[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jun 15 09:10:26 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1cf8c462 by security tracker role at 2022-06-15T08:10:15+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,821 @@
+CVE-2022-33735
+ RESERVED
+CVE-2022-33734
+ RESERVED
+CVE-2022-33733
+ RESERVED
+CVE-2022-33732
+ RESERVED
+CVE-2022-33731
+ RESERVED
+CVE-2022-33730
+ RESERVED
+CVE-2022-33729
+ RESERVED
+CVE-2022-33728
+ RESERVED
+CVE-2022-33727
+ RESERVED
+CVE-2022-33726
+ RESERVED
+CVE-2022-33725
+ RESERVED
+CVE-2022-33724
+ RESERVED
+CVE-2022-33723
+ RESERVED
+CVE-2022-33722
+ RESERVED
+CVE-2022-33721
+ RESERVED
+CVE-2022-33720
+ RESERVED
+CVE-2022-33719
+ RESERVED
+CVE-2022-33718
+ RESERVED
+CVE-2022-33717
+ RESERVED
+CVE-2022-33716
+ RESERVED
+CVE-2022-33715
+ RESERVED
+CVE-2022-33714
+ RESERVED
+CVE-2022-33713
+ RESERVED
+CVE-2022-33712
+ RESERVED
+CVE-2022-33711
+ RESERVED
+CVE-2022-33710
+ RESERVED
+CVE-2022-33709
+ RESERVED
+CVE-2022-33708
+ RESERVED
+CVE-2022-33707
+ RESERVED
+CVE-2022-33706
+ RESERVED
+CVE-2022-33705
+ RESERVED
+CVE-2022-33704
+ RESERVED
+CVE-2022-33703
+ RESERVED
+CVE-2022-33702
+ RESERVED
+CVE-2022-33701
+ RESERVED
+CVE-2022-33700
+ RESERVED
+CVE-2022-33699
+ RESERVED
+CVE-2022-33698
+ RESERVED
+CVE-2022-33697
+ RESERVED
+CVE-2022-33696
+ RESERVED
+CVE-2022-33695
+ RESERVED
+CVE-2022-33694
+ RESERVED
+CVE-2022-33693
+ RESERVED
+CVE-2022-33692
+ RESERVED
+CVE-2022-33691
+ RESERVED
+CVE-2022-33690
+ RESERVED
+CVE-2022-33689
+ RESERVED
+CVE-2022-33688
+ RESERVED
+CVE-2022-33687
+ RESERVED
+CVE-2022-33686
+ RESERVED
+CVE-2022-33685
+ RESERVED
+CVE-2022-33684
+ RESERVED
+CVE-2022-33683
+ RESERVED
+CVE-2022-33682
+ RESERVED
+CVE-2022-33681
+ RESERVED
+CVE-2022-33680
+ RESERVED
+CVE-2022-33679
+ RESERVED
+CVE-2022-33678
+ RESERVED
+CVE-2022-33677
+ RESERVED
+CVE-2022-33676
+ RESERVED
+CVE-2022-33675
+ RESERVED
+CVE-2022-33674
+ RESERVED
+CVE-2022-33673
+ RESERVED
+CVE-2022-33672
+ RESERVED
+CVE-2022-33671
+ RESERVED
+CVE-2022-33670
+ RESERVED
+CVE-2022-33669
+ RESERVED
+CVE-2022-33668
+ RESERVED
+CVE-2022-33667
+ RESERVED
+CVE-2022-33666
+ RESERVED
+CVE-2022-33665
+ RESERVED
+CVE-2022-33664
+ RESERVED
+CVE-2022-33663
+ RESERVED
+CVE-2022-33662
+ RESERVED
+CVE-2022-33661
+ RESERVED
+CVE-2022-33660
+ RESERVED
+CVE-2022-33659
+ RESERVED
+CVE-2022-33658
+ RESERVED
+CVE-2022-33657
+ RESERVED
+CVE-2022-33656
