Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6fb434b3 by security tracker role at 2022-10-26T20:10:22+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,383 @@
+CVE-2022-43932
+       RESERVED
+CVE-2022-43931
+       RESERVED
+CVE-2022-43930
+       RESERVED
+CVE-2022-43929
+       RESERVED
+CVE-2022-43928
+       RESERVED
+CVE-2022-43927
+       RESERVED
+CVE-2022-43926
+       RESERVED
+CVE-2022-43925
+       RESERVED
+CVE-2022-43924
+       RESERVED
+CVE-2022-43923
+       RESERVED
+CVE-2022-43922
+       RESERVED
+CVE-2022-43921
+       RESERVED
+CVE-2022-43920
+       RESERVED
+CVE-2022-43919
+       RESERVED
+CVE-2022-43918
+       RESERVED
+CVE-2022-43917
+       RESERVED
+CVE-2022-43916
+       RESERVED
+CVE-2022-43915
+       RESERVED
+CVE-2022-43914
+       RESERVED
+CVE-2022-43913
+       RESERVED
+CVE-2022-43912
+       RESERVED
+CVE-2022-43911
+       RESERVED
+CVE-2022-43910
+       RESERVED
+CVE-2022-43909
+       RESERVED
+CVE-2022-43908
+       RESERVED
+CVE-2022-43907
+       RESERVED
+CVE-2022-43906
+       RESERVED
+CVE-2022-43905
+       RESERVED
+CVE-2022-43904
+       RESERVED
+CVE-2022-43903
+       RESERVED
+CVE-2022-43902
+       RESERVED
+CVE-2022-43901
+       RESERVED
+CVE-2022-43900
+       RESERVED
+CVE-2022-43899
+       RESERVED
+CVE-2022-43898
+       RESERVED
+CVE-2022-43897
+       RESERVED
+CVE-2022-43896
+       RESERVED
+CVE-2022-43895
+       RESERVED
+CVE-2022-43894
+       RESERVED
+CVE-2022-43893
+       RESERVED
+CVE-2022-43892
+       RESERVED
+CVE-2022-43891
+       RESERVED
+CVE-2022-43890
+       RESERVED
+CVE-2022-43889
+       RESERVED
+CVE-2022-43888
+       RESERVED
+CVE-2022-43887
+       RESERVED
+CVE-2022-43886
+       RESERVED
+CVE-2022-43885
+       RESERVED
+CVE-2022-43884
+       RESERVED
+CVE-2022-43883
+       RESERVED
+CVE-2022-43882
+       RESERVED
+CVE-2022-43881
+       RESERVED
+CVE-2022-43880
+       RESERVED
+CVE-2022-43879
+       RESERVED
+CVE-2022-43878
+       RESERVED
+CVE-2022-43877
+       RESERVED
+CVE-2022-43876
+       RESERVED
+CVE-2022-43875
+       RESERVED
+CVE-2022-43874
+       RESERVED
+CVE-2022-43873
+       RESERVED
+CVE-2022-43872
+       RESERVED
+CVE-2022-43871
+       RESERVED
+CVE-2022-43870
+       RESERVED
+CVE-2022-43869
+       RESERVED
+CVE-2022-43868
+       RESERVED
+CVE-2022-43867
+       RESERVED
+CVE-2022-43866
+       RESERVED
+CVE-2022-43865
+       RESERVED
+CVE-2022-43864
+       RESERVED
+CVE-2022-43863
+       RESERVED
+CVE-2022-43862
+       RESERVED
+CVE-2022-43861
+       RESERVED
+CVE-2022-43860
+       RESERVED
+CVE-2022-43859
+       RESERVED
+CVE-2022-43858
+       RESERVED
+CVE-2022-43857
+       RESERVED
+CVE-2022-43856
+       RESERVED
+CVE-2022-43855
+       RESERVED
+CVE-2022-43854
+       RESERVED
+CVE-2022-43853
+       RESERVED
+CVE-2022-43852
+       RESERVED
+CVE-2022-43851
+       RESERVED
+CVE-2022-43850
+       RESERVED
+CVE-2022-43849
+       RESERVED
+CVE-2022-43848
+       RESERVED
+CVE-2022-43847
+       RESERVED
+CVE-2022-43846
+       RESERVED
+CVE-2022-43845
+       RESERVED
+CVE-2022-43844
+       RESERVED
+CVE-2022-43843
+       RESERVED
+CVE-2022-43842
+       RESERVED
+CVE-2022-43841
+       RESERVED
+CVE-2022-43840
+       RESERVED
+CVE-2022-43839
+       RESERVED
+CVE-2022-43838
+       RESERVED
+CVE-2022-43837
+       RESERVED
+CVE-2022-43836
+       RESERVED
+CVE-2022-43835
+       RESERVED
+CVE-2022-43834
+       RESERVED
+CVE-2022-43833
+       RESERVED
+CVE-2022-43832
+       RESERVED
+CVE-2022-43831
+       RESERVED
+CVE-2022-43830
+       RESERVED
+CVE-2022-43829
+       RESERVED
