[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jun 15 09:10:26 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1cf8c462 by security tracker role at 2022-06-15T08:10:15+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,821 @@
+CVE-2022-33735
+	RESERVED
+CVE-2022-33734
+	RESERVED
+CVE-2022-33733
+	RESERVED
+CVE-2022-33732
+	RESERVED
+CVE-2022-33731
+	RESERVED
+CVE-2022-33730
+	RESERVED
+CVE-2022-33729
+	RESERVED
+CVE-2022-33728
+	RESERVED
+CVE-2022-33727
+	RESERVED
+CVE-2022-33726
+	RESERVED
+CVE-2022-33725
+	RESERVED
+CVE-2022-33724
+	RESERVED
+CVE-2022-33723
+	RESERVED
+CVE-2022-33722
+	RESERVED
+CVE-2022-33721
+	RESERVED
+CVE-2022-33720
+	RESERVED
+CVE-2022-33719
+	RESERVED
+CVE-2022-33718
+	RESERVED
+CVE-2022-33717
+	RESERVED
+CVE-2022-33716
+	RESERVED
+CVE-2022-33715
+	RESERVED
+CVE-2022-33714
+	RESERVED
+CVE-2022-33713
+	RESERVED
+CVE-2022-33712
+	RESERVED
+CVE-2022-33711
+	RESERVED
+CVE-2022-33710
+	RESERVED
+CVE-2022-33709
+	RESERVED
+CVE-2022-33708
+	RESERVED
+CVE-2022-33707
+	RESERVED
+CVE-2022-33706
+	RESERVED
+CVE-2022-33705
+	RESERVED
+CVE-2022-33704
+	RESERVED
+CVE-2022-33703
+	RESERVED
+CVE-2022-33702
+	RESERVED
+CVE-2022-33701
+	RESERVED
+CVE-2022-33700
+	RESERVED
+CVE-2022-33699
+	RESERVED
+CVE-2022-33698
+	RESERVED
+CVE-2022-33697
+	RESERVED
+CVE-2022-33696
+	RESERVED
+CVE-2022-33695
+	RESERVED
+CVE-2022-33694
+	RESERVED
+CVE-2022-33693
+	RESERVED
+CVE-2022-33692
+	RESERVED
+CVE-2022-33691
+	RESERVED
+CVE-2022-33690
+	RESERVED
+CVE-2022-33689
+	RESERVED
+CVE-2022-33688
+	RESERVED
+CVE-2022-33687
+	RESERVED
+CVE-2022-33686
+	RESERVED
+CVE-2022-33685
+	RESERVED
+CVE-2022-33684
+	RESERVED
+CVE-2022-33683
+	RESERVED
+CVE-2022-33682
+	RESERVED
+CVE-2022-33681
+	RESERVED
+CVE-2022-33680
+	RESERVED
+CVE-2022-33679
+	RESERVED
+CVE-2022-33678
+	RESERVED
+CVE-2022-33677
+	RESERVED
+CVE-2022-33676
+	RESERVED
+CVE-2022-33675
+	RESERVED
+CVE-2022-33674
+	RESERVED
+CVE-2022-33673
+	RESERVED
+CVE-2022-33672
+	RESERVED
+CVE-2022-33671
+	RESERVED
+CVE-2022-33670
+	RESERVED
+CVE-2022-33669
+	RESERVED
+CVE-2022-33668
+	RESERVED
+CVE-2022-33667
+	RESERVED
+CVE-2022-33666
+	RESERVED
+CVE-2022-33665
+	RESERVED
+CVE-2022-33664
+	RESERVED
+CVE-2022-33663
+	RESERVED
+CVE-2022-33662
+	RESERVED
+CVE-2022-33661
+	RESERVED
+CVE-2022-33660
+	RESERVED
+CVE-2022-33659
+	RESERVED
+CVE-2022-33658
+	RESERVED
+CVE-2022-33657
+	RESERVED
+CVE-2022-33656