+ RESERVED
+CVE-2022-33655
+ RESERVED
+CVE-2022-33654
+ RESERVED
+CVE-2022-33653
+ RESERVED
+CVE-2022-33652
+ RESERVED
+CVE-2022-33651
+ RESERVED
+CVE-2022-33650
+ RESERVED
+CVE-2022-33649
+ RESERVED
+CVE-2022-33648
+ RESERVED
+CVE-2022-33647
+ RESERVED
+CVE-2022-33646
+ RESERVED
+CVE-2022-33645
+ RESERVED
+CVE-2022-33644
+ RESERVED
+CVE-2022-33643
+ RESERVED
+CVE-2022-33642
+ RESERVED
+CVE-2022-33641
+ RESERVED
+CVE-2022-33640
+ RESERVED
+CVE-2022-33639
+ RESERVED
+CVE-2022-33638
+ RESERVED
+CVE-2022-33637
+ RESERVED
+CVE-2022-33636
+ RESERVED
+CVE-2022-33635
+ RESERVED
+CVE-2022-33634
+ RESERVED
+CVE-2022-33633
+ RESERVED
+CVE-2022-33632
+ RESERVED
+CVE-2022-33631
+ RESERVED
+CVE-2022-33630
+ RESERVED
+CVE-2022-33629
+ RESERVED
+CVE-2022-33628
+ RESERVED
+CVE-2022-33627
+ RESERVED
+CVE-2022-33626
+ RESERVED
+CVE-2022-33625
+ RESERVED
+CVE-2022-33624
+ RESERVED
+CVE-2022-33623
+ RESERVED
+CVE-2022-33622
+ RESERVED
+CVE-2022-33621
+ RESERVED
+CVE-2022-33620
+ RESERVED
+CVE-2022-33619
+ RESERVED
+CVE-2022-33618
+ RESERVED
+CVE-2022-33617
+ RESERVED
+CVE-2022-33616
+ RESERVED
+CVE-2022-33615
+ RESERVED
+CVE-2022-33614
+ RESERVED
+CVE-2022-33613
+ RESERVED
+CVE-2022-33612
+ RESERVED
+CVE-2022-33611
+ RESERVED
+CVE-2022-33610
+ RESERVED
+CVE-2022-33609
+ RESERVED
+CVE-2022-33608
+ RESERVED
+CVE-2022-33607
+ RESERVED
+CVE-2022-33606
+ RESERVED
+CVE-2022-33605
+ RESERVED
+CVE-2022-33604
+ RESERVED
+CVE-2022-33603
+ RESERVED
+CVE-2022-33602
+ RESERVED
+CVE-2022-33601
+ RESERVED
+CVE-2022-33600
+ RESERVED
+CVE-2022-33599
+ RESERVED
+CVE-2022-33598
+ RESERVED
+CVE-2022-33597
+ RESERVED
+CVE-2022-33596
+ RESERVED
+CVE-2022-33595
+ RESERVED
+CVE-2022-33594
+ RESERVED
+CVE-2022-33593
+ RESERVED
+CVE-2022-33592
+ RESERVED
+CVE-2022-33591
+ RESERVED
+CVE-2022-33590
+ RESERVED
+CVE-2022-33589
+ RESERVED
+CVE-2022-33588
+ RESERVED
+CVE-2022-33587
+ RESERVED
+CVE-2022-33586
+ RESERVED
+CVE-2022-33585
+ RESERVED
+CVE-2022-33584
+ RESERVED
+CVE-2022-33583
+ RESERVED
+CVE-2022-33582
+ RESERVED
+CVE-2022-33581
+ RESERVED
+CVE-2022-33580
+ RESERVED
+CVE-2022-33579
+ RESERVED
+CVE-2022-33578
+ RESERVED
+CVE-2022-33577
+ RESERVED
+CVE-2022-33576
+ RESERVED
+CVE-2022-33575
+ RESERVED
+CVE-2022-33574
+ RESERVED
+CVE-2022-33573
+ RESERVED
+CVE-2022-33572
+ RESERVED
+CVE-2022-33571
+ RESERVED
+CVE-2022-33570
+ RESERVED
+CVE-2022-33569
+ RESERVED
+CVE-2022-33568
+ RESERVED
