[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Aug 28 21:10:32 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
af02afe7 by security tracker role at 2022-08-28T20:10:22+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -22,10 +22,10 @@ CVE-2022-38788
 	RESERVED
 CVE-2022-3018
 	RESERVED
-CVE-2022-3017
-	RESERVED
-CVE-2022-3016
-	RESERVED
+CVE-2022-3017 (Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor ...)
+	TODO: check
+CVE-2022-3016 (Use After Free in GitHub repository vim/vim prior to 9.0.0285. ...)
+	TODO: check
 CVE-2022-3015 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: oretnom23 Fast Food Ordering System
 CVE-2022-3014 (A vulnerability classified as problematic was found in SourceCodester  ...)
@@ -685,26 +685,26 @@ CVE-2022-38573
 	RESERVED
 CVE-2022-38572
 	RESERVED
-CVE-2022-38571
-	RESERVED
-CVE-2022-38570
-	RESERVED
-CVE-2022-38569
-	RESERVED
-CVE-2022-38568
-	RESERVED
-CVE-2022-38567
-	RESERVED
-CVE-2022-38566
-	RESERVED
-CVE-2022-38565
-	RESERVED
-CVE-2022-38564
-	RESERVED
-CVE-2022-38563
-	RESERVED
-CVE-2022-38562
-	RESERVED
+CVE-2022-38571 (Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow i ...)
+	TODO: check
+CVE-2022-38570 (Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow in ...)
+	TODO: check
+CVE-2022-38569 (Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow in ...)
+	TODO: check
+CVE-2022-38568 (Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overf ...)
+	TODO: check
+CVE-2022-38567 (Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow vu ...)
+	TODO: check
+CVE-2022-38566 (Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overf ...)
+	TODO: check
+CVE-2022-38565 (Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overf ...)
+	TODO: check
+CVE-2022-38564 (Tenda M3 V1.0.0.12(4856) was discovered to contain a buffer overflow v ...)
+	TODO: check
+CVE-2022-38563 (Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overf ...)
+	TODO: check
+CVE-2022-38562 (Tenda M3 V1.0.0.12(4856) was discovered to contain a heap buffer overf ...)
+	TODO: check
 CVE-2022-38561
 	RESERVED
 CVE-2022-38560
@@ -713,12 +713,12 @@ CVE-2022-38559
 	RESERVED
 CVE-2022-38558
 	RESERVED
-CVE-2022-38557
-	RESERVED
-CVE-2022-38556
-	RESERVED
-CVE-2022-38555
-	RESERVED
+CVE-2022-38557 (D-Link DIR845L v1.00-v1.03 contains a Static Default Credential vulner ...)
+	TODO: check
+CVE-2022-38556 (Trendnet TEW733GR v1.03B01 contains a Static Default Credential vulner ...)
+	TODO: check
+CVE-2022-38555 (Linksys E1200 v1.0.04 is vulnerable to Buffer Overflow via ej_get_web_ ...)
+	TODO: check
 CVE-2022-38554
 	RESERVED
 CVE-2022-38553
@@ -4691,16 +4691,16 @@ CVE-2022-37059
 	RESERVED
 CVE-2022-37058
 	RESERVED
-CVE-2022-37057
-	RESERVED
-CVE-2022-37056
-	RESERVED
-CVE-2022-37055
-	RESERVED
+CVE-2022-37057 (D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b ...)
+	TODO: check
+CVE-2022-37056 (D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b ...)
+	TODO: check
+CVE-2022-37055 (D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b ...)
+	TODO: check
 CVE-2022-37054
 	RESERVED
-CVE-2022-37053
-	RESERVED
+CVE-2022-37053 (TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htd ...)
+	TODO: check
 CVE-2022-37052
 	RESERVED
 CVE-2022-37051
@@ -5511,10 +5511,10 @@ CVE-2022-36758
 	RESERVED
 CVE-2022-36757
 	RESERVED
-CVE-2022-36756
-	RESERVED
-CVE-2022-36755
-	RESERVED
+CVE-2022-36756 (DIR845L A1 v1.00-v1.03 is vulnerable to command injection via /htdocs/ ...)
+	TODO: check
+CVE-2022-36755 (D-Link DIR845L A1 contains a authentication vulnerability via an AUTHO ...)
+	TODO: check
 CVE-2022-36754
 	RESERVED
 CVE-2022-36753



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/af02afe7badc54d889756d8d1957d906e3a26d1a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/af02afe7badc54d889756d8d1957d906e3a26d1a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220828/1599017e/attachment.htm>


More information about the debian-security-tracker-commits mailing list