[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Apr 27 21:10:35 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f9a81025 by security tracker role at 2022-04-27T20:10:25+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,133 +1,194 @@
+CVE-2022-29823
+ RESERVED
+CVE-2022-29822
+ RESERVED
+CVE-2022-29821
+ RESERVED
+CVE-2022-29820
+ RESERVED
+CVE-2022-29819
+ RESERVED
+CVE-2022-29818
+ RESERVED
+CVE-2022-29817
+ RESERVED
+CVE-2022-29816
+ RESERVED
+CVE-2022-29815
+ RESERVED
+CVE-2022-29814
+ RESERVED
+CVE-2022-29813
+ RESERVED
+CVE-2022-29812
+ RESERVED
+CVE-2022-29811
+ RESERVED
+CVE-2022-1508
+ RESERVED
+CVE-2022-1507 (chafa: NULL Pointer Dereference in function gif_internal_decode_frame ...)
+ TODO: check
+CVE-2022-1506
+ RESERVED
+CVE-2022-1505
+ RESERVED
+CVE-2022-1504 (XSS in /demo/module/?module=HERE in GitHub repository microweber/micro ...)
+ TODO: check
CVE-2022-29810 (The Hashicorp go-getter library before 1.5.11 could write SSH credenti ...)
TODO: check
CVE-2022-29809
RESERVED
-CVE-2022-1503
- RESERVED
+CVE-2022-1503 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
CVE-2022-1502
RESERVED
CVE-2022-1501
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1500
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1499
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1498
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1497
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1496
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1495
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1494
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1493
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1492
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1491
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1490
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1489
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1488
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1487
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1486
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1485
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1484
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1483
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1482
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1481
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1480
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1479
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1478
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
CVE-2022-1477
RESERVED
+ {DSA-5125-1}
- chromium 101.0.4951.41-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
@@ -901,8 +962,8 @@ CVE-2022-1407
RESERVED
CVE-2022-29510
RESERVED
-CVE-2022-29505
- RESERVED
+CVE-2022-29505 (Due to build misconfiguration in openssl dependency, LINE for Windows ...)
+ TODO: check
CVE-2022-29486
RESERVED
CVE-2022-29469
@@ -3621,8 +3682,8 @@ CVE-2022-28466
RESERVED
CVE-2022-28465
RESERVED
-CVE-2022-28464
- RESERVED
+CVE-2022-28464 (Apifox through 2.1.6 is vulnerable to Cross Site Scripting (XSS) which ...)
+ TODO: check
CVE-2022-28463
RESERVED
CVE-2022-28462
@@ -4491,16 +4552,16 @@ CVE-2022-28199
RESERVED
CVE-2022-28198
RESERVED
-CVE-2022-28197
- RESERVED
-CVE-2022-28196
- RESERVED
-CVE-2022-28195
- RESERVED
-CVE-2022-28194
- RESERVED
-CVE-2022-28193
- RESERVED
+CVE-2022-28197 (NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cbo ...)
+ TODO: check
+CVE-2022-28196 (NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cbo ...)
+ TODO: check
+CVE-2022-28195 (NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cbo ...)
+ TODO: check
+CVE-2022-28194 (NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cbo ...)
+ TODO: check
+CVE-2022-28193 (NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cbo ...)
+ TODO: check
CVE-2022-28192
RESERVED
CVE-2022-28191
@@ -5352,8 +5413,8 @@ CVE-2022-27907 (Sonatype Nexus Repository Manager 3.x before 3.38.0 allows SSRF.
NOT-FOR-US: Sonatype Nexus Repository Manager
CVE-2022-27906 (Mendelson OFTP2 before 1.1 b43 is affected by directory traversal. To ...)
NOT-FOR-US: Mendelson OFTP2
-CVE-2022-27905
- RESERVED
+CVE-2022-27905 (In ControlUp Real-Time Agent before 8.6, an unquoted path can result i ...)
+ TODO: check
CVE-2022-27904
RESERVED
CVE-2022-27903
@@ -6830,8 +6891,8 @@ CVE-2022-27338
RESERVED
CVE-2022-27337
RESERVED
-CVE-2022-27336
- RESERVED
+CVE-2022-27336 (Seacms v11.6 was discovered to contain a remote code execution (RCE) v ...)
+ TODO: check
CVE-2022-27335
RESERVED
CVE-2022-27334
@@ -7084,8 +7145,7 @@ CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a
[bullseye] - glewlwyd 2.5.2-2+deb11u3
[buster] - glewlwyd <no-dsa> (Minor issue)
NOTE: https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a (v2.6.2)
-CVE-2022-27239 [cifs-utils mount.cifs buffer overflow in ip parameter]
- RESERVED
+CVE-2022-27239 (In cifs-utils through 6.14, a stack-based buffer overflow when parsing ...)