+	RESERVED
+CVE-2022-33655
+	RESERVED
+CVE-2022-33654
+	RESERVED
+CVE-2022-33653
+	RESERVED
+CVE-2022-33652
+	RESERVED
+CVE-2022-33651
+	RESERVED
+CVE-2022-33650
+	RESERVED
+CVE-2022-33649
+	RESERVED
+CVE-2022-33648
+	RESERVED
+CVE-2022-33647
+	RESERVED
+CVE-2022-33646
+	RESERVED
+CVE-2022-33645
+	RESERVED
+CVE-2022-33644
+	RESERVED
+CVE-2022-33643
+	RESERVED
+CVE-2022-33642
+	RESERVED
+CVE-2022-33641
+	RESERVED
+CVE-2022-33640
+	RESERVED
+CVE-2022-33639
+	RESERVED
+CVE-2022-33638
+	RESERVED
+CVE-2022-33637
+	RESERVED
+CVE-2022-33636
+	RESERVED
+CVE-2022-33635
+	RESERVED
+CVE-2022-33634
+	RESERVED
+CVE-2022-33633
+	RESERVED
+CVE-2022-33632
+	RESERVED
+CVE-2022-33631
+	RESERVED
+CVE-2022-33630
+	RESERVED
+CVE-2022-33629
+	RESERVED
+CVE-2022-33628
+	RESERVED
+CVE-2022-33627
+	RESERVED
+CVE-2022-33626
+	RESERVED
+CVE-2022-33625
+	RESERVED
+CVE-2022-33624
+	RESERVED
+CVE-2022-33623
+	RESERVED
+CVE-2022-33622
+	RESERVED
+CVE-2022-33621
+	RESERVED
+CVE-2022-33620
+	RESERVED
+CVE-2022-33619
+	RESERVED
+CVE-2022-33618
+	RESERVED
+CVE-2022-33617
+	RESERVED
+CVE-2022-33616
+	RESERVED
+CVE-2022-33615
+	RESERVED
+CVE-2022-33614
+	RESERVED
+CVE-2022-33613
+	RESERVED
+CVE-2022-33612
+	RESERVED
+CVE-2022-33611
+	RESERVED
+CVE-2022-33610
+	RESERVED
+CVE-2022-33609
+	RESERVED
+CVE-2022-33608
+	RESERVED
+CVE-2022-33607
+	RESERVED
+CVE-2022-33606
+	RESERVED
+CVE-2022-33605
+	RESERVED
+CVE-2022-33604
+	RESERVED
+CVE-2022-33603
+	RESERVED
+CVE-2022-33602
+	RESERVED
+CVE-2022-33601
+	RESERVED
+CVE-2022-33600
+	RESERVED
+CVE-2022-33599
+	RESERVED
+CVE-2022-33598
+	RESERVED
+CVE-2022-33597
+	RESERVED
+CVE-2022-33596
+	RESERVED
+CVE-2022-33595
+	RESERVED
+CVE-2022-33594
+	RESERVED
+CVE-2022-33593
+	RESERVED
+CVE-2022-33592
+	RESERVED
+CVE-2022-33591
+	RESERVED
+CVE-2022-33590
+	RESERVED
+CVE-2022-33589
+	RESERVED
+CVE-2022-33588
+	RESERVED
+CVE-2022-33587
+	RESERVED
+CVE-2022-33586
+	RESERVED
+CVE-2022-33585
+	RESERVED
+CVE-2022-33584
+	RESERVED
+CVE-2022-33583
+	RESERVED
+CVE-2022-33582
+	RESERVED
+CVE-2022-33581
+	RESERVED
+CVE-2022-33580
+	RESERVED
+CVE-2022-33579
+	RESERVED
+CVE-2022-33578
+	RESERVED
+CVE-2022-33577
+	RESERVED
+CVE-2022-33576
+	RESERVED
+CVE-2022-33575
+	RESERVED
+CVE-2022-33574
+	RESERVED
+CVE-2022-33573
+	RESERVED
+CVE-2022-33572
+	RESERVED
+CVE-2022-33571
+	RESERVED
+CVE-2022-33570
+	RESERVED
+CVE-2022-33569
+	RESERVED
+CVE-2022-33568
+	RESERVED
+CVE-2022-33567
