json index 886835935ce1..c79143848170 100644 --- a/2020/13xxx/CVE-2020-13956.json +++ b/2020/13xxx/CVE-2020-13956.json @@ -358,6 +358,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220210-0002/", "url": "https://security.netapp.com/advisory/ntap-20220210-0002/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14392.json b/2020/14xxx/CVE-2020-14392.json index e21aabe4f080..0091b0383ec0 100644 --- a/2020/14xxx/CVE-2020-14392.json +++ b/2020/14xxx/CVE-2020-14392.json @@ -78,6 +78,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2386-1] libdbi-perl security update", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/14xxx/CVE-2020-14393.json b/2020/14xxx/CVE-2020-14393.json index e773f75160dd..7864d8eafd6c 100644 --- a/2020/14xxx/CVE-2020-14393.json +++ b/2020/14xxx/CVE-2020-14393.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20200928 [SECURITY] [DLA 2386-1] libdbi-perl security update", "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/15xxx/CVE-2020-15250.json b/2020/15xxx/CVE-2020-15250.json index d423e8dc30cb..ba2a3528bfb6 100644 --- a/2020/15xxx/CVE-2020-15250.json +++ b/2020/15xxx/CVE-2020-15250.json @@ -263,6 +263,11 @@ "url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/15xxx/CVE-2020-15389.json b/2020/15xxx/CVE-2020-15389.json index a59d0dbf96f7..839a6b19676a 100644 --- a/2020/15xxx/CVE-2020-15389.json +++ b/2020/15xxx/CVE-2020-15389.json @@ -86,6 +86,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/16xxx/CVE-2020-16156.json b/2020/16xxx/CVE-2020-16156.json index 66c503e6a13a..4ac418239952 100644 --- a/2020/16xxx/CVE-2020-16156.json +++ b/2020/16xxx/CVE-2020-16156.json @@ -76,6 +76,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-84fd87f7eb", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/27xxx/CVE-2020-27814.json b/2020/27xxx/CVE-2020-27814.json index abc584ffb07b..4e91e16c1229 100644 --- a/2020/27xxx/CVE-2020-27814.json +++ b/2020/27xxx/CVE-2020-27814.json @@ -73,6 +73,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27841.json b/2020/27xxx/CVE-2020-27841.json index 6a31311dbf7d..a87dec709eb3 100644 --- a/2020/27xxx/CVE-2020-27841.json +++ b/2020/27xxx/CVE-2020-27841.json @@ -78,6 +78,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27842.json b/2020/27xxx/CVE-2020-27842.json index 0a69b930c314..fb223cde9a0d 100644 --- a/2020/27xxx/CVE-2020-27842.json +++ b/2020/27xxx/CVE-2020-27842.json @@ -78,6 +78,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220410 [SECURITY] [DLA 2975-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27843.json b/2020/27xxx/CVE-2020-27843.json index a88ba40125a9..ca8c02374736 100644 --- a/2020/27xxx/CVE-2020-27843.json +++ b/2020/27xxx/CVE-2020-27843.json @@ -78,6 +78,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220410 [SECURITY] [DLA 2975-1] openjpeg2 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27844.json b/2020/27xxx/CVE-2020-27844.json index 08ed97f1a7cf..76484f178478 100644 --- a/2020/27xxx/CVE-2020-27844.json +++ b/2020/27xxx/CVE-2020-27844.json @@ -68,6 +68,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/27xxx/CVE-2020-27845.json b/2020/27xxx/CVE-2020-27845.json index 66395591ac88..89c8d6153ec8 100644 --- a/2020/27xxx/CVE-2020-27845.json +++ b/2020/27xxx/CVE-2020-27845.json @@ -78,6 +78,11 @@ "url": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "name": "https://www.oracle.com//security-alerts/cpujul2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2020/36xxx/CVE-2020-36242.json b/2020/36xxx/CVE-2020-36242.json index 91dee2c735a7..dfe9bad09d94 100644 --- a/2020/36xxx/CVE-2020-36242.json +++ b/2020/36xxx/CVE-2020-36242.json @@ -81,6 +81,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/36xxx/CVE-2020-36518.json b/2020/36xxx/CVE-2020-36518.json index b22ff3f86b9a..dc110bb56d8b 100644 --- a/2020/36xxx/CVE-2020-36518.json +++ b/2020/36xxx/CVE-2020-36518.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2020/5xxx/CVE-2020-5408.json b/2020/5xxx/CVE-2020-5408.json index fc8c0bb2a3ab..b5313bb81ea9 100644 --- a/2020/5xxx/CVE-2020-5408.json +++ b/2020/5xxx/CVE-2020-5408.json @@ -98,6 +98,11 @@ "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuApr2021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/0xxx/CVE-2021-0920.json b/2021/0xxx/CVE-2021-0920.json index d58fb17fa6f7..9470c23a65a7 100644 --- a/2021/0xxx/CVE-2021-0920.json +++ b/2021/0xxx/CVE-2021-0920.json @@ -53,6 +53,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update", "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21290.json b/2021/21xxx/CVE-2021-21290.json index 2df17932e255..f7b5740538a5 100644 --- a/2021/21xxx/CVE-2021-21290.json +++ b/2021/21xxx/CVE-2021-21290.json @@ -271,6 +271,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220210-0011/", "url": "https://security.netapp.com/advisory/ntap-20220210-0011/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/21xxx/CVE-2021-21708.json b/2021/21xxx/CVE-2021-21708.json index 947d2ad79c7e..6df6aff6c05f 100644 --- a/2021/21xxx/CVE-2021-21708.json +++ b/2021/21xxx/CVE-2021-21708.json @@ -105,6 +105,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-20", "url": "https://security.gentoo.org/glsa/202209-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/23xxx/CVE-2021-23358.json b/2021/23xxx/CVE-2021-23358.json index ea0c13cef750..69c201288101 100644 --- a/2021/23xxx/CVE-2021-23358.json +++ b/2021/23xxx/CVE-2021-23358.json @@ -133,6 +133,11 @@ "refsource": "FEDORA", "name": "FEDORA-2021-f278299902", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/26xxx/CVE-2021-26291.json b/2021/26xxx/CVE-2021-26291.json index b74cc23d4e17..5d213d4224ea 100644 --- a/2021/26xxx/CVE-2021-26291.json +++ b/2021/26xxx/CVE-2021-26291.json @@ -283,6 +283,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/29xxx/CVE-2021-29338.json b/2021/29xxx/CVE-2021-29338.json index b3b52543c5f4..041583791f2e 100644 --- a/2021/29xxx/CVE-2021-29338.json +++ b/2021/29xxx/CVE-2021-29338.json @@ -76,6 +76,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-04", "url": "https://security.gentoo.org/glsa/202209-04" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/29xxx/CVE-2021-29425.json b/2021/29xxx/CVE-2021-29425.json index 3c5aa41bbeb5..7f82e9c2c290 100644 --- a/2021/29xxx/CVE-2021-29425.json +++ b/2021/29xxx/CVE-2021-29425.json @@ -312,6 +312,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/30xxx/CVE-2021-30641.json b/2021/30xxx/CVE-2021-30641.json index 79dbc85a3753..b8b8aa783362 100644 --- a/2021/30xxx/CVE-2021-30641.json +++ b/2021/30xxx/CVE-2021-30641.json @@ -143,6 +143,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210702-0001/", "url": "https://security.netapp.com/advisory/ntap-20210702-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31805.json b/2021/31xxx/CVE-2021-31805.json index df8ef2e5e4ec..218a6e319a12 100644 --- a/2021/31xxx/CVE-2021-31805.json +++ b/2021/31xxx/CVE-2021-31805.json @@ -84,6 +84,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220420-0001/", "url": "https://security.netapp.com/advisory/ntap-20220420-0001/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31811.json b/2021/31xxx/CVE-2021-31811.json index eb9723260c26..ddc01e838b57 100644 --- a/2021/31xxx/CVE-2021-31811.json +++ b/2021/31xxx/CVE-2021-31811.json @@ -153,6 +153,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/31xxx/CVE-2021-31812.json b/2021/31xxx/CVE-2021-31812.json index 9cbef5ab28c6..90c6df99d4ec 100644 --- a/2021/31xxx/CVE-2021-31812.json +++ b/2021/31xxx/CVE-2021-31812.json @@ -148,6 +148,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35515.json b/2021/35xxx/CVE-2021-35515.json index 556b13ad6a1c..f5e2fba2e059 100644 --- a/2021/35xxx/CVE-2021-35515.json +++ b/2021/35xxx/CVE-2021-35515.json @@ -178,6 +178,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35516.json b/2021/35xxx/CVE-2021-35516.json index 8c2fe3de1cb5..5c47f05d100d 100644 --- a/2021/35xxx/CVE-2021-35516.json +++ b/2021/35xxx/CVE-2021-35516.json @@ -163,6 +163,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/35xxx/CVE-2021-35517.json b/2021/35xxx/CVE-2021-35517.json index 366586639fe1..5135e5d4ee38 100644 --- a/2021/35xxx/CVE-2021-35517.json +++ b/2021/35xxx/CVE-2021-35517.json @@ -56,7 +56,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -181,6 +182,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36090.json b/2021/36xxx/CVE-2021-36090.json index de98856822a6..db552788ab5f 100644 --- a/2021/36xxx/CVE-2021-36090.json +++ b/2021/36xxx/CVE-2021-36090.json @@ -51,7 +51,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -236,6 +237,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/36xxx/CVE-2021-36483.json b/2021/36xxx/CVE-2021-36483.json index b51be1087881..c1419fe15ac1 100644 --- a/2021/36xxx/CVE-2021-36483.json +++ b/2021/36xxx/CVE-2021-36483.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-341/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/36xxx/CVE-2021-36770.json b/2021/36xxx/CVE-2021-36770.json index 46b180761cb3..679b0baeee7f 100644 --- a/2021/36xxx/CVE-2021-36770.json +++ b/2021/36xxx/CVE-2021-36770.json @@ -91,6 +91,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20210909-0003/", "url": "https://security.netapp.com/advisory/ntap-20210909-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/37xxx/CVE-2021-37533.json b/2021/37xxx/CVE-2021-37533.json index 83b48fe59bcb..5999a6a2bf2f 100644 --- a/2021/37xxx/CVE-2021-37533.json +++ b/2021/37xxx/CVE-2021-37533.json @@ -88,6 +88,11 @@ "refsource": "DEBIAN", "name": "DSA-5307", "url": "https://www.debian.org/security/2022/dsa-5307" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/37xxx/CVE-2021-37750.json b/2021/37xxx/CVE-2021-37750.json index aa72e9a07a00..478b037418d1 100644 --- a/2021/37xxx/CVE-2021-37750.json +++ b/2021/37xxx/CVE-2021-37750.json @@ -91,6 +91,11 @@ "refsource": "MISC", "name": "https://www.starwindsoftware.com/security/sw-20220817-0004/", "url": "https://www.starwindsoftware.com/security/sw-20220817-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/3xxx/CVE-2021-3629.json b/2021/3xxx/CVE-2021-3629.json index e338cdd04c7c..4d8b0de3d0ae 100644 --- a/2021/3xxx/CVE-2021-3629.json +++ b/2021/3xxx/CVE-2021-3629.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220729-0008/", "url": "https://security.netapp.com/advisory/ntap-20220729-0008/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3737.json b/2021/3xxx/CVE-2021-3737.json index cfc3ae424462..13b54e1001b1 100644 --- a/2021/3xxx/CVE-2021-3737.json +++ b/2021/3xxx/CVE-2021-3737.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220407-0009/", "url": "https://security.netapp.com/advisory/ntap-20220407-0009/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/3xxx/CVE-2021-3918.json b/2021/3xxx/CVE-2021-3918.json index c7ddb7769338..4dbc04ef923f 100644 --- a/2021/3xxx/CVE-2021-3918.json +++ b/2021/3xxx/CVE-2021-3918.json @@ -84,6 +84,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221206 [SECURITY] [DLA 3228-1] node-json-schema security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/40xxx/CVE-2021-40528.json b/2021/40xxx/CVE-2021-40528.json index e9ba053c4637..525909a297ad 100644 --- a/2021/40xxx/CVE-2021-40528.json +++ b/2021/40xxx/CVE-2021-40528.json @@ -76,6 +76,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-13", "url": "https://security.gentoo.org/glsa/202210-13" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/41xxx/CVE-2021-41182.json b/2021/41xxx/CVE-2021-41182.json index 577b7ad7cc48..68a06792bfe3 100644 --- a/2021/41xxx/CVE-2021-41182.json +++ b/2021/41xxx/CVE-2021-41182.json @@ -128,6 +128,11 @@ "url": "https://www.drupal.org/sa-core-2022-002", "refsource": "MISC", "name": "https://www.drupal.org/sa-core-2022-002" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41183.json b/2021/41xxx/CVE-2021-41183.json index 62e775297500..65080adb7c90 100644 --- a/2021/41xxx/CVE-2021-41183.json +++ b/2021/41xxx/CVE-2021-41183.json @@ -138,6 +138,11 @@ "url": "https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4", "refsource": "MISC", "name": "https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41184.json b/2021/41xxx/CVE-2021-41184.json index 0d99f834937b..0c34acd47f13 100644 --- a/2021/41xxx/CVE-2021-41184.json +++ b/2021/41xxx/CVE-2021-41184.json @@ -118,6 +118,11 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/41xxx/CVE-2021-41411.json b/2021/41xxx/CVE-2021-41411.json index b27c798806cb..68f109af30b0 100644 --- a/2021/41xxx/CVE-2021-41411.json +++ b/2021/41xxx/CVE-2021-41411.json @@ -56,6 +56,11 @@ "url": "https://github.com/kiegroup/drools/pull/3808", "refsource": "MISC", "name": "https://github.com/kiegroup/drools/pull/3808" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/42xxx/CVE-2021-42717.json b/2021/42xxx/CVE-2021-42717.json index 7f07e56ae39e..5038010f3efd 100644 --- a/2021/42xxx/CVE-2021-42717.json +++ b/2021/42xxx/CVE-2021-42717.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20220528 [SECURITY] [DLA 3031-1] modsecurity-apache security update", "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00042.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2021/43xxx/CVE-2021-43797.json b/2021/43xxx/CVE-2021-43797.json index 1f2d1dd9380d..5ec2eecb039d 100644 --- a/2021/43xxx/CVE-2021-43797.json +++ b/2021/43xxx/CVE-2021-43797.json @@ -103,6 +103,11 @@ "refsource": "DEBIAN", "name": "DSA-5316", "url": "https://www.debian.org/security/2023/dsa-5316" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44228.json b/2021/44xxx/CVE-2021-44228.json index e86af6127a5a..e199e27ce224 100644 --- a/2021/44xxx/CVE-2021-44228.json +++ b/2021/44xxx/CVE-2021-44228.json @@ -384,6 +384,11 @@ "refsource": "FULLDISC", "name": "20221208 Intel Data Center Manager <= 5.1 Local Privileges Escalation", "url": "http://seclists.org/fulldisclosure/2022/Dec/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44531.json b/2021/44xxx/CVE-2021-44531.json index cadd95051371..2410619cd6f6 100644 --- a/2021/44xxx/CVE-2021-44531.json +++ b/2021/44xxx/CVE-2021-44531.json @@ -73,6 +73,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44532.json b/2021/44xxx/CVE-2021-44532.json index fe0365d1e6e3..6590e564795e 100644 --- a/2021/44xxx/CVE-2021-44532.json +++ b/2021/44xxx/CVE-2021-44532.json @@ -73,6 +73,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/44xxx/CVE-2021-44832.json b/2021/44xxx/CVE-2021-44832.json index fc8466d2b986..3695b6e7a9e7 100644 --- a/2021/44xxx/CVE-2021-44832.json +++ b/2021/44xxx/CVE-2021-44832.json @@ -155,6 +155,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/45xxx/CVE-2021-45105.json b/2021/45xxx/CVE-2021-45105.json index 2d42fd618ba2..b631e773b16d 100644 --- a/2021/45xxx/CVE-2021-45105.json +++ b/2021/45xxx/CVE-2021-45105.json @@ -166,6 +166,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4104.json b/2021/4xxx/CVE-2021-4104.json index 41ee26ae01ca..ff829119305e 100644 --- a/2021/4xxx/CVE-2021-4104.json +++ b/2021/4xxx/CVE-2021-4104.json @@ -45,7 +45,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -115,6 +116,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-02", "url": "https://security.gentoo.org/glsa/202209-02" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2021/4xxx/CVE-2021-4155.json b/2021/4xxx/CVE-2021-4155.json index 6227b34320e1..5e9896a331aa 100644 --- a/2021/4xxx/CVE-2021-4155.json +++ b/2021/4xxx/CVE-2021-4155.json @@ -68,6 +68,11 @@ "refsource": "MISC", "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0084.json b/2022/0xxx/CVE-2022-0084.json index fb93a6b3df10..f9ab98be287e 100644 --- a/2022/0xxx/CVE-2022-0084.json +++ b/2022/0xxx/CVE-2022-0084.json @@ -73,6 +73,11 @@ "url": "https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12", "refsource": "MISC", "name": "https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/0xxx/CVE-2022-0492.json b/2022/0xxx/CVE-2022-0492.json index 5c30e567dc4f..d7e39ec9c25a 100644 --- a/2022/0xxx/CVE-2022-0492.json +++ b/2022/0xxx/CVE-2022-0492.json @@ -88,6 +88,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html", "url": "http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/0xxx/CVE-2022-0934.json b/2022/0xxx/CVE-2022-0934.json index 6007e5e527d6..168a616eda96 100644 --- a/2022/0xxx/CVE-2022-0934.json +++ b/2022/0xxx/CVE-2022-0934.json @@ -73,6 +73,11 @@ "url": "https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3c3a4c28f27c3554f0611b39", "refsource": "MISC", "name": "https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=03345ecefeb0d82e3c3a4c28f27c3554f0611b39" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/1xxx/CVE-2022-1122.json b/2022/1xxx/CVE-2022-1122.json index da55383053a0..75f39ab70e31 100644 --- a/2022/1xxx/CVE-2022-1122.json +++ b/2022/1xxx/CVE-2022-1122.json @@ -83,6 +83,11 @@ "url": "https://security.gentoo.org/glsa/202209-04", "refsource": "MISC", "name": "https://security.gentoo.org/glsa/202209-04" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/1xxx/CVE-2022-1259.json b/2022/1xxx/CVE-2022-1259.json index 227ac94ee60a..bc7ef29d4658 100644 --- a/2022/1xxx/CVE-2022-1259.json +++ b/2022/1xxx/CVE-2022-1259.json @@ -68,6 +68,11 @@ "url": "https://security.netapp.com/advisory/ntap-20221014-0006/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20221014-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/1xxx/CVE-2022-1304.json b/2022/1xxx/CVE-2022-1304.json index e322747c327b..d7a7a7910e33 100644 --- a/2022/1xxx/CVE-2022-1304.json +++ b/2022/1xxx/CVE-2022-1304.json @@ -58,6 +58,11 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069726", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2069726" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/1xxx/CVE-2022-1319.json b/2022/1xxx/CVE-2022-1319.json index e80d1dea923a..0773da40c62d 100644 --- a/2022/1xxx/CVE-2022-1319.json +++ b/2022/1xxx/CVE-2022-1319.json @@ -83,6 +83,11 @@ "url": "https://security.netapp.com/advisory/ntap-20221014-0006/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20221014-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/1xxx/CVE-2022-1941.json b/2022/1xxx/CVE-2022-1941.json index 1127296f501d..500d1740d75a 100644 --- a/2022/1xxx/CVE-2022-1941.json +++ b/2022/1xxx/CVE-2022-1941.json @@ -155,6 +155,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-25f35ed634", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBAUKJQL6O4TIWYBENORSY5P43TVB4M3/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/21xxx/CVE-2022-21499.json b/2022/21xxx/CVE-2022-21499.json index dfb94362d46c..5b999f5a2a65 100644 --- a/2022/21xxx/CVE-2022-21499.json +++ b/2022/21xxx/CVE-2022-21499.json @@ -93,6 +93,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html", "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/21xxx/CVE-2022-21824.json b/2022/21xxx/CVE-2022-21824.json index 4fb360896fb6..df29b132d4d5 100644 --- a/2022/21xxx/CVE-2022-21824.json +++ b/2022/21xxx/CVE-2022-21824.json @@ -83,6 +83,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221005 [SECURITY] [DLA 3137-1] nodejs security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00006.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22721.json b/2022/22xxx/CVE-2022-22721.json index 5c06e88f9387..54f293337703 100644 --- a/2022/22xxx/CVE-2022-22721.json +++ b/2022/22xxx/CVE-2022-22721.json @@ -148,6 +148,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22950.json b/2022/22xxx/CVE-2022-22950.json index 0e1eeaa31f07..0c811e2ed81e 100644 --- a/2022/22xxx/CVE-2022-22950.json +++ b/2022/22xxx/CVE-2022-22950.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://tanzu.vmware.com/security/cve-2022-22950", "url": "https://tanzu.vmware.com/security/cve-2022-22950" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22965.json b/2022/22xxx/CVE-2022-22965.json index dab2f52d69c8..ae3a50217893 100644 --- a/2022/22xxx/CVE-2022-22965.json +++ b/2022/22xxx/CVE-2022-22965.json @@ -83,6 +83,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22970.json b/2022/22xxx/CVE-2022-22970.json index e8329f547f13..ea9c1b607f26 100644 --- a/2022/22xxx/CVE-2022-22970.json +++ b/2022/22xxx/CVE-2022-22970.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0006/", "url": "https://security.netapp.com/advisory/ntap-20220616-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22971.json b/2022/22xxx/CVE-2022-22971.json index 885d297e07c4..735be6c5c3b4 100644 --- a/2022/22xxx/CVE-2022-22971.json +++ b/2022/22xxx/CVE-2022-22971.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0003/", "url": "https://security.netapp.com/advisory/ntap-20220616-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22976.json b/2022/22xxx/CVE-2022-22976.json index c96d31348e4d..3b8baf3d541e 100644 --- a/2022/22xxx/CVE-2022-22976.json +++ b/2022/22xxx/CVE-2022-22976.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220707-0003/", "url": "https://security.netapp.com/advisory/ntap-20220707-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/22xxx/CVE-2022-22978.json b/2022/22xxx/CVE-2022-22978.json index c35cb86c7543..5104562f911b 100644 --- a/2022/22xxx/CVE-2022-22978.json +++ b/2022/22xxx/CVE-2022-22978.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220707-0003/", "url": "https://security.netapp.com/advisory/ntap-20220707-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23218.json b/2022/23xxx/CVE-2022-23218.json index 12b5e7ef4b63..60cadbb53e0d 100644 --- a/2022/23xxx/CVE-2022-23218.json +++ b/2022/23xxx/CVE-2022-23218.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/23xxx/CVE-2022-23219.json b/2022/23xxx/CVE-2022-23219.json index 0561d8b17932..5cf8313ecf81 100644 --- a/2022/23xxx/CVE-2022-23219.json +++ b/2022/23xxx/CVE-2022-23219.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/23xxx/CVE-2022-23221.json b/2022/23xxx/CVE-2022-23221.json index c5f79a4ad547..2c06247c0073 100644 --- a/2022/23xxx/CVE-2022-23221.json +++ b/2022/23xxx/CVE-2022-23221.json @@ -96,6 +96,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/23xxx/CVE-2022-23302.json b/2022/23xxx/CVE-2022-23302.json index 46cae5f3abd6..2b523afd22f9 100644 --- a/2022/23xxx/CVE-2022-23302.json +++ b/2022/23xxx/CVE-2022-23302.json @@ -101,6 +101,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23305.json b/2022/23xxx/CVE-2022-23305.json index 5ea35c68b2b5..42223c5cdbfe 100644 --- a/2022/23xxx/CVE-2022-23305.json +++ b/2022/23xxx/CVE-2022-23305.json @@ -101,6 +101,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23307.json b/2022/23xxx/CVE-2022-23307.json index aecec69720c3..d1581205a949 100644 --- a/2022/23xxx/CVE-2022-23307.json +++ b/2022/23xxx/CVE-2022-23307.json @@ -91,6 +91,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23308.json b/2022/23xxx/CVE-2022-23308.json index be7f40f1438b..7ea921be776e 100644 --- a/2022/23xxx/CVE-2022-23308.json +++ b/2022/23xxx/CVE-2022-23308.json @@ -146,6 +146,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-03", "url": "https://security.gentoo.org/glsa/202210-03" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/23xxx/CVE-2022-23437.json b/2022/23xxx/CVE-2022-23437.json index 209954724514..79282ed2499b 100644 --- a/2022/23xxx/CVE-2022-23437.json +++ b/2022/23xxx/CVE-2022-23437.