+CVE-2022-43828
+       RESERVED
+CVE-2022-43827
+       RESERVED
+CVE-2022-43826
+       RESERVED
+CVE-2022-43825
+       RESERVED
+CVE-2022-43824
+       RESERVED
+CVE-2022-43823
+       RESERVED
+CVE-2022-43822
+       RESERVED
+CVE-2022-43821
+       RESERVED
+CVE-2022-43820
+       RESERVED
+CVE-2022-43819
+       RESERVED
+CVE-2022-43818
+       RESERVED
+CVE-2022-43817
+       RESERVED
+CVE-2022-43816
+       RESERVED
+CVE-2022-43815
+       RESERVED
+CVE-2022-43814
+       RESERVED
+CVE-2022-43813
+       RESERVED
+CVE-2022-43812
+       RESERVED
+CVE-2022-43811
+       RESERVED
+CVE-2022-43810
+       RESERVED
+CVE-2022-43809
+       RESERVED
+CVE-2022-43808
+       RESERVED
+CVE-2022-43807
+       RESERVED
+CVE-2022-43806
+       RESERVED
+CVE-2022-43805
+       RESERVED
+CVE-2022-43804
+       RESERVED
+CVE-2022-43803
+       RESERVED
+CVE-2022-43802
+       RESERVED
+CVE-2022-43801
+       RESERVED
+CVE-2022-43800
+       RESERVED
+CVE-2022-43799
+       RESERVED
+CVE-2022-43798
+       RESERVED
+CVE-2022-43797
+       RESERVED
+CVE-2022-43796
+       RESERVED
+CVE-2022-43795
+       RESERVED
+CVE-2022-43794
+       RESERVED
+CVE-2022-43793
+       RESERVED
+CVE-2022-43792
+       RESERVED
+CVE-2022-43791
+       RESERVED
+CVE-2022-43790
+       RESERVED
+CVE-2022-43789
+       RESERVED
+CVE-2022-43788
+       RESERVED
+CVE-2022-43787
+       RESERVED
+CVE-2022-43786
+       RESERVED
+CVE-2022-43785
+       RESERVED
+CVE-2022-43784
+       RESERVED
+CVE-2022-43783
+       RESERVED
+CVE-2022-43782
+       RESERVED
+CVE-2022-43781
+       RESERVED
+CVE-2022-43780
+       RESERVED
+CVE-2022-43779
+       RESERVED
+CVE-2022-43778
+       RESERVED
+CVE-2022-43777
+       RESERVED
+CVE-2022-43776 (The url parameter of the /api/geojson endpoint in Metabase 
versions &l ...)
+       TODO: check
+CVE-2022-43775 (The HICT_Loop class in Delta Electronics DIAEnergy v1.9 
contains a SQL ...)
+       TODO: check
+CVE-2022-43774 (The HandlerPageP_KID class in Delta Electronics DIAEnergy v1.9 
contain ...)
+       TODO: check
+CVE-2022-43773
+       RESERVED
+CVE-2022-43772
+       RESERVED
+CVE-2022-43771
+       RESERVED
+CVE-2022-43770
+       RESERVED
+CVE-2022-43769
+       RESERVED
+CVE-2022-43768
+       RESERVED
+CVE-2022-43767
+       RESERVED
+CVE-2022-43766 (Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are 
vulnerable ...)
+       TODO: check
+CVE-2022-43765
+       RESERVED
+CVE-2022-43764
+       RESERVED
+CVE-2022-43763
+       RESERVED
+CVE-2022-43762
+       RESERVED
+CVE-2022-43761
+       RESERVED
+CVE-2022-3705
+       RESERVED
+CVE-2022-3704
+       RESERVED
+CVE-2022-3703
+       RESERVED
+CVE-2022-3702
+       RESERVED
+CVE-2022-3701
+       RESERVED
+CVE-2022-3700
+       RESERVED
+CVE-2022-3699
+       RESERVED
+CVE-2022-3698
+       RESERVED
+CVE-2022-3697
+       RESERVED
+CVE-2022-3696
+       RESERVED
+CVE-2022-3695
+       RESERVED
+CVE-2022-3694
+       RESERVED
+CVE-2022-3693
+       RESERVED
+CVE-2022-3692
+       RESERVED
+CVE-2022-3691
+       RESERVED
+CVE-2022-3690
+       RESERVED
+CVE-2022-3689
+       RESERVED
+CVE-2022-3688
+       RESERVED
 CVE-2022-43760
        RESERVED
 CVE-2022-43759
@@ -22,10 +402,10 @@ CVE-2022-43750 (drivers/usb/mon/mon_bin.c in usbmon in the 
Linux kernel before 5
        - linux 6.0.2-1
        [bullseye] - linux 5.10.148-1
        NOTE: 
https://git.kernel.org/linus/a659daf63d16aa883be42f3f34ff84235c302198 (6.1-rc1)
-CVE-2022-43749
-       RESERVED
-CVE-2022-43748
-       RESERVED
+CVE-2022-43749 (Improper privilege management vulnerability in summary report 
manageme ...)