+	RESERVED
+CVE-2022-33566
+	RESERVED
+CVE-2022-33565
+	RESERVED
+CVE-2022-33564
+	RESERVED
+CVE-2022-33563
+	RESERVED
+CVE-2022-33562
+	RESERVED
+CVE-2022-33561
+	RESERVED
+CVE-2022-33560
+	RESERVED
+CVE-2022-33559
+	RESERVED
+CVE-2022-33558
+	RESERVED
+CVE-2022-33557
+	RESERVED
+CVE-2022-33556
+	RESERVED
+CVE-2022-33555
+	RESERVED
+CVE-2022-33554
+	RESERVED
+CVE-2022-33553
+	RESERVED
+CVE-2022-33552
+	RESERVED
+CVE-2022-33551
+	RESERVED
+CVE-2022-33550
+	RESERVED
+CVE-2022-33549
+	RESERVED
+CVE-2022-33548
+	RESERVED
+CVE-2022-33547
+	RESERVED
+CVE-2022-33546
+	RESERVED
+CVE-2022-33545
+	RESERVED
+CVE-2022-33544
+	RESERVED
+CVE-2022-33543
+	RESERVED
+CVE-2022-33542
+	RESERVED
+CVE-2022-33541
+	RESERVED
+CVE-2022-33540
+	RESERVED
+CVE-2022-33539
+	RESERVED
+CVE-2022-33538
+	RESERVED
+CVE-2022-33537
+	RESERVED
+CVE-2022-33536
+	RESERVED
+CVE-2022-33535
+	RESERVED
+CVE-2022-33534
+	RESERVED
+CVE-2022-33533
+	RESERVED
+CVE-2022-33532
+	RESERVED
+CVE-2022-33531
+	RESERVED
+CVE-2022-33530
+	RESERVED
+CVE-2022-33529
+	RESERVED
+CVE-2022-33528
+	RESERVED
+CVE-2022-33527
+	RESERVED
+CVE-2022-33526
+	RESERVED
+CVE-2022-33525
+	RESERVED
+CVE-2022-33524
+	RESERVED
+CVE-2022-33523
+	RESERVED
+CVE-2022-33522
+	RESERVED
+CVE-2022-33521
+	RESERVED
+CVE-2022-33520
+	RESERVED
+CVE-2022-33519
+	RESERVED
+CVE-2022-33518
+	RESERVED
+CVE-2022-33517
+	RESERVED
+CVE-2022-33516
+	RESERVED
+CVE-2022-33515
+	RESERVED
+CVE-2022-33514
+	RESERVED
+CVE-2022-33513
+	RESERVED
+CVE-2022-33512
+	RESERVED
+CVE-2022-33511
+	RESERVED
+CVE-2022-33510
+	RESERVED
+CVE-2022-33509
+	RESERVED
+CVE-2022-33508
+	RESERVED
+CVE-2022-33507
+	RESERVED
+CVE-2022-33506
+	RESERVED
+CVE-2022-33505
+	RESERVED
+CVE-2022-33504
+	RESERVED
+CVE-2022-33503
+	RESERVED
+CVE-2022-33502
+	RESERVED
+CVE-2022-33501
+	RESERVED
+CVE-2022-33500
+	RESERVED
+CVE-2022-33499
+	RESERVED
+CVE-2022-33498
+	RESERVED
+CVE-2022-33497
+	RESERVED
+CVE-2022-33496
+	RESERVED
+CVE-2022-33495
+	RESERVED
+CVE-2022-33494
+	RESERVED
+CVE-2022-33493
+	RESERVED
+CVE-2022-33492
+	RESERVED
+CVE-2022-33491
+	RESERVED
+CVE-2022-33490
+	RESERVED
+CVE-2022-33489
+	RESERVED
+CVE-2022-33488
+	RESERVED
+CVE-2022-33487
+	RESERVED
+CVE-2022-33486
+	RESERVED
+CVE-2022-33485
+	RESERVED
+CVE-2022-33484
+	RESERVED
+CVE-2022-33483
+	RESERVED
+CVE-2022-33482
+	RESERVED
+CVE-2022-33481
+	RESERVED
+CVE-2022-33480
+	RESERVED
+CVE-2022-33479
+	RESERVED