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221028-0005/", "url": "https://security.netapp.com/advisory/ntap-20221028-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23457.json b/2022/23xxx/CVE-2022-23457.json index 965ad0f4ff04..d20e98772e86 100644 --- a/2022/23xxx/CVE-2022-23457.json +++ b/2022/23xxx/CVE-2022-23457.json @@ -98,6 +98,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230127-0014/", "url": "https://security.netapp.com/advisory/ntap-20230127-0014/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/23xxx/CVE-2022-23852.json b/2022/23xxx/CVE-2022-23852.json index cf2a3119a5e9..4ea95bd47e56 100644 --- a/2022/23xxx/CVE-2022-23852.json +++ b/2022/23xxx/CVE-2022-23852.json @@ -91,6 +91,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/23xxx/CVE-2022-23990.json b/2022/23xxx/CVE-2022-23990.json index 9bd3003d96e5..8c7d70253456 100644 --- a/2022/23xxx/CVE-2022-23990.json +++ b/2022/23xxx/CVE-2022-23990.json @@ -91,6 +91,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/24xxx/CVE-2022-24329.json b/2022/24xxx/CVE-2022-24329.json index 65a31acc6a95..2635e73e458b 100644 --- a/2022/24xxx/CVE-2022-24329.json +++ b/2022/24xxx/CVE-2022-24329.json @@ -71,6 +71,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/24xxx/CVE-2022-24407.json b/2022/24xxx/CVE-2022-24407.json index 7e54cb32050b..cc70111ed232 100644 --- a/2022/24xxx/CVE-2022-24407.json +++ b/2022/24xxx/CVE-2022-24407.json @@ -101,6 +101,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221007-0003/", "url": "https://security.netapp.com/advisory/ntap-20221007-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/24xxx/CVE-2022-24823.json b/2022/24xxx/CVE-2022-24823.json index 6bc462588047..7e384cfc3925 100644 --- a/2022/24xxx/CVE-2022-24823.json +++ b/2022/24xxx/CVE-2022-24823.json @@ -109,6 +109,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220616-0004/", "url": "https://security.netapp.com/advisory/ntap-20220616-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24839.json b/2022/24xxx/CVE-2022-24839.json index dade01d7bec6..e4cd6b73b896 100644 --- a/2022/24xxx/CVE-2022-24839.json +++ b/2022/24xxx/CVE-2022-24839.json @@ -83,6 +83,11 @@ "url": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2022.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24891.json b/2022/24xxx/CVE-2022-24891.json index 186fa9c23228..acb6540928c5 100644 --- a/2022/24xxx/CVE-2022-24891.json +++ b/2022/24xxx/CVE-2022-24891.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230127-0014/", "url": "https://security.netapp.com/advisory/ntap-20230127-0014/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/24xxx/CVE-2022-24903.json b/2022/24xxx/CVE-2022-24903.json index 454f53d62b35..e8fc980d0632 100644 --- a/2022/24xxx/CVE-2022-24903.json +++ b/2022/24xxx/CVE-2022-24903.json @@ -98,6 +98,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221111-0002/", "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25169.json b/2022/25xxx/CVE-2022-25169.json index 63b7785b587b..3267aa36a157 100644 --- a/2022/25xxx/CVE-2022-25169.json +++ b/2022/25xxx/CVE-2022-25169.json @@ -85,6 +85,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220804-0004/", "url": "https://security.netapp.com/advisory/ntap-20220804-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25235.json b/2022/25xxx/CVE-2022-25235.json index 7155ac1cf61d..e05ea1069694 100644 --- a/2022/25xxx/CVE-2022-25235.json +++ b/2022/25xxx/CVE-2022-25235.json @@ -101,6 +101,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/25xxx/CVE-2022-25236.json b/2022/25xxx/CVE-2022-25236.json index 915d8e336f2f..57d786416afe 100644 --- a/2022/25xxx/CVE-2022-25236.json +++ b/2022/25xxx/CVE-2022-25236.json @@ -106,6 +106,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/25xxx/CVE-2022-25313.json b/2022/25xxx/CVE-2022-25313.json index 538617b87c23..f14c64980d48 100644 --- a/2022/25xxx/CVE-2022-25313.json +++ b/2022/25xxx/CVE-2022-25313.json @@ -101,6 +101,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/25xxx/CVE-2022-25314.json b/2022/25xxx/CVE-2022-25314.json index 2c814ac564ca..c7a3e358f3b5 100644 --- a/2022/25xxx/CVE-2022-25314.json +++ b/2022/25xxx/CVE-2022-25314.json @@ -96,6 +96,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/25xxx/CVE-2022-25315.json b/2022/25xxx/CVE-2022-25315.json index b1aed586200e..6ff1fb1f814b 100644 --- a/2022/25xxx/CVE-2022-25315.json +++ b/2022/25xxx/CVE-2022-25315.json @@ -101,6 +101,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-24", "url": "https://security.gentoo.org/glsa/202209-24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/25xxx/CVE-2022-25647.json b/2022/25xxx/CVE-2022-25647.json index b4da1fc4027a..11d07d226604 100644 --- a/2022/25xxx/CVE-2022-25647.json +++ b/2022/25xxx/CVE-2022-25647.json @@ -86,6 +86,11 @@ "refsource": "DEBIAN", "name": "DSA-5227", "url": "https://www.debian.org/security/2022/dsa-5227" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/25xxx/CVE-2022-25857.json b/2022/25xxx/CVE-2022-25857.json index 71f839bb19fd..d0f70f6dad8d 100644 --- a/2022/25xxx/CVE-2022-25857.json +++ b/2022/25xxx/CVE-2022-25857.json @@ -75,6 +75,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/26xxx/CVE-2022-26336.json b/2022/26xxx/CVE-2022-26336.json index 2506ddf82827..3b45d06a616b 100644 --- a/2022/26xxx/CVE-2022-26336.json +++ b/2022/26xxx/CVE-2022-26336.json @@ -85,6 +85,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221028-0006/", "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/26xxx/CVE-2022-26377.json b/2022/26xxx/CVE-2022-26377.json index 2d0b21f6f5cf..3e6e0f124dba 100644 --- a/2022/26xxx/CVE-2022-26377.json +++ b/2022/26xxx/CVE-2022-26377.json @@ -98,6 +98,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27404.json b/2022/27xxx/CVE-2022-27404.json index 8087013b9187..de5ef1c4d153 100644 --- a/2022/27xxx/CVE-2022-27404.json +++ b/2022/27xxx/CVE-2022-27404.json @@ -81,6 +81,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-80e1724780", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/27xxx/CVE-2022-27405.json b/2022/27xxx/CVE-2022-27405.json index 33bea99cd2cd..7c0d368a9930 100644 --- a/2022/27xxx/CVE-2022-27405.json +++ b/2022/27xxx/CVE-2022-27405.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-80e1724780", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/27xxx/CVE-2022-27406.json b/2022/27xxx/CVE-2022-27406.json index 6b492fa70450..6fea093f51eb 100644 --- a/2022/27xxx/CVE-2022-27406.json +++ b/2022/27xxx/CVE-2022-27406.json @@ -86,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-80e1724780", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/27xxx/CVE-2022-27778.json b/2022/27xxx/CVE-2022-27778.json index bab2cf070953..6a18edf6d902 100644 --- a/2022/27xxx/CVE-2022-27778.json +++ b/2022/27xxx/CVE-2022-27778.json @@ -63,6 +63,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220729-0004/", "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27779.json b/2022/27xxx/CVE-2022-27779.json index 3a6c7aa25b09..21d588b45dda 100644 --- a/2022/27xxx/CVE-2022-27779.json +++ b/2022/27xxx/CVE-2022-27779.