+       TODO: check
+CVE-2022-43748 (Improper limitation of a pathname to a restricted directory 
('Path Tra ...)
+       TODO: check
 CVE-2022-43747 (baramundi Management Agent (bMA) in baramundi Management Suite 
(bMS) 2 ...)
        NOT-FOR-US: baramundi
 CVE-2022-3687
@@ -241,32 +621,32 @@ CVE-2022-3676 (In Eclipse Openj9 before version 0.35.0, 
interface calls can be i
        NOT-FOR-US: Eclipse Openj9
 CVE-2022-3675
        RESERVED
-CVE-2022-3674
-       RESERVED
-CVE-2022-3673
-       RESERVED
-CVE-2022-3672
-       RESERVED
-CVE-2022-3671
-       RESERVED
-CVE-2022-3670
-       RESERVED
-CVE-2022-3669
-       RESERVED
-CVE-2022-3668
-       RESERVED
-CVE-2022-3667
-       RESERVED
-CVE-2022-3666
-       RESERVED
-CVE-2022-3665
-       RESERVED
-CVE-2022-3664
-       RESERVED
-CVE-2022-3663
-       RESERVED
-CVE-2022-3662
-       RESERVED
+CVE-2022-3674 (A vulnerability has been found in SourceCodester Sanitization 
Manageme ...)
+       TODO: check
+CVE-2022-3673 (A vulnerability, which was classified as problematic, was found 
in Sou ...)
+       TODO: check
+CVE-2022-3672 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2022-3671 (A vulnerability classified as critical was found in 
SourceCodester eLe ...)
+       TODO: check
+CVE-2022-3670 (A vulnerability was found in Axiomatic Bento4. It has been 
classified  ...)
+       TODO: check
+CVE-2022-3669 (A vulnerability was found in Axiomatic Bento4 and classified as 
proble ...)
+       TODO: check
+CVE-2022-3668 (A vulnerability has been found in Axiomatic Bento4 and 
classified as p ...)
+       TODO: check
+CVE-2022-3667 (A vulnerability, which was classified as critical, was found in 
Axioma ...)
+       TODO: check
+CVE-2022-3666 (A vulnerability, which was classified as critical, has been 
found in A ...)
+       TODO: check
+CVE-2022-3665 (A vulnerability classified as critical was found in Axiomatic 
Bento4.  ...)
+       TODO: check
+CVE-2022-3664 (A vulnerability classified as critical has been found in 
Axiomatic Ben ...)
+       TODO: check
+CVE-2022-3663 (A vulnerability was found in Axiomatic Bento4. It has been 
rated as pr ...)
+       TODO: check
+CVE-2022-3662 (A vulnerability was found in Axiomatic Bento4. It has been 
declared as ...)
+       TODO: check
 CVE-2021-46850 (myVesta Control Panel before 0.9.8-26-43 and Vesta Control 
Panel befor ...)
        NOT-FOR-US: myVesta Control Panel
 CVE-2021-46849 (pikepdf before 2.10.0 allows an XXE attack against PDF XMP 
metadata pa ...)
@@ -379,42 +759,52 @@ CVE-2022-43608
        RESERVED
 CVE-2022-3661
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3660
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3659
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3658
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3657
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3656
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3655
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3654
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3653
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3652
        RESERVED
+       {DSA-5261-1}
        - chromium 107.0.5304.68-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3651
@@ -1895,18 +2285,18 @@ CVE-2022-43005
        RESERVED
 CVE-2022-43004
        RESERVED
-CVE-2022-43003
-       RESERVED
-CVE-2022-43002
-       RESERVED
-CVE-2022-43001
-       RESERVED
-CVE-2022-43000
-       RESERVED
-CVE-2022-42999
-       RESERVED
-CVE-2022-42998
-       RESERVED
+CVE-2022-43003 (D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack 
overflow  ...)
+       TODO: check
+CVE-2022-43002 (D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack 
overflow  ...)