+CVE-2022-33478
+	RESERVED
+CVE-2022-33477
+	RESERVED
+CVE-2022-33476
+	RESERVED
+CVE-2022-33475
+	RESERVED
+CVE-2022-33474
+	RESERVED
+CVE-2022-33473
+	RESERVED
+CVE-2022-33472
+	RESERVED
+CVE-2022-33471
+	RESERVED
+CVE-2022-33470
+	RESERVED
+CVE-2022-33469
+	RESERVED
+CVE-2022-33468
+	RESERVED
+CVE-2022-33467
+	RESERVED
+CVE-2022-33466
+	RESERVED
+CVE-2022-33465
+	RESERVED
+CVE-2022-33464
+	RESERVED
+CVE-2022-33463
+	RESERVED
+CVE-2022-33462
+	RESERVED
+CVE-2022-33461
+	RESERVED
+CVE-2022-33460
+	RESERVED
+CVE-2022-33459
+	RESERVED
+CVE-2022-33458
+	RESERVED
+CVE-2022-33457
+	RESERVED
+CVE-2022-33456
+	RESERVED
+CVE-2022-33455
+	RESERVED
+CVE-2022-33454
+	RESERVED
+CVE-2022-33453
+	RESERVED
+CVE-2022-33452
+	RESERVED
+CVE-2022-33451
+	RESERVED
+CVE-2022-33450
+	RESERVED
+CVE-2022-33449
+	RESERVED
+CVE-2022-33448
+	RESERVED
+CVE-2022-33447
+	RESERVED
+CVE-2022-33446
+	RESERVED
+CVE-2022-33445
+	RESERVED
+CVE-2022-33444
+	RESERVED
+CVE-2022-33443
+	RESERVED
+CVE-2022-33442
+	RESERVED
+CVE-2022-33441
+	RESERVED
+CVE-2022-33440
+	RESERVED
+CVE-2022-33439
+	RESERVED
+CVE-2022-33438
+	RESERVED
+CVE-2022-33437
+	RESERVED
+CVE-2022-33436
+	RESERVED
+CVE-2022-33435
+	RESERVED
+CVE-2022-33434
+	RESERVED
+CVE-2022-33433
+	RESERVED
+CVE-2022-33432
+	RESERVED
+CVE-2022-33431
+	RESERVED
+CVE-2022-33430
+	RESERVED
+CVE-2022-33429
+	RESERVED
+CVE-2022-33428
+	RESERVED
+CVE-2022-33427
+	RESERVED
+CVE-2022-33426
+	RESERVED
+CVE-2022-33425
+	RESERVED
+CVE-2022-33424
+	RESERVED
+CVE-2022-33423
+	RESERVED
+CVE-2022-33422
+	RESERVED
+CVE-2022-33421
+	RESERVED
+CVE-2022-33420
+	RESERVED
+CVE-2022-33419
+	RESERVED
+CVE-2022-33418
+	RESERVED
+CVE-2022-33417
+	RESERVED
+CVE-2022-33416
+	RESERVED
+CVE-2022-33415
+	RESERVED
+CVE-2022-33414
+	RESERVED
+CVE-2022-33413
+	RESERVED
+CVE-2022-33412
+	RESERVED
+CVE-2022-33411
+	RESERVED
+CVE-2022-33410
+	RESERVED
+CVE-2022-33409
+	RESERVED
+CVE-2022-33408
+	RESERVED
+CVE-2022-33407
+	RESERVED
+CVE-2022-33406
+	RESERVED
+CVE-2022-33405
+	RESERVED
+CVE-2022-33404
+	RESERVED
+CVE-2022-33403
+	RESERVED
+CVE-2022-33402
+	RESERVED
+CVE-2022-33401
+	RESERVED
+CVE-2022-33400
+	RESERVED
+CVE-2022-33399
+	RESERVED
+CVE-2022-33398
+	RESERVED
+CVE-2022-33397
+	RESERVED
+CVE-2022-33396
+	RESERVED
+CVE-2022-33395
+	RESERVED
+CVE-2022-33394
+	RESERVED
+CVE-2022-33393
+	RESERVED
+CVE-2022-33392
+	RESERVED
+CVE-2022-33391
+	RESERVED
+CVE-2022-33390