+CVE-2022-33567
+ RESERVED
+CVE-2022-33566
+ RESERVED
+CVE-2022-33565
+ RESERVED
+CVE-2022-33564
+ RESERVED
+CVE-2022-33563
+ RESERVED
+CVE-2022-33562
+ RESERVED
+CVE-2022-33561
+ RESERVED
+CVE-2022-33560
+ RESERVED
+CVE-2022-33559
+ RESERVED
+CVE-2022-33558
+ RESERVED
+CVE-2022-33557
+ RESERVED
+CVE-2022-33556
+ RESERVED
+CVE-2022-33555
+ RESERVED
+CVE-2022-33554
+ RESERVED
+CVE-2022-33553
+ RESERVED
+CVE-2022-33552
+ RESERVED
+CVE-2022-33551
+ RESERVED
+CVE-2022-33550
+ RESERVED
+CVE-2022-33549
+ RESERVED
+CVE-2022-33548
+ RESERVED
+CVE-2022-33547
+ RESERVED
+CVE-2022-33546
+ RESERVED
+CVE-2022-33545
+ RESERVED
+CVE-2022-33544
+ RESERVED
+CVE-2022-33543
+ RESERVED
+CVE-2022-33542
+ RESERVED
+CVE-2022-33541
+ RESERVED
+CVE-2022-33540
+ RESERVED
+CVE-2022-33539
+ RESERVED
+CVE-2022-33538
+ RESERVED
+CVE-2022-33537
+ RESERVED
+CVE-2022-33536
+ RESERVED
+CVE-2022-33535
+ RESERVED
+CVE-2022-33534
+ RESERVED
+CVE-2022-33533
+ RESERVED
+CVE-2022-33532
+ RESERVED
+CVE-2022-33531
+ RESERVED
+CVE-2022-33530
+ RESERVED
+CVE-2022-33529
+ RESERVED
+CVE-2022-33528
+ RESERVED
+CVE-2022-33527
+ RESERVED
+CVE-2022-33526
+ RESERVED
+CVE-2022-33525
+ RESERVED
+CVE-2022-33524
+ RESERVED
+CVE-2022-33523
+ RESERVED
+CVE-2022-33522
+ RESERVED
+CVE-2022-33521
+ RESERVED
+CVE-2022-33520
+ RESERVED
+CVE-2022-33519
+ RESERVED
+CVE-2022-33518
+ RESERVED
+CVE-2022-33517
+ RESERVED
+CVE-2022-33516
+ RESERVED
+CVE-2022-33515
+ RESERVED
+CVE-2022-33514
+ RESERVED
+CVE-2022-33513
+ RESERVED
+CVE-2022-33512
+ RESERVED
+CVE-2022-33511
+ RESERVED
+CVE-2022-33510
+ RESERVED
+CVE-2022-33509
+ RESERVED
+CVE-2022-33508
+ RESERVED
+CVE-2022-33507
+ RESERVED
+CVE-2022-33506
+ RESERVED
+CVE-2022-33505
+ RESERVED
+CVE-2022-33504
+ RESERVED
+CVE-2022-33503
+ RESERVED
+CVE-2022-33502
+ RESERVED
+CVE-2022-33501
+ RESERVED
+CVE-2022-33500
+ RESERVED
+CVE-2022-33499
+ RESERVED
+CVE-2022-33498
+ RESERVED
+CVE-2022-33497
+ RESERVED
+CVE-2022-33496
+ RESERVED
+CVE-2022-33495
+ RESERVED
+CVE-2022-33494
+ RESERVED
+CVE-2022-33493
+ RESERVED
+CVE-2022-33492
+ RESERVED
+CVE-2022-33491
+ RESERVED
+CVE-2022-33490
+ RESERVED
+CVE-2022-33489
+ RESERVED
+CVE-2022-33488
+ RESERVED
+CVE-2022-33487
+ RESERVED
+CVE-2022-33486
+ RESERVED
+CVE-2022-33485
+ RESERVED
+CVE-2022-33484
+ RESERVED
+CVE-2022-33483
+ RESERVED
+CVE-2022-33482
+ RESERVED
+CVE-2022-33481
+ RESERVED
+CVE-2022-33480
+ RESERVED
+CVE-2022-33479