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27780.json b/2022/27xxx/CVE-2022-27780.json index b79def0d2808..b3d046e96c96 100644 --- a/2022/27xxx/CVE-2022-27780.json +++ b/2022/27xxx/CVE-2022-27780.json @@ -58,6 +58,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27781.json b/2022/27xxx/CVE-2022-27781.json index d95c95247347..a113088526e4 100644 --- a/2022/27xxx/CVE-2022-27781.json +++ b/2022/27xxx/CVE-2022-27781.json @@ -68,6 +68,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-01", "url": "https://security.gentoo.org/glsa/202212-01" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/27xxx/CVE-2022-27782.json b/2022/27xxx/CVE-2022-27782.json index c3d5b80f6e0a..0cc77f27c602 100644 --- a/2022/27xxx/CVE-2022-27782.json +++ b/2022/27xxx/CVE-2022-27782.json @@ -73,6 +73,11 @@ "refsource": "MLIST", "name": "[oss-security] 20230320 [SECURITY ADVISORY] curl: CVE-2023-27538: SSH connection too eager reuse still", "url": "http://www.openwall.com/lists/oss-security/2023/03/20/6" + }, + { + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", } ] }, diff --git a/2022/28xxx/CVE-2022-28614.json b/2022/28xxx/CVE-2022-28614.json index 831aa22dbc70..a7c701435b46 100644 --- a/2022/28xxx/CVE-2022-28614.json +++ b/2022/28xxx/CVE-2022-28614.json @@ -105,6 +105,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/28xxx/CVE-2022-28615.json b/2022/28xxx/CVE-2022-28615.json index bb21172e80ef..d4ea21be05cf 100644 --- a/2022/28xxx/CVE-2022-28615.json +++ b/2022/28xxx/CVE-2022-28615.json @@ -98,6 +98,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29404.json b/2022/29xxx/CVE-2022-29404.json index 6a24510d386b..43151c1bbd56 100644 --- a/2022/29xxx/CVE-2022-29404.json +++ b/2022/29xxx/CVE-2022-29404.json @@ -97,6 +97,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/29xxx/CVE-2022-29824.json b/2022/29xxx/CVE-2022-29824.json index 967cb1724a19..b55ffb293946 100644 --- a/2022/29xxx/CVE-2022-29824.json +++ b/2022/29xxx/CVE-2022-29824.json @@ -121,6 +121,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html", "url": "http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/29xxx/CVE-2022-29885.json b/2022/29xxx/CVE-2022-29885.json index 2b9b7df73e5a..6cd32e5cf2fb 100644 --- a/2022/29xxx/CVE-2022-29885.json +++ b/2022/29xxx/CVE-2022-29885.json @@ -108,6 +108,11 @@ "refsource": "DEBIAN", "name": "DSA-5265", "url": "https://www.debian.org/security/2022/dsa-5265" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2047.json b/2022/2xxx/CVE-2022-2047.json index a740189503c8..7352076769db 100644 --- a/2022/2xxx/CVE-2022-2047.json +++ b/2022/2xxx/CVE-2022-2047.json @@ -98,6 +98,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220901-0006/", "url": "https://security.netapp.com/advisory/ntap-20220901-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/2xxx/CVE-2022-2048.json b/2022/2xxx/CVE-2022-2048.json index c7813087746e..08b1e82fee0c 100644 --- a/2022/2xxx/CVE-2022-2048.json +++ b/2022/2xxx/CVE-2022-2048.json @@ -112,6 +112,11 @@ "refsource": "MLIST", "name": "[oss-security] 20220909 Vulnerability in Jenkins", "url": "http://www.openwall.com/lists/oss-security/2022/09/09/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/2xxx/CVE-2022-2053.json b/2022/2xxx/CVE-2022-2053.json index fb9ab3874fe1..6f8f541b32b1 100644 --- a/2022/2xxx/CVE-2022-2053.json +++ b/2022/2xxx/CVE-2022-2053.json @@ -53,6 +53,11 @@ "refsource": "MISC", "name": "https://issues.redhat.com/browse/UNDERTOW-2133", "url": "https://issues.redhat.com/browse/UNDERTOW-2133" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2068.json b/2022/2xxx/CVE-2022-2068.json index a63f6c6be27b..43ac87905a1e 100644 --- a/2022/2xxx/CVE-2022-2068.json +++ b/2022/2xxx/CVE-2022-2068.json @@ -117,6 +117,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/2xxx/CVE-2022-2097.json b/2022/2xxx/CVE-2022-2097.json index 000863e29c9c..5dfd4c9e5d92 100644 --- a/2022/2xxx/CVE-2022-2097.json +++ b/2022/2xxx/CVE-2022-2097.json @@ -124,6 +124,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230220 [SECURITY] [DLA 3325-1] openssl security update", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html" + }, + { + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", } ] } diff --git a/2022/2xxx/CVE-2022-2191.json b/2022/2xxx/CVE-2022-2191.json index a55d32d6880f..76906643fe2b 100644 --- a/2022/2xxx/CVE-2022-2191.json +++ b/2022/2xxx/CVE-2022-2191.json @@ -88,6 +88,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220909-0003/", "url": "https://security.netapp.com/advisory/ntap-20220909-0003/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/2xxx/CVE-2022-2274.json b/2022/2xxx/CVE-2022-2274.json index 664b7adec2a8..083695a9195c 100644 --- a/2022/2xxx/CVE-2022-2274.json +++ b/2022/2xxx/CVE-2022-2274.json @@ -86,6 +86,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220715-0010/", "url": "https://security.netapp.com/advisory/ntap-20220715-0010/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/2xxx/CVE-2022-2509.json b/2022/2xxx/CVE-2022-2509.json index a0faa75f7dbd..ebfd5fb0becc 100644 --- a/2022/2xxx/CVE-2022-2509.json +++ b/2022/2xxx/CVE-2022-2509.json @@ -68,6 +68,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-5470992bfc", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2526.json b/2022/2xxx/CVE-2022-2526.json index 82c5806d85ee..15e6495f0768 100644 --- a/2022/2xxx/CVE-2022-2526.json +++ b/2022/2xxx/CVE-2022-2526.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221111-0005/", "url": "https://security.netapp.com/advisory/ntap-20221111-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/2xxx/CVE-2022-2764.json b/2022/2xxx/CVE-2022-2764.json index a7eb970d253e..7abf86991455 100644 --- a/2022/2xxx/CVE-2022-2764.json +++ b/2022/2xxx/CVE-2022-2764.json @@ -63,6 +63,11 @@ "url": "https://security.netapp.com/advisory/ntap-20221014-0006/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20221014-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/30xxx/CVE-2022-30115.json b/2022/30xxx/CVE-2022-30115.json index e2acfbea3abb..d91c23aec349 100644 --- a/2022/30xxx/CVE-2022-30115.json +++ b/2022/30xxx/CVE-2022-30115.json @@ -68,6 +68,11 @@ "refsource": "MLIST", "name": "[oss-security] 20221221 curl: CVE-2022-43551: Another HSTS bypass via IDN", "url": "http://www.openwall.com/lists/oss-security/2022/12/21/1" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30126.json b/2022/30xxx/CVE-2022-30126.json index 13862a5b4d30..9acc421c160e 100644 --- a/2022/30xxx/CVE-2022-30126.json +++ b/2022/30xxx/CVE-2022-30126.json @@ -103,6 +103,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20220624-0004/", "url": "https://security.netapp.com/advisory/ntap-20220624-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30293.json b/2022/30xxx/CVE-2022-30293.json index 750b5c6a202d..a87bd8e06c1e 100644 --- a/2022/30xxx/CVE-2022-30293.json +++ b/2022/30xxx/CVE-2022-30293.