+	RESERVED
+CVE-2022-33389
+	RESERVED
+CVE-2022-33388
+	RESERVED
+CVE-2022-33387
+	RESERVED
+CVE-2022-33386
+	RESERVED
+CVE-2022-33385
+	RESERVED
+CVE-2022-33384
+	RESERVED
+CVE-2022-33383
+	RESERVED
+CVE-2022-33382
+	RESERVED
+CVE-2022-33381
+	RESERVED
+CVE-2022-33380
+	RESERVED
+CVE-2022-33379
+	RESERVED
+CVE-2022-33378
+	RESERVED
+CVE-2022-33377
+	RESERVED
+CVE-2022-33376
+	RESERVED
+CVE-2022-33375
+	RESERVED
+CVE-2022-33374
+	RESERVED
+CVE-2022-33373
+	RESERVED
+CVE-2022-33372
+	RESERVED
+CVE-2022-33371
+	RESERVED
+CVE-2022-33370
+	RESERVED
+CVE-2022-33369
+	RESERVED
+CVE-2022-33368
+	RESERVED
+CVE-2022-33367
+	RESERVED
+CVE-2022-33366
+	RESERVED
+CVE-2022-33365
+	RESERVED
+CVE-2022-33364
+	RESERVED
+CVE-2022-33363
+	RESERVED
+CVE-2022-33362
+	RESERVED
+CVE-2022-33361
+	RESERVED
+CVE-2022-33360
+	RESERVED
+CVE-2022-33359
+	RESERVED
+CVE-2022-33358
+	RESERVED
+CVE-2022-33357
+	RESERVED
+CVE-2022-33356
+	RESERVED
+CVE-2022-33355
+	RESERVED
+CVE-2022-33354
+	RESERVED
+CVE-2022-33353
+	RESERVED
+CVE-2022-33352
+	RESERVED
+CVE-2022-33351
+	RESERVED
+CVE-2022-33350
+	RESERVED
+CVE-2022-33349
+	RESERVED
+CVE-2022-33348
+	RESERVED
+CVE-2022-33347
+	RESERVED
+CVE-2022-33346
+	RESERVED
+CVE-2022-33345
+	RESERVED
+CVE-2022-33344
+	RESERVED
+CVE-2022-33343
+	RESERVED
+CVE-2022-33342
+	RESERVED
+CVE-2022-33341
+	RESERVED
+CVE-2022-33340
+	RESERVED
+CVE-2022-33339
+	RESERVED
+CVE-2022-33338
+	RESERVED
+CVE-2022-33337
+	RESERVED
+CVE-2022-33336
+	RESERVED
+CVE-2022-33335
+	RESERVED
+CVE-2022-33334
+	RESERVED
+CVE-2022-33333
+	RESERVED
+CVE-2022-33332
+	RESERVED
+CVE-2022-33331
+	RESERVED
+CVE-2022-33330
+	RESERVED
+CVE-2022-2085
+	RESERVED
+CVE-2022-2084
+	RESERVED
+CVE-2022-2083
+	RESERVED
 CVE-2022-33329
 	RESERVED
 CVE-2022-33328
@@ -2207,28 +3025,28 @@ CVE-2022-32365 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /
 	NOT-FOR-US: Product Show Room Site
 CVE-2022-32364 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
 	NOT-FOR-US: Product Show Room Site
-CVE-2022-32363
-	RESERVED
-CVE-2022-32362
-	RESERVED
+CVE-2022-32363 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+	TODO: check
+CVE-2022-32362 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+	TODO: check
 CVE-2022-32361
 	RESERVED
 CVE-2022-32360
 	RESERVED
-CVE-2022-32359
-	RESERVED
-CVE-2022-32358
-	RESERVED
+CVE-2022-32359 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/c ...)