+ RESERVED
+CVE-2022-33478
+ RESERVED
+CVE-2022-33477
+ RESERVED
+CVE-2022-33476
+ RESERVED
+CVE-2022-33475
+ RESERVED
+CVE-2022-33474
+ RESERVED
+CVE-2022-33473
+ RESERVED
+CVE-2022-33472
+ RESERVED
+CVE-2022-33471
+ RESERVED
+CVE-2022-33470
+ RESERVED
+CVE-2022-33469
+ RESERVED
+CVE-2022-33468
+ RESERVED
+CVE-2022-33467
+ RESERVED
+CVE-2022-33466
+ RESERVED
+CVE-2022-33465
+ RESERVED
+CVE-2022-33464
+ RESERVED
+CVE-2022-33463
+ RESERVED
+CVE-2022-33462
+ RESERVED
+CVE-2022-33461
+ RESERVED
+CVE-2022-33460
+ RESERVED
+CVE-2022-33459
+ RESERVED
+CVE-2022-33458
+ RESERVED
+CVE-2022-33457
+ RESERVED
+CVE-2022-33456
+ RESERVED
+CVE-2022-33455
+ RESERVED
+CVE-2022-33454
+ RESERVED
+CVE-2022-33453
+ RESERVED
+CVE-2022-33452
+ RESERVED
+CVE-2022-33451
+ RESERVED
+CVE-2022-33450
+ RESERVED
+CVE-2022-33449
+ RESERVED
+CVE-2022-33448
+ RESERVED
+CVE-2022-33447
+ RESERVED
+CVE-2022-33446
+ RESERVED
+CVE-2022-33445
+ RESERVED
+CVE-2022-33444
+ RESERVED
+CVE-2022-33443
+ RESERVED
+CVE-2022-33442
+ RESERVED
+CVE-2022-33441
+ RESERVED
+CVE-2022-33440
+ RESERVED
+CVE-2022-33439
+ RESERVED
+CVE-2022-33438
+ RESERVED
+CVE-2022-33437
+ RESERVED
+CVE-2022-33436
+ RESERVED
+CVE-2022-33435
+ RESERVED
+CVE-2022-33434
+ RESERVED
+CVE-2022-33433
+ RESERVED
+CVE-2022-33432
+ RESERVED
+CVE-2022-33431
+ RESERVED
+CVE-2022-33430
+ RESERVED
+CVE-2022-33429
+ RESERVED
+CVE-2022-33428
+ RESERVED
+CVE-2022-33427
+ RESERVED
+CVE-2022-33426
+ RESERVED
+CVE-2022-33425
+ RESERVED
+CVE-2022-33424
+ RESERVED
+CVE-2022-33423
+ RESERVED
+CVE-2022-33422
+ RESERVED
+CVE-2022-33421
+ RESERVED
+CVE-2022-33420
+ RESERVED
+CVE-2022-33419
+ RESERVED
+CVE-2022-33418
+ RESERVED
+CVE-2022-33417
+ RESERVED
+CVE-2022-33416
+ RESERVED
+CVE-2022-33415
+ RESERVED
+CVE-2022-33414
+ RESERVED
+CVE-2022-33413
+ RESERVED
+CVE-2022-33412
+ RESERVED
+CVE-2022-33411
+ RESERVED
+CVE-2022-33410
+ RESERVED
+CVE-2022-33409
+ RESERVED
+CVE-2022-33408
+ RESERVED
+CVE-2022-33407
+ RESERVED
+CVE-2022-33406
+ RESERVED
+CVE-2022-33405
+ RESERVED
+CVE-2022-33404
+ RESERVED
+CVE-2022-33403
+ RESERVED
+CVE-2022-33402
+ RESERVED
+CVE-2022-33401
+ RESERVED
+CVE-2022-33400
+ RESERVED
+CVE-2022-33399
+ RESERVED
+CVE-2022-33398
+ RESERVED
+CVE-2022-33397
+ RESERVED
+CVE-2022-33396
+ RESERVED
+CVE-2022-33395
+ RESERVED
+CVE-2022-33394
+ RESERVED
+CVE-2022-33393
+ RESERVED
+CVE-2022-33392
+ RESERVED
+CVE-2022-33391
+ RESERVED