+       TODO: check
+CVE-2022-43001 (D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack 
overflow  ...)
+       TODO: check
+CVE-2022-43000 (D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack 
overflow  ...)
+       TODO: check
+CVE-2022-42999 (D-Link DIR-816 A2 1.10 B05 was discovered to contain multiple 
command  ...)
+       TODO: check
+CVE-2022-42998 (D-Link DIR-816 A2 1.10 B05 was discovered to contain a stack 
overflow  ...)
+       TODO: check
 CVE-2022-42997
        RESERVED
 CVE-2022-42996
@@ -2425,8 +2815,8 @@ CVE-2022-3476
        RESERVED
 CVE-2022-3475
        RESERVED
-CVE-2022-3474
-       RESERVED
+CVE-2022-3474 (A bad credential handling in the remote assets API for Bazel 
versions  ...)
+       TODO: check
 CVE-2022-3473 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
        NOT-FOR-US: SourceCodester
 CVE-2022-3472 (A vulnerability was found in SourceCodester Human Resource 
Management  ...)
@@ -3441,8 +3831,8 @@ CVE-2022-3420
        RESERVED
 CVE-2022-3419
        RESERVED
-CVE-2022-42468
-       RESERVED
+CVE-2022-42468 (Apache Flume versions 1.4.0 through 1.10.1 are vulnerable to a 
remote  ...)
+       TODO: check
 CVE-2022-42467 (When running in prototype mode, the h2 webconsole module 
(accessible f ...)
        NOT-FOR-US: Apache Isis
 CVE-2022-42466 (Prior to 2.0.0-M9, it was possible for an end-user to set the 
value of ...)
@@ -8762,8 +9152,8 @@ CVE-2022-40240
        RESERVED
 CVE-2022-40239
        RESERVED
-CVE-2022-40238
-       RESERVED
+CVE-2022-40238 (A Remote Code Injection vulnerability exists in CERT software 
prior to ...)
+       TODO: check
 CVE-2022-3169 (A flaw was found in the Linux kernel. A denial of service flaw 
may occ ...)
        - linux <unfixed>
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2125341
@@ -9487,8 +9877,8 @@ CVE-2022-39946
        RESERVED
 CVE-2022-39945
        RESERVED
-CVE-2022-39944
-       RESERVED
+CVE-2022-39944 (In Apache Linkis &lt;=1.2.0 when used with the MySQL 
Connector/J, a de ...)
+       TODO: check
 CVE-2022-39943
        RESERVED
 CVE-2022-39942
@@ -10760,18 +11150,18 @@ CVE-2022-39364
        RESERVED
 CVE-2022-39363
        RESERVED
-CVE-2022-39362
-       RESERVED
-CVE-2022-39361
-       RESERVED
-CVE-2022-39360
-       RESERVED
-CVE-2022-39359
-       RESERVED
-CVE-2022-39358
-       RESERVED
-CVE-2022-39357
-       RESERVED
+CVE-2022-39362 (Metabase is data visualization software. Prior to versions 
0.44.5, 1.4 ...)
+       TODO: check
+CVE-2022-39361 (Metabase is data visualization software. Prior to versions 
0.44.5, 1.4 ...)
+       TODO: check
+CVE-2022-39360 (Metabase is data visualization software. Prior to versions 
0.44.5, 1.4 ...)
+       TODO: check
+CVE-2022-39359 (Metabase is data visualization software. Prior to versions 
0.44.5, 1.4 ...)
+       TODO: check
+CVE-2022-39358 (Metabase is data visualization software. Prior to versions 
0.44.5, 1.4 ...)
+       TODO: check
+CVE-2022-39357 (Winter is a free, open-source content management system based 
on the L ...)
+       TODO: check
 CVE-2022-39356
        RESERVED
 CVE-2022-39355
@@ -16896,8 +17286,8 @@ CVE-2022-37204 (Final CMS 5.1.0 is vulnerable to SQL 
Injection. ...)
        NOT-FOR-US: JFinal CMS
 CVE-2022-37203 (JFinal CMS 5.1.0 is vulnerable to SQL Injection. These 
interfaces do n ...)
        NOT-FOR-US: JFinal CMS
-CVE-2022-37202
-       RESERVED
+CVE-2022-37202 (JFinal CMS 5.1.0 is vulnerable to SQL Injection via 
/admin/advicefeedb ...)
+       TODO: check
 CVE-2022-37201 (JFinal CMS 5.1.0 is vulnerable to SQL Injection. ...)
        NOT-FOR-US: JFinal CMS
 CVE-2022-37200
@@ -17950,7 +18340,7 @@ CVE-2022-36785
        RESERVED
 CVE-2022-36784
        RESERVED
-CVE-