+	TODO: check
+CVE-2022-32358 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/c ...)
+	TODO: check
 CVE-2022-32357
 	RESERVED
 CVE-2022-32356
 	RESERVED
-CVE-2022-32355
-	RESERVED
-CVE-2022-32354
-	RESERVED
-CVE-2022-32353
-	RESERVED
+CVE-2022-32355 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+	TODO: check
+CVE-2022-32354 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+	TODO: check
+CVE-2022-32353 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/a ...)
+	TODO: check
 CVE-2022-32352 (Hospital's Patient Records Management System v1.0 is vulnerable to SQL ...)
 	NOT-FOR-US: Hospital's Patient Records Management System
 CVE-2022-32351 (Hospital's Patient Records Management System v1.0 is vulnerable to SQL ...)
@@ -2582,24 +3400,24 @@ CVE-2022-32245
 	RESERVED
 CVE-2022-32244
 	RESERVED
-CVE-2022-32243
-	RESERVED
-CVE-2022-32242
-	RESERVED
-CVE-2022-32241
-	RESERVED
-CVE-2022-32240
-	RESERVED
-CVE-2022-32239
-	RESERVED
-CVE-2022-32238
-	RESERVED
-CVE-2022-32237
-	RESERVED
-CVE-2022-32236
-	RESERVED
-CVE-2022-32235
-	RESERVED
+CVE-2022-32243 (When a user opens manipulated Scalable Vector Graphics (.svg, svg.x3d) ...)
+	TODO: check
+CVE-2022-32242 (When a user opens manipulated Radiance Picture (.hdr, hdr.x3d) files r ...)
+	TODO: check
+CVE-2022-32241 (When a user opens manipulated Portable Document Format (.pdf, PDFView. ...)
+	TODO: check
+CVE-2022-32240 (When a user opens manipulated Jupiter Tesselation (.jt, JTReader.x3d)  ...)
+	TODO: check
+CVE-2022-32239 (When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files receive ...)
+	TODO: check
+CVE-2022-32238 (When a user opens manipulated Encapsulated Post Script (.eps, ai.x3d)  ...)
+	TODO: check
+CVE-2022-32237 (When a user opens manipulated Computer Graphics Metafile (.cgm, CgmCor ...)
+	TODO: check
+CVE-2022-32236 (When a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files rece ...)
+	TODO: check
+CVE-2022-32235 (When a user opens manipulated AutoCAD (.dwg, TeighaTranslator.exe) fil ...)
+	TODO: check
 CVE-2022-1987 (Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0. ...)
 	- libmobi 0.11+dfsg-1
 	NOTE: https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f/
@@ -2634,8 +3452,8 @@ CVE-2022-1978
 	RESERVED
 CVE-2022-1977
 	RESERVED
-CVE-2022-32230
-	RESERVED
+CVE-2022-32230 (Microsoft Windows SMBv3 suffers from a null pointer dereference in ver ...)
+	TODO: check
 CVE-2022-32229
 	RESERVED
 CVE-2022-32228
@@ -4581,20 +5399,20 @@ CVE-2022-31597
 	RESERVED
 CVE-2022-31596
 	RESERVED
-CVE-2022-31595
-	RESERVED
-CVE-2022-31594
-	RESERVED
+CVE-2022-31595 (SAP Financial Consolidation - version 1010,�does not perform ne ...)
+	TODO: check
+CVE-2022-31594 (A highly privileged user can exploit SUID-root program to escalate his ...)
+	TODO: check
 CVE-2022-31593
 	RESERVED
 CVE-2022-31592
 	RESERVED
 CVE-2022-31591
 	RESERVED
-CVE-2022-31590
-	RESERVED
-CVE-2022-31589
-	RESERVED
+CVE-2022-31590 (SAP PowerDesigner Proxy - version 16.7, allows an attacker with low pr ...)
+	TODO: check
+CVE-2022-31589 (Due to improper authorization check, business users who are using Isra ...)