+CVE-2022-33390
+ RESERVED
+CVE-2022-33389
+ RESERVED
+CVE-2022-33388
+ RESERVED
+CVE-2022-33387
+ RESERVED
+CVE-2022-33386
+ RESERVED
+CVE-2022-33385
+ RESERVED
+CVE-2022-33384
+ RESERVED
+CVE-2022-33383
+ RESERVED
+CVE-2022-33382
+ RESERVED
+CVE-2022-33381
+ RESERVED
+CVE-2022-33380
+ RESERVED
+CVE-2022-33379
+ RESERVED
+CVE-2022-33378
+ RESERVED
+CVE-2022-33377
+ RESERVED
+CVE-2022-33376
+ RESERVED
+CVE-2022-33375
+ RESERVED
+CVE-2022-33374
+ RESERVED
+CVE-2022-33373
+ RESERVED
+CVE-2022-33372
+ RESERVED
+CVE-2022-33371
+ RESERVED
+CVE-2022-33370
+ RESERVED
+CVE-2022-33369
+ RESERVED
+CVE-2022-33368
+ RESERVED
+CVE-2022-33367
+ RESERVED
+CVE-2022-33366
+ RESERVED
+CVE-2022-33365
+ RESERVED
+CVE-2022-33364
+ RESERVED
+CVE-2022-33363
+ RESERVED
+CVE-2022-33362
+ RESERVED
+CVE-2022-33361
+ RESERVED
+CVE-2022-33360
+ RESERVED
+CVE-2022-33359
+ RESERVED
+CVE-2022-33358
+ RESERVED
+CVE-2022-33357
+ RESERVED
+CVE-2022-33356
+ RESERVED
+CVE-2022-33355
+ RESERVED
+CVE-2022-33354
+ RESERVED
+CVE-2022-33353
+ RESERVED
+CVE-2022-33352
+ RESERVED
+CVE-2022-33351
+ RESERVED
+CVE-2022-33350
+ RESERVED
+CVE-2022-33349
+ RESERVED
+CVE-2022-33348
+ RESERVED
+CVE-2022-33347
+ RESERVED
+CVE-2022-33346
+ RESERVED
+CVE-2022-33345
+ RESERVED
+CVE-2022-33344
+ RESERVED
+CVE-2022-33343
+ RESERVED
+CVE-2022-33342
+ RESERVED
+CVE-2022-33341
+ RESERVED
+CVE-2022-33340
+ RESERVED
+CVE-2022-33339
+ RESERVED
+CVE-2022-33338
+ RESERVED
+CVE-2022-33337
+ RESERVED
+CVE-2022-33336
+ RESERVED
+CVE-2022-33335
+ RESERVED
+CVE-2022-33334
+ RESERVED
+CVE-2022-33333
+ RESERVED
+CVE-2022-33332
+ RESERVED
+CVE-2022-33331
+ RESERVED
+CVE-2022-33330
+ RESERVED
+CVE-2022-2085
+ RESERVED
+CVE-2022-2084
+ RESERVED
+CVE-2022-2083
+ RESERVED
CVE-2022-33329
RESERVED
CVE-2022-33328
@@ -2207,28 +3025,28 @@ CVE-2022-32365 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /
NOT-FOR-US: Product Show Room Site
CVE-2022-32364 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
NOT-FOR-US: Product Show Room Site
-CVE-2022-32363
- RESERVED
-CVE-2022-32362
- RESERVED
+CVE-2022-32363 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+ TODO: check
+CVE-2022-32362 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+ TODO: check
CVE-2022-32361
RESERVED
CVE-2022-32360
RESERVED
-CVE-2022-32359
- RESERVED
-CVE-2022-32358
- RESERVED
+CVE-2022-32359 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/c ...)