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-39", "url": "https://security.gentoo.org/glsa/202208-39" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/30xxx/CVE-2022-30522.json b/2022/30xxx/CVE-2022-30522.json index 8793808c0d0e..0f0b15638ccb 100644 --- a/2022/30xxx/CVE-2022-30522.json +++ b/2022/30xxx/CVE-2022-30522.json @@ -97,6 +97,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/30xxx/CVE-2022-30556.json b/2022/30xxx/CVE-2022-30556.json index 24bbbe3ef56a..c84549cab248 100644 --- a/2022/30xxx/CVE-2022-30556.json +++ b/2022/30xxx/CVE-2022-30556.json @@ -97,6 +97,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31129.json b/2022/31xxx/CVE-2022-31129.json index e12621a52d68..680b01001665 100644 --- a/2022/31xxx/CVE-2022-31129.json +++ b/2022/31xxx/CVE-2022-31129.json @@ -118,6 +118,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230130 [SECURITY] [DLA 3295-1] node-moment security update", "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31625.json b/2022/31xxx/CVE-2022-31625.json index e3ecc189a077..f3947cac520e 100644 --- a/2022/31xxx/CVE-2022-31625.json +++ b/2022/31xxx/CVE-2022-31625.json @@ -139,6 +139,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31626.json b/2022/31xxx/CVE-2022-31626.json index e3ea70dc3549..f5d1a359b4f5 100644 --- a/2022/31xxx/CVE-2022-31626.json +++ b/2022/31xxx/CVE-2022-31626.json @@ -131,6 +131,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31627.json b/2022/31xxx/CVE-2022-31627.json index c2a972fc3d61..dbf3324930b3 100644 --- a/2022/31xxx/CVE-2022-31627.json +++ b/2022/31xxx/CVE-2022-31627.json @@ -95,6 +95,11 @@ "refsource": "GENTOO", "name": "GLSA-202209-20", "url": "https://security.gentoo.org/glsa/202209-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31628.json b/2022/31xxx/CVE-2022-31628.json index 9e169dc9a563..1ec9a069a335 100644 --- a/2022/31xxx/CVE-2022-31628.json +++ b/2022/31xxx/CVE-2022-31628.json @@ -130,6 +130,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31629.json b/2022/31xxx/CVE-2022-31629.json index f32f2a8cc958..657019d540f8 100644 --- a/2022/31xxx/CVE-2022-31629.json +++ b/2022/31xxx/CVE-2022-31629.json @@ -114,6 +114,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31690.json b/2022/31xxx/CVE-2022-31690.json index 2c72a45d5f52..577ed9d1892f 100644 --- a/2022/31xxx/CVE-2022-31690.json +++ b/2022/31xxx/CVE-2022-31690.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221215-0010/", "url": "https://security.netapp.com/advisory/ntap-20221215-0010/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31692.json b/2022/31xxx/CVE-2022-31692.json index 05e8f98f29f3..1bbd8354409b 100644 --- a/2022/31xxx/CVE-2022-31692.json +++ b/2022/31xxx/CVE-2022-31692.json @@ -53,6 +53,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221215-0010/", "url": "https://security.netapp.com/advisory/ntap-20221215-0010/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/31xxx/CVE-2022-31813.json b/2022/31xxx/CVE-2022-31813.json index e5ef3010ca67..f0f529211a44 100644 --- a/2022/31xxx/CVE-2022-31813.json +++ b/2022/31xxx/CVE-2022-31813.json @@ -98,6 +98,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-20", "url": "https://security.gentoo.org/glsa/202208-20" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32212.json b/2022/32xxx/CVE-2022-32212.json index b96aa531bf4a..faf8c70d2cdd 100644 --- a/2022/32xxx/CVE-2022-32212.json +++ b/2022/32xxx/CVE-2022-32212.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://hackerone.com/reports/1632921", "url": "https://hackerone.com/reports/1632921" + }, + { + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", } ] }, diff --git a/2022/32xxx/CVE-2022-32213.json b/2022/32xxx/CVE-2022-32213.json index d8f47d1b718c..7961d205c538 100644 --- a/2022/32xxx/CVE-2022-32213.json +++ b/2022/32xxx/CVE-2022-32213.json @@ -78,6 +78,11 @@ "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32214.json b/2022/32xxx/CVE-2022-32214.json index 24a1e3aafaae..6149bc6b7ffa 100644 --- a/2022/32xxx/CVE-2022-32214.json +++ b/2022/32xxx/CVE-2022-32214.json @@ -58,6 +58,11 @@ "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32215.json b/2022/32xxx/CVE-2022-32215.json index d22bc0784c77..983a5f64fda6 100644 --- a/2022/32xxx/CVE-2022-32215.json +++ b/2022/32xxx/CVE-2022-32215.json @@ -75,9 +75,15 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf" }, { + "refsource": "DEBIAN", "name": "DSA-5326", "url": "https://www.debian.org/security/2023/dsa-5326" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/32xxx/CVE-2022-32221.json b/2022/32xxx/CVE-2022-32221.json index 930e1ac4069b..e687288b378e 100644 --- a/2022/32xxx/CVE-2022-32221.json +++ b/2022/32xxx/CVE-2022-32221.json @@ -93,6 +93,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230208-0002/", "url": "https://security.netapp.com/advisory/ntap-20230208-0002/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/33xxx/CVE-2022-33980.json b/2022/33xxx/CVE-2022-33980.json index 56efa89a0f0b..995f805c19cb 100644 --- a/2022/33xxx/CVE-2022-33980.json +++ b/2022/33xxx/CVE-2022-33980.json @@ -92,6 +92,11 @@ "refsource": "DEBIAN", "name": "DSA-5290", "url": "https://www.debian.org/security/2022/dsa-5290" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/34xxx/CVE-2022-34169.json b/2022/34xxx/CVE-2022-34169.json index 50a1541db4fe..6551b0cc44a4 100644 --- a/2022/34xxx/CVE-2022-34169.json +++ b/2022/34xxx/CVE-2022-34169.json @@ -51,7 +51,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -176,6 +177,11 @@ "refsource": "MLIST", "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/34xxx/CVE-2022-34305.json b/2022/34xxx/CVE-2022-34305.json index b12b8f240e63..7aef79184485 100644 --- a/2022/34xxx/CVE-2022-34305.json +++ b/2022/34xxx/CVE-2022-34305.json @@ -97,6 +97,11 @@ "refsource": "GENTOO", "name": "GLSA-202208-34", "url": "https://security.gentoo.org/glsa/202208-34" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/34xxx/CVE-2022-34917.json b/2022/34xxx/CVE-2022-34917.json index f3535fad5ac3..eaeb06c2d954 100644 --- a/2022/34xxx/CVE-2022-34917.json +++ b/2022/34xxx/CVE-2022-34917.json @@ -108,6 +108,11 @@ "refsource": "MISC", "url": "https://kafka.apache.org/cve-list", "name": "https://kafka.apache.org/cve-list" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35260.json b/2022/35xxx/CVE-2022-35260.json index 1a1ffa7fa0ae..0dcd8a4369d0 100644 --- a/2022/35xxx/CVE-2022-35260.json +++ b/2022/35xxx/CVE-2022-35260.json @@ -78,6 +78,11 @@ "refsource": "FULLDISC", "name": "20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2", "url": "http://seclists.org/fulldisclosure/2023/Jan/19" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/35xxx/CVE-2022-35737.json b/2022/35xxx/CVE-2022-35737.json index 539c68cbc564..a9e48c6ec592 100644 --- a/2022/35xxx/CVE-2022-35737.json +++ b/2022/35xxx/CVE-2022-35737.json @@ -81,6 +81,11 @@ "refsource": "GENTOO", "name": "GLSA-202210-40", "url": "https://security.gentoo.org/glsa/202210-40" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/36xxx/CVE-2022-36033.json b/2022/36xxx/CVE-2022-36033.json index 97a7217f1e3d..3004a2550d22 100644 --- a/2022/36xxx/CVE-2022-36033.json +++ b/2022/36xxx/CVE-2022-36033.json @@ -96,6 +96,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221104-0006/", "url": "https://security.netapp.com/advisory/ntap-20221104-0006/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/36xxx/CVE-2022-36055.json b/2022/36xxx/CVE-2022-36055.json index 5766b1b6a4e1..6b304563b506 100644 --- a/2022/36xxx/CVE-2022-36055.json +++ b/2022/36xxx/CVE-2022-36055.json @@ -78,6 +78,11 @@ "name": "https://github.com/helm/helm/releases/tag/v3.9.4", "refsource": "MISC", "url": "https://github.com/helm/helm/releases/tag/v3.9.4" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/37xxx/CVE-2022-37434.json b/2022/37xxx/CVE-2022-37434.json index 7dea3781776f..7dfd5e8dc70a 100644 --- a/2022/37xxx/CVE-2022-37434.json +++ b/2022/37xxx/CVE-2022-37434.json @@ -161,6 +161,11 @@ "refsource": "FULLDISC", "name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13", "url": "http://seclists.org/fulldisclosure/2022/Oct/41" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/37xxx/CVE-2022-37454.json b/2022/37xxx/CVE-2022-37454.json index dc8e9307bedc..c12efde31f9f 100644 --- a/2022/37xxx/CVE-2022-37454.json +++ b/2022/37xxx/CVE-2022-37454.json @@ -119,6 +119,11 @@ "url": "https://news.ycombinator.com/item?id=35050307", "refsource": "MISC", "name": "https://news.ycombinator.com/item?id=35050307" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/38xxx/CVE-2022-38398.json b/2022/38xxx/CVE-2022-38398.json index 37756b5c1942..0eb5759285b7 100644 --- a/2022/38xxx/CVE-2022-38398.json +++ b/2022/38xxx/CVE-2022-38398.json @@ -44,7 +44,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -64,6 +65,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx", "name": "https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38648.json b/2022/38xxx/CVE-2022-38648.json index b71378aaf52d..76852757b4fb 100644 --- a/2022/38xxx/CVE-2022-38648.json +++ b/2022/38xxx/CVE-2022-38648.json @@ -64,6 +64,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread/gfsktxvj7jtwyovmhhbrw0bs13wfjd7b", "name": "https://lists.apache.org/thread/gfsktxvj7jtwyovmhhbrw0bs13wfjd7b" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38749.json b/2022/38xxx/CVE-2022-38749.json index 605933afcf29..e91beac97054 100644 --- a/2022/38xxx/CVE-2022-38749.json +++ b/2022/38xxx/CVE-2022-38749.json @@ -87,6 +87,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38750.json b/2022/38xxx/CVE-2022-38750.json index cc8848a4fd53..176518438937 100644 --- a/2022/38xxx/CVE-2022-38750.json +++ b/2022/38xxx/CVE-2022-38750.json @@ -87,6 +87,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38751.json b/2022/38xxx/CVE-2022-38751.json index 3b1971689bb1..e71b5c49820e 100644 --- a/2022/38xxx/CVE-2022-38751.json +++ b/2022/38xxx/CVE-2022-38751.json @@ -87,6 +87,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221002 [SECURITY] [DLA 3132-1] snakeyaml security update", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/38xxx/CVE-2022-38752.json b/2022/38xxx/CVE-2022-38752.json index 3be5e76252a8..6b8155c55d76 100644 --- a/2022/38xxx/CVE-2022-38752.json +++ b/2022/38xxx/CVE-2022-38752.json @@ -82,6 +82,11 @@ "refsource": "MISC", "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081", "name": "https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/39xxx/CVE-2022-39271.json b/2022/39xxx/CVE-2022-39271.json index 94d226e0d37f..9df64e2321a7 100644 --- a/2022/39xxx/CVE-2022-39271.json +++ b/2022/39xxx/CVE-2022-39271.json @@ -86,6 +86,11 @@ "name": "https://github.com/traefik/traefik/releases/tag/v2.9.0-rc5", "refsource": "MISC", "url": "https://github.com/traefik/traefik/releases/tag/v2.9.0-rc5" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3028.json b/2022/3xxx/CVE-2022-3028.json index 31bf30731ce2..958d61ee479e 100644 --- a/2022/3xxx/CVE-2022-3028.json +++ b/2022/3xxx/CVE-2022-3028.json @@ -83,6 +83,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230214-0004/", "url": "https://security.netapp.com/advisory/ntap-20230214-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3171.json b/2022/3xxx/CVE-2022-3171.json index c7182bc5cab6..ff90bec91610 100644 --- a/2022/3xxx/CVE-2022-3171.json +++ b/2022/3xxx/CVE-2022-3171.json @@ -107,6 +107,11 @@ "refsource": "GENTOO", "name": "GLSA-202301-09", "url": "https://security.gentoo.org/glsa/202301-09" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3509.json b/2022/3xxx/CVE-2022-3509.json index 99ac6cc605a6..88993966fb8d 100644 --- a/2022/3xxx/CVE-2022-3509.json +++ b/2022/3xxx/CVE-2022-3509.json @@ -69,6 +69,11 @@ "url": "https://github.com/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9", "refsource": "MISC", "name": "https://github.com/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3510.json b/2022/3xxx/CVE-2022-3510.json index 5b28dc8e6ea2..4cbb38f26cbd 100644 --- a/2022/3xxx/CVE-2022-3510.json +++ b/2022/3xxx/CVE-2022-3510.json @@ -69,6 +69,11 @@ "url": "https://github.com/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48", "refsource": "MISC", "name": "https://github.com/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3602.json b/2022/3xxx/CVE-2022-3602.json index 11c23dc68605..1bcdd408dfba 100644 --- a/2022/3xxx/CVE-2022-3602.json +++ b/2022/3xxx/CVE-2022-3602.json @@ -252,6 +252,11 @@ "url": "http://www.openwall.com/lists/oss-security/2022/11/03/11", "refsource": "MISC", "name": "http://www.openwall.com/lists/oss-security/2022/11/03/11" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/3xxx/CVE-2022-3786.json b/2022/3xxx/CVE-2022-3786.json index 26f78c85fcb4..44b1fee3e8f3 100644 --- a/2022/3xxx/CVE-2022-3786.json +++ b/2022/3xxx/CVE-2022-3786.json @@ -62,6 +62,11 @@ "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a", "refsource": "MISC", "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c42165b5706e42f67ef8ef4c351a9a4c5d21639a" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/40xxx/CVE-2022-40146.json b/2022/40xxx/CVE-2022-40146.json index ceb927d12e5b..cc0708cfab06 100644 --- a/2022/40xxx/CVE-2022-40146.json +++ b/2022/40xxx/CVE-2022-40146.json @@ -64,6 +64,11 @@ "refsource": "MISC", "url": "https://lists.apache.org/thread/hxtddqjty2sbs12y97c8g7xfh17jzxsx", "name": "https://lists.apache.org/thread/hxtddqjty2sbs12y97c8g7xfh17jzxsx" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/40xxx/CVE-2022-40149.json b/2022/40xxx/CVE-2022-40149.json index b0b3efbe268e..c6bcdb5d384b 100644 --- a/2022/40xxx/CVE-2022-40149.json +++ b/2022/40xxx/CVE-2022-40149.json @@ -92,6 +92,11 @@ "refsource": "DEBIAN", "name": "DSA-5312", "url": "https://www.debian.org/security/2023/dsa-5312" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/40xxx/CVE-2022-40150.json b/2022/40xxx/CVE-2022-40150.json index af239b5185a3..e259390f5b53 100644 --- a/2022/40xxx/CVE-2022-40150.json +++ b/2022/40xxx/CVE-2022-40150.json @@ -92,6 +92,11 @@ "refsource": "DEBIAN", "name": "DSA-5312", "url": "https://www.debian.org/security/2023/dsa-5312" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/40xxx/CVE-2022-40303.json b/2022/40xxx/CVE-2022-40303.json index a081f5617347..55b7aaf943a1 100644 --- a/2022/40xxx/CVE-2022-40303.json +++ b/2022/40xxx/CVE-2022-40303.json @@ -111,6 +111,11 @@ "refsource": "FULLDISC", "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "url": "http://seclists.org/fulldisclosure/2022/Dec/24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/40xxx/CVE-2022-40304.json b/2022/40xxx/CVE-2022-40304.json index 07d9a31c3fca..87995a6d89d3 100644 --- a/2022/40xxx/CVE-2022-40304.json +++ b/2022/40xxx/CVE-2022-40304.json @@ -116,6 +116,11 @@ "refsource": "FULLDISC", "name": "20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2", "url": "http://seclists.org/fulldisclosure/2022/Dec/24" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/40xxx/CVE-2022-40664.json b/2022/40xxx/CVE-2022-40664.json index bb4d540d411d..84d5990d1de0 100644 --- a/2022/40xxx/CVE-2022-40664.json +++ b/2022/40xxx/CVE-2022-40664.json @@ -51,7 +51,8 @@ "engine": "Vulnogram 