+	TODO: check
 CVE-2022-31588
 	RESERVED
 CVE-2022-31587
@@ -5752,8 +6570,8 @@ CVE-2022-31068
 	RESERVED
 CVE-2022-31067
 	RESERVED
-CVE-2022-31066
-	RESERVED
+CVE-2022-31066 (EdgeX Foundry is an open source project for building a common open fra ...)
+	TODO: check
 CVE-2022-31065
 	RESERVED
 CVE-2022-31064
@@ -5764,10 +6582,10 @@ CVE-2022-31062
 	RESERVED
 CVE-2022-31061
 	RESERVED
-CVE-2022-31060
-	RESERVED
-CVE-2022-31059
-	RESERVED
+CVE-2022-31060 (Discourse is an open-source discussion platform. Prior to version 2.8. ...)
+	TODO: check
+CVE-2022-31059 (Discourse Calendar is a calendar plugin for Discourse, an open-source  ...)
+	TODO: check
 CVE-2022-31058
 	RESERVED
 CVE-2022-31057
@@ -5784,16 +6602,16 @@ CVE-2022-31052
 	RESERVED
 CVE-2022-31051 (semantic-release is an open source npm package for automated version m ...)
 	TODO: check
-CVE-2022-31050
-	RESERVED
-CVE-2022-31049
-	RESERVED
-CVE-2022-31048
-	RESERVED
-CVE-2022-31047
-	RESERVED
-CVE-2022-31046
-	RESERVED
+CVE-2022-31050 (TYPO3 is an open source web content management system. Prior to versio ...)
+	TODO: check
+CVE-2022-31049 (TYPO3 is an open source web content management system. Prior to versio ...)
+	TODO: check
+CVE-2022-31048 (TYPO3 is an open source web content management system. Prior to versio ...)
+	TODO: check
+CVE-2022-31047 (TYPO3 is an open source web content management system. Prior to versio ...)
+	TODO: check
+CVE-2022-31046 (TYPO3 is an open source web content management system. Prior to versio ...)
+	TODO: check
 CVE-2022-31045 (Istio is an open platform to connect, manage, and secure microservices ...)
 	NOT-FOR-US: Istio
 CVE-2022-31044
@@ -10067,16 +10885,16 @@ CVE-2022-29620 (** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain clea
 	TODO: check
 CVE-2022-29619
 	RESERVED
-CVE-2022-29618
-	RESERVED
+CVE-2022-29618 (Due to insufficient input validation, SAP NetWeaver Development Infras ...)
+	TODO: check
 CVE-2022-29617 (Due to improper error handling an authenticated user can crash CLA ass ...)
 	NOT-FOR-US: CLA assistant
 CVE-2022-29616 (SAP Host Agent, SAP NetWeaver and ABAP Platform allow an attacker to l ...)
 	NOT-FOR-US: SAP
-CVE-2022-29615
-	RESERVED
-CVE-2022-29614
-	RESERVED
+CVE-2022-29615 (SAP NetWeaver Developer Studio (NWDS) - version 7.50, is based on Ecli ...)
+	TODO: check
+CVE-2022-29614 (SAP startservice - of SAP NetWeaver Application Server ABAP, Applicati ...)
+	TODO: check
 CVE-2022-29613 (Due to insufficient input validation, SAP Employee Self Service allows ...)
 	NOT-FOR-US: SAP
 CVE-2022-29612 (SAP NetWeaver, ABAP Platform and SAP Host Agent - versions KERNEL 7.22 ...)
@@ -11199,8 +12017,8 @@ CVE-2022-29242 (GOST engine is a reference implementation of the Russian GOST cr
 	NOTE: https://github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c (v3.0.1)
 	NOTE: https://github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808 (v3.0.1)
 	NOTE: https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3 (v3.0.1)
-CVE-2022-29241
-	RESERVED
+CVE-2022-29241 (Jupyter Server provides the backend (i.e. the core services, APIs, and ...)
+	TODO: check
 CVE-2022-29240
 	RESERVED
 CVE-2022-29239



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf8c4626880f9997283a4d1c3aaa7404840fedc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf8c4626880f9997283a4d1c3aaa7404840fedc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220615/2657e97d/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list