+ TODO: check
+CVE-2022-32358 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/c ...)
+ TODO: check
CVE-2022-32357
RESERVED
CVE-2022-32356
RESERVED
-CVE-2022-32355
- RESERVED
-CVE-2022-32354
- RESERVED
-CVE-2022-32353
- RESERVED
+CVE-2022-32355 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+ TODO: check
+CVE-2022-32354 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+ TODO: check
+CVE-2022-32353 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+ TODO: check
CVE-2022-32352 (Hospital's Patient Records Management System v1.0 is vulnerable to SQL ...)
NOT-FOR-US: Hospital's Patient Records Management System
CVE-2022-32351 (Hospital's Patient Records Management System v1.0 is vulnerable to SQL ...)
@@ -2582,24 +3400,24 @@ CVE-2022-32245
RESERVED
CVE-2022-32244
RESERVED
-CVE-2022-32243
- RESERVED
-CVE-2022-32242
- RESERVED
-CVE-2022-32241
- RESERVED
-CVE-2022-32240
- RESERVED
-CVE-2022-32239
- RESERVED
-CVE-2022-32238
- RESERVED
-CVE-2022-32237
- RESERVED
-CVE-2022-32236
- RESERVED
-CVE-2022-32235
- RESERVED
+CVE-2022-32243 (When a user opens manipulated Scalable Vector Graphics (.svg, svg.x3d) ...)
+ TODO: check
+CVE-2022-32242 (When a user opens manipulated Radiance Picture (.hdr, hdr.x3d) files r ...)
+ TODO: check
+CVE-2022-32241 (When a user opens manipulated Portable Document Format (.pdf, PDFView. ...)
+ TODO: check
+CVE-2022-32240 (When a user opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) ...)
+ TODO: check
+CVE-2022-32239 (When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files receive ...)
+ TODO: check
+CVE-2022-32238 (When a user opens manipulated Encapsulated Post Script (.eps, ai.x3d) ...)
+ TODO: check
+CVE-2022-32237 (When a user opens manipulated Computer Graphics Metafile (.cgm, CgmCor ...)
+ TODO: check
+CVE-2022-32236 (When a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files rece ...)
+ TODO: check
+CVE-2022-32235 (When a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) fil ...)
+ TODO: check
CVE-2022-1987 (Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0. ...)
- libmobi 0.11+dfsg-1
NOTE: https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f/
@@ -2634,8 +3452,8 @@ CVE-2022-1978
RESERVED
CVE-2022-1977
RESERVED
-CVE-2022-32230
- RESERVED
+CVE-2022-32230 (Microsoft Windows SMBv3 suffers from a null pointer dereference in ver ...)
+ TODO: check
CVE-2022-32229
RESERVED
CVE-2022-32228
@@ -4581,20 +5399,20 @@ CVE-2022-31597
RESERVED
CVE-2022-31596
RESERVED
-CVE-2022-31595
- RESERVED
-CVE-2022-31594
- RESERVED
+CVE-2022-31595 (SAP Financial Consolidation - version 1010,�does not perform ne ...)
+ TODO: check
+CVE-2022-31594 (A highly privileged user can exploit SUID-root program to escalate his ...)
+ TODO: check
CVE-2022-31593
RESERVED
CVE-2022-31592
RESERVED
CVE-2022-31591
RESERVED
-CVE-2022-31590
- RESERVED
-CVE-2022-31589
- RESERVED
+CVE-2022-31590 (SAP PowerDesigner Proxy - version 16.7, allows an attacker with low pr ...)
+ TODO: check
+CVE-2022-31589 (Due to improper authorization check, business users who are using Isra ...)