- cifs-utils <unfixed>
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15025
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1197216
@@ -13671,16 +13731,16 @@ CVE-2022-24891
RESERVED
CVE-2022-24890
RESERVED
-CVE-2022-24889
- RESERVED
-CVE-2022-24888
- RESERVED
-CVE-2022-24887
- RESERVED
-CVE-2022-24886
- RESERVED
-CVE-2022-24885
- RESERVED
+CVE-2022-24889 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+ TODO: check
+CVE-2022-24888 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+ TODO: check
+CVE-2022-24887 (Nextcloud Talk is a video and audio conferencing app for Nextcloud, a ...)
+ TODO: check
+CVE-2022-24886 (Nextcloud Android app is the Android client for Nextcloud, a self-host ...)
+ TODO: check
+CVE-2022-24885 (Nextcloud Android app is the Android client for Nextcloud, a self-host ...)
+ TODO: check
CVE-2022-24884
RESERVED
CVE-2022-24883 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). ...)
@@ -15221,8 +15281,8 @@ CVE-2022-0483 (Local privilege escalation due to insecure folder permissions. Th
NOT-FOR-US: Acronis VSS Doctor
CVE-2022-0482 (Exposure of Private Personal Information to an Unauthorized Actor in G ...)
NOT-FOR-US: easyappointments
-CVE-2022-24372
- RESERVED
+CVE-2022-24372 (Linksys MR9600 devices before 2.0.5 allow attackers to read arbitrary ...)
+ TODO: check
CVE-2022-24371
RESERVED
CVE-2022-24370 (This vulnerability allows remote attackers to disclose sensitive infor ...)
@@ -17401,10 +17461,10 @@ CVE-2021-46444 (H.H.G Multistore v5.1.0 and below was discovered to contain a SQ
NOT-FOR-US: H.H.G Multistore
CVE-2021-46443
REJECTED
-CVE-2021-46442
- RESERVED
-CVE-2021-46441
- RESERVED
+CVE-2021-46442 (In the "webupg" binary of D-Link DIR-825 G1, attackers can bypass auth ...)
+ TODO: check
+CVE-2021-46441 (In the "webupg" binary of D-Link DIR-825 G1, because of the lack of pa ...)
+ TODO: check
CVE-2021-46440
RESERVED
CVE-2021-46439
@@ -17437,16 +17497,16 @@ CVE-2021-46426 (phpIPAM 1.4.4 allows Reflected XSS and CSRF via app/admin/subnet
- phpipam <itp> (bug #731713)
CVE-2021-46425
RESERVED
-CVE-2021-46424
- RESERVED
-CVE-2021-46423
- RESERVED
-CVE-2021-46422
- RESERVED
-CVE-2021-46421
- RESERVED
-CVE-2021-46420
- RESERVED
+CVE-2021-46424 (Telesquare TLR-2005KSH 1.0.0 is affected by an arbitrary file deletion ...)
+ TODO: check
+CVE-2021-46423 (Telesquare TLR-2005KSH 1.0.0 is affected by an unauthenticated file do ...)
+ TODO: check
+CVE-2021-46422 (Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vuln ...)
+ TODO: check
+CVE-2021-46421 (Franklin Fueling Systems FFS T5 Series 1.8.7.7299 is affected by an un ...)
+ TODO: check
+CVE-2021-46420 (Franklin Fueling Systems FFS TS-550 evo 2.23.4.8936 is affected by an ...)
+ TODO: check
CVE-2021-46419 (An unauthorized file deletion vulnerability in Telesquare TLR-2855KS6 ...)
NOT-FOR-US: Telesquare
CVE-2021-46418 (An unauthorized file creation vulnerability in Telesquare TLR-2855KS6 ...)
@@ -17640,8 +17700,8 @@ CVE-2022-23824
RESERVED
CVE-2022-23823
RESERVED
-CVE-2022-23822
- RESERVED
+CVE-2022-23822 (In this physical attack, an attacker may potentially exploit the Zynq- ...)
+ TODO: check
CVE-2022-23821
RESERVED
CVE-2022-23820
@@ -22297,8 +22357,8 @@ CVE-2022-22523
RESERVED
CVE-2022-22522
RESERVED
-CVE-2022-22521
- RESERVED
+CVE-2022-22521 (In Miele Benchmark Programming Tool with versions Prior to 1.2.71, exe ...)