0.0.9" }, "impact": [ - {} + { + } ], "problemtype": { "problemtype_data": [ @@ -91,6 +92,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221118-0005/", "url": "https://security.netapp.com/advisory/ntap-20221118-0005/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/41xxx/CVE-2022-41717.json b/2022/41xxx/CVE-2022-41717.json index d1357fb15da1..c13d48a915ba 100644 --- a/2022/41xxx/CVE-2022-41717.json +++ b/2022/41xxx/CVE-2022-41717.json @@ -99,6 +99,11 @@ "url": "https://pkg.go.dev/vuln/GO-2022-1144", "refsource": "MISC", "name": "https://pkg.go.dev/vuln/GO-2022-1144" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/41xxx/CVE-2022-41720.json b/2022/41xxx/CVE-2022-41720.json index 6b32e1329af2..f6af6c9aa9f7 100644 --- a/2022/41xxx/CVE-2022-41720.json +++ b/2022/41xxx/CVE-2022-41720.json @@ -91,6 +91,11 @@ "url": "https://pkg.go.dev/vuln/GO-2022-1143", "refsource": "MISC", "name": "https://pkg.go.dev/vuln/GO-2022-1143" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/41xxx/CVE-2022-41853.json b/2022/41xxx/CVE-2022-41853.json index bc2726ba2ff0..fe59c1d52c12 100644 --- a/2022/41xxx/CVE-2022-41853.json +++ b/2022/41xxx/CVE-2022-41853.json @@ -93,6 +93,11 @@ "refsource": "DEBIAN", "name": "DSA-5313", "url": "https://www.debian.org/security/2023/dsa-5313" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/41xxx/CVE-2022-41881.json b/2022/41xxx/CVE-2022-41881.json index d8bd3bf2c1cf..2b89c53c968f 100644 --- a/2022/41xxx/CVE-2022-41881.json +++ b/2022/41xxx/CVE-2022-41881.json @@ -73,6 +73,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230113-0004/", "url": "https://security.netapp.com/advisory/ntap-20230113-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/41xxx/CVE-2022-41915.json b/2022/41xxx/CVE-2022-41915.json index f69696515f5e..b5f6878bec88 100644 --- a/2022/41xxx/CVE-2022-41915.json +++ b/2022/41xxx/CVE-2022-41915.json @@ -109,6 +109,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20230113-0004/", "url": "https://security.netapp.com/advisory/ntap-20230113-0004/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/42xxx/CVE-2022-42003.json b/2022/42xxx/CVE-2022-42003.json index 3ee0b2042382..0d05146f7cb6 100644 --- a/2022/42xxx/CVE-2022-42003.json +++ b/2022/42xxx/CVE-2022-42003.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/42xxx/CVE-2022-42004.json b/2022/42xxx/CVE-2022-42004.json index 6c1d9418f506..6c873b591b3d 100644 --- a/2022/42xxx/CVE-2022-42004.json +++ b/2022/42xxx/CVE-2022-42004.json @@ -86,6 +86,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20221127 [SECURITY] [DLA 3207-1] jackson-databind security update", "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00035.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/42xxx/CVE-2022-42252.json b/2022/42xxx/CVE-2022-42252.json index 90999e32fb85..0d738f5a64a4 100644 --- a/2022/42xxx/CVE-2022-42252.json +++ b/2022/42xxx/CVE-2022-42252.json @@ -70,6 +70,11 @@ "url": "https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq", "refsource": "MISC", "name": "https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/42xxx/CVE-2022-42889.json b/2022/42xxx/CVE-2022-42889.json index b9e35b8deb52..a42f07ab818c 100644 --- a/2022/42xxx/CVE-2022-42889.json +++ b/2022/42xxx/CVE-2022-42889.json @@ -106,6 +106,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html", "url": "http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/42xxx/CVE-2022-42915.json b/2022/42xxx/CVE-2022-42915.json index 12b42ea0bc72..53bc9f8ddfe8 100644 --- a/2022/42xxx/CVE-2022-42915.json +++ b/2022/42xxx/CVE-2022-42915.json @@ -101,6 +101,11 @@ "refsource": "FULLDISC", "name": "20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2", "url": "http://seclists.org/fulldisclosure/2023/Jan/19" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/42xxx/CVE-2022-42916.json b/2022/42xxx/CVE-2022-42916.json index 6175278698db..5f088d65377e 100644 --- a/2022/42xxx/CVE-2022-42916.json +++ b/2022/42xxx/CVE-2022-42916.json @@ -106,6 +106,11 @@ "refsource": "FULLDISC", "name": "20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2", "url": "http://seclists.org/fulldisclosure/2023/Jan/19" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/42xxx/CVE-2022-42920.json b/2022/42xxx/CVE-2022-42920.json index 8f1b831460e2..f387d027c376 100644 --- a/2022/42xxx/CVE-2022-42920.json +++ b/2022/42xxx/CVE-2022-42920.json @@ -91,6 +91,11 @@ "refsource": "FEDORA", "name": "FEDORA-2022-f60a52e054", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QAMRHAKGIKZNHRBB4VLYTOIOIMMXCUCD/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/43xxx/CVE-2022-43403.json b/2022/43xxx/CVE-2022-43403.json index dc088aa9f1ef..e330663cd6aa 100644 --- a/2022/43xxx/CVE-2022-43403.json +++ b/2022/43xxx/CVE-2022-43403.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/", "url": "https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/" + }, + { + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", } ] } diff --git a/2022/43xxx/CVE-2022-43404.json b/2022/43xxx/CVE-2022-43404.json index c4dea446a615..73ff130214f8 100644 --- a/2022/43xxx/CVE-2022-43404.json +++ b/2022/43xxx/CVE-2022-43404.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins", "url": "http://www.openwall.com/lists/oss-security/2022/10/19/3" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/43xxx/CVE-2022-43548.json b/2022/43xxx/CVE-2022-43548.json index 23a86c967a08..0acb95b33e3c 100644 --- a/2022/43xxx/CVE-2022-43548.json +++ b/2022/43xxx/CVE-2022-43548.json @@ -63,6 +63,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230226 [SECURITY] [DLA 3344-1] nodejs security update", "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html" + }, + { + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", } ] }, diff --git a/2022/43xxx/CVE-2022-43680.json b/2022/43xxx/CVE-2022-43680.json index e69c95c5f900..a5e42a7e4e9a 100644 --- a/2022/43xxx/CVE-2022-43680.json +++ b/2022/43xxx/CVE-2022-43680.json @@ -116,6 +116,11 @@ "refsource": "CONFIRM", "name": "https://security.netapp.com/advisory/ntap-20221118-0007/", "url": "https://security.netapp.com/advisory/ntap-20221118-0007/" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/45xxx/CVE-2022-45047.json b/2022/45xxx/CVE-2022-45047.json index b112ca33fd87..337794f7021b 100644 --- a/2022/45xxx/CVE-2022-45047.json +++ b/2022/45xxx/CVE-2022-45047.json @@ -72,6 +72,11 @@ "refsource": "MISC", "url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html", "name": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] }, diff --git a/2022/4xxx/CVE-2022-4147.json b/2022/4xxx/CVE-2022-4147.json index 90190b5e59f7..7a270dbce86a 100644 --- a/2022/4xxx/CVE-2022-4147.json +++ b/2022/4xxx/CVE-2022-4147.json @@ -58,6 +58,11 @@ "url": "https://access.redhat.com/security/cve/CVE-2022-4147", "refsource": "MISC", "name": "https://access.redhat.com/security/cve/CVE-2022-4147" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] } diff --git a/2022/4xxx/CVE-2022-4200.json b/2022/4xxx/CVE-2022-4200.json index 8ac503f26261..7fb0bfe0e795 100644 --- a/2022/4xxx/CVE-2022-4200.json +++ b/2022/4xxx/CVE-2022-4200.json @@ -57,6 +57,11 @@ "url": "https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf", "refsource": "MISC", "name": "https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf" + }, + { + "url": "https:/www.oracle.com/security-alerts/cpujan2023.html", + "refsource": "MISC", + "name": "https:/www.oracle.com/security-alerts/cpujan2023.html" } ] },