+ TODO: check
CVE-2022-31588
RESERVED
CVE-2022-31587
@@ -5752,8 +6570,8 @@ CVE-2022-31068
RESERVED
CVE-2022-31067
RESERVED
-CVE-2022-31066
- RESERVED
+CVE-2022-31066 (EdgeX Foundry is an open source project for building a common open fra ...)
+ TODO: check
CVE-2022-31065
RESERVED
CVE-2022-31064
@@ -5764,10 +6582,10 @@ CVE-2022-31062
RESERVED
CVE-2022-31061
RESERVED
-CVE-2022-31060
- RESERVED
-CVE-2022-31059
- RESERVED
+CVE-2022-31060 (Discourse is an open-source discussion platform. Prior to version 2.8. ...)
+ TODO: check
+CVE-2022-31059 (Discourse Calendar is a calendar plugin for Discourse, an open-source ...)
+ TODO: check
CVE-2022-31058
RESERVED
CVE-2022-31057
@@ -5784,16 +6602,16 @@ CVE-2022-31052
RESERVED
CVE-2022-31051 (semantic-release is an open source npm package for automated version m ...)
TODO: check
-CVE-2022-31050
- RESERVED
-CVE-2022-31049
- RESERVED
-CVE-2022-31048
- RESERVED
-CVE-2022-31047
- RESERVED
-CVE-2022-31046
- RESERVED
+CVE-2022-31050 (TYPO3 is an open source web content management system. Prior to versio ...)
+ TODO: check
+CVE-2022-31049 (TYPO3 is an open source web content management system. Prior to versio ...)
+ TODO: check
+CVE-2022-31048 (TYPO3 is an open source web content management system. Prior to versio ...)
+ TODO: check
+CVE-2022-31047 (TYPO3 is an open source web content management system. Prior to versio ...)
+ TODO: check
+CVE-2022-31046 (TYPO3 is an open source web content management system. Prior to versio ...)
+ TODO: check
CVE-2022-31045 (Istio is an open platform to connect, manage, and secure microservices ...)
NOT-FOR-US: Istio
CVE-2022-31044
@@ -10067,16 +10885,16 @@ CVE-2022-29620 (** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain clea
TODO: check
CVE-2022-29619
RESERVED
-CVE-2022-29618
- RESERVED
+CVE-2022-29618 (Due to insufficient input validation, SAP NetWeaver Development Infras ...)
+ TODO: check
CVE-2022-29617 (Due to improper error handling an authenticated user can crash CLA ass ...)
NOT-FOR-US: CLA assistant
CVE-2022-29616 (SAP Host Agent, SAP NetWeaver and ABAP Platform allow an attacker to l ...)
NOT-FOR-US: SAP
-CVE-2022-29615
- RESERVED
-CVE-2022-29614
- RESERVED
+CVE-2022-29615 (SAP NetWeaver Developer Studio (NWDS) - version 7.50, is based on Ecli ...)
+ TODO: check
+CVE-2022-29614 (SAP startservice - of SAP NetWeaver Application Server ABAP, Applicati ...)
+ TODO: check
CVE-2022-29613 (Due to insufficient input validation, SAP Employee Self Service allows ...)
NOT-FOR-US: SAP
CVE-2022-29612 (SAP NetWeaver, ABAP Platform and SAP Host Agent - versions KERNEL 7.22 ...)
@@ -11199,8 +12017,8 @@ CVE-2022-29242 (GOST engine is a reference implementation of the Russian GOST cr
NOTE: https://github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c (v3.0.1)
NOTE: https://github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808 (v3.0.1)
NOTE: https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3 (v3.0.1)
-CVE-2022-29241
- RESERVED
+CVE-2022-29241 (Jupyter Server provides the backend (i.e. the core services, APIs, and ...)
+ TODO: check
CVE-2022-29240
RESERVED
CVE-2022-29239
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf8c4626880f9997283a4d1c3aaa7404840fedc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf8c4626880f9997283a4d1c3aaa7404840fedc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220615/2657e97d/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list