+ TODO: check
CVE-2022-22520
RESERVED
CVE-2022-22519 (A remote, unauthenticated attacker can send a specific crafted HTTP or ...)
@@ -22649,8 +22709,8 @@ CVE-2022-22347
RESERVED
CVE-2022-22346 (IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.13.xxx is ...)
NOT-FOR-US: IBM
-CVE-2022-22345
- RESERVED
+CVE-2022-22345 (IBM QRadar 7.3, 7.4, and 7.5 is vulnerable to cross-site scripting. Th ...)
+ TODO: check
CVE-2022-22344 (IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerab ...)
NOT-FOR-US: IBM
CVE-2022-22343
@@ -22693,8 +22753,8 @@ CVE-2022-22325
RESERVED
CVE-2022-22324
RESERVED
-CVE-2022-22323
- RESERVED
+CVE-2022-22323 (IBM Security Identity Manager (IBM Security Verify Password Synchroniz ...)
+ TODO: check
CVE-2022-22322
RESERVED
CVE-2022-22321 (IBM MQ Appliance 9.2 CD and 9.2 LTS local messaging users stored with ...)
@@ -22709,14 +22769,14 @@ CVE-2022-22317
RESERVED
CVE-2022-22316 (IBM MQ Appliance 9.2 CD and 9.2 LTS could allow an authenticated and a ...)
NOT-FOR-US: IBM
-CVE-2022-22315
- RESERVED
+CVE-2022-22315 (IBM UrbanCode Deploy (UCD) 7.2.2.1 could allow an authenticated user w ...)
+ TODO: check
CVE-2022-22314
RESERVED
CVE-2022-22313
RESERVED
-CVE-2022-22312
- RESERVED
+CVE-2022-22312 (IBM Security Identity Manager (IBM Security Verify Password Synchroniz ...)
+ TODO: check
CVE-2022-22311 (IBM Security Verify Access could allow a user, using man in the middle ...)
NOT-FOR-US: IBM
CVE-2022-22310 (IBM WebSphere Application Server Liberty 21.0.0.10 through 21.0.0.12 c ...)
@@ -23435,14 +23495,14 @@ CVE-2022-22280
RESERVED
CVE-2022-22279 (** UNSUPPORTED WHEN ASSIGNED ** A post-authentication arbitrary file r ...)
NOT-FOR-US: Sonicwall
-CVE-2022-22278
- RESERVED
-CVE-2022-22277
- RESERVED
-CVE-2022-22276
- RESERVED
-CVE-2022-22275
- RESERVED
+CVE-2022-22278 (A vulnerability in SonicOS CFS (Content filtering service) returns a l ...)
+ TODO: check
+CVE-2022-22277 (A vulnerability in SonicOS SNMP service resulting exposure of Wireless ...)
+ TODO: check
+CVE-2022-22276 (A vulnerability in SonicOS SNMP service resulting exposure of sensitiv ...)
+ TODO: check
+CVE-2022-22275 (Improper Restriction of TCP Communication Channel in HTTP/S inbound tr ...)
+ TODO: check
CVE-2022-22274 (A Stack-based buffer overflow vulnerability in the SonicOS via HTTP re ...)
NOT-FOR-US: Sonicwall
CVE-2022-22273 (** UNSUPPORTED WHEN ASSIGNED ** Improper neutralization of Special Ele ...)
@@ -46336,8 +46396,8 @@ CVE-2021-38941
RESERVED
CVE-2021-38940
RESERVED
-CVE-2021-38939
- RESERVED
+CVE-2021-38939 (IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive informa ...)
+ TODO: check
CVE-2021-38938
RESERVED
CVE-2021-38937 (IBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authent ...)
@@ -46376,8 +46436,8 @@ CVE-2021-38921 (IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker t
NOT-FOR-US: IBM
CVE-2021-38920
RESERVED
-CVE-2021-38919
- RESERVED
+CVE-2021-38919 (IBM QRadar SIEM 7.3, 7.4, and 7.5 in some senarios may reveal authoriz ...)
+ TODO: check
CVE-2021-38918 (IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a spec ...)
NOT-FOR-US: IBM
CVE-2021-38917 (IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker ...)
@@ -46458,16 +46518,16 @@ CVE-2021-38880
RESERVED
CVE-2021-38879
RESERVED
-CVE-2021-38878
- RESERVED
+CVE-2021-38878 (IBM QRadar 7.3, 7.4, and 7.5 could allow a malicious actor to imperson ...)
+ TODO: check
CVE-2021-38877 (IBM Jazz for Service Management 1.1.3.10 is vulnerable to stored cross ...)
NOT-FOR-US: IBM
CVE-2021-38876 (IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vu ...)
NOT-FOR-US: IBM
CVE-2021-38875 (IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerabl ...)
NOT-FOR-US: IBM
-CVE-2021-38874
- RESERVED
+CVE-2021-38874 (IBM QRadar SIEM 7.3, 7.4, and 7.5 allows for users to access informati ...)
+ TODO: check
CVE-2021-38873 (IBM Planning Analytics 2.0 is potentially vulnerable to CSV Injection. ...)
NOT-FOR-US: IBM
CVE-2021-38872
@@ -46476,8 +46536,8 @@ CVE-2021-38871
RESERVED
CVE-2021-38870 (IBM Aspera Cloud is vulnerable to stored cross-site scripting. This vu ...)
NOT-FOR-US: IBM
-CVE-2021-38869
- RESERVED
+CVE-2021-38869 (IBM QRadar SIEM 7.3, 7.4, and 7.5 in some situations may not automatic ...)
+ TODO: check
CVE-2021-38868
RESERVED
CVE-2021-38867
@@ -56914,10 +56974,10 @@ CVE-2021-34604
RESERVED
CVE-2021-34603
RESERVED
-CVE-2021-34602
- RESERVED
-CVE-2021-34601
- RESERVED
+CVE-2021-34602 (In Bender/ebee Charge Controllers in multiple versions are prone to Co ...)
+ TODO: check
+CVE-2021-34601 (In Bender/ebee Charge Controllers in multiple versions are prone to Ha ...)
+ TODO: check
CVE-2021-34600 (Telenot CompasX versions prior to 32.0 use a weak seed for random numb ...)
NOT-FOR-US: Telenot CompasX
CVE-2021-34599 (Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack ce ...)
@@ -56934,18 +56994,18 @@ CVE-2021-34594 (TwinCAT OPC UA Server in TF6100 and TS6100 in product versions b
NOT-FOR-US: TwinCAT OPC UA Server in TF6100 and TS6100
CVE-2021-34593 (In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versio ...)
NOT-FOR-US: CODESYS
-CVE-2021-34592
- RESERVED
-CVE-2021-34591
- RESERVED
-CVE-2021-34590
- RESERVED
-CVE-2021-34589
- RESERVED
-CVE-2021-34588
- RESERVED
-CVE-2021-34587
- RESERVED
+CVE-2021-34592 (In Bender/ebee Charge Controllers in multiple versions are prone to Co ...)
+ TODO: check
+CVE-2021-34591 (In Bender/ebee Charge Controllers in multiple versions are prone to Lo ...)
+ TODO: check
+CVE-2021-34590 (In Bender/ebee Charge Controllers in multiple versions are prone to Cr ...)
+ TODO: check
+CVE-2021-34589 (In Bender/ebee Charge Controllers in multiple versions are prone to an ...)
+ TODO: check
+CVE-2021-34588 (In Bender/ebee Charge Controllers in multiple versions are prone to un ...)
+ TODO: check
+CVE-2021-34587 (In Bender/ebee Charge Controllers in multiple versions a long URL coul ...)
+ TODO: check
CVE-2021-34586 (In the CODESYS V2 web server prior to V1.1.9.22 crafted web server req ...)
NOT-FOR-US: CODESYS
CVE-2021-34585 (In the CODESYS V2 web server prior to V1.1.9.22 crafted web server req ...)
@@ -69591,8 +69651,8 @@ CVE-2021-29778
RESERVED
CVE-2021-29777 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, ...)
NOT-FOR-US: IBM
-CVE-2021-29776
- RESERVED
+CVE-2021-29776 (IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow an authenticated user to ...)
+ TODO: check
CVE-2021-29775 (IBM Business Automation Workflow 19.0.03 and 20.0 and IBM Cloud Pak fo ...)
NOT-FOR-US: IBM
CVE-2021-29774 (IBM Jazz Team Server products could allow an authenticated user to obt ...)
@@ -81049,8 +81109,8 @@ CVE-2021-25268
RESERVED
CVE-2021-25267
RESERVED
-CVE-2021-25266
- RESERVED
+CVE-2021-25266 (An insecure data storage vulnerability allows a physical attacker with ...)
+ TODO: check
CVE-2021-25265 (A malicious website could execute code remotely in Sophos Connect Clie ...)
NOT-FOR-US: Sophos Connect Client
CVE-2021-25264 (In multiple versions of Sophos Endpoint products for MacOS, a local at ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f9a81025687348c8222eee6d565e0d1077775ada
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f9a81025687348c8222eee6d565e0d1077775ada
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220427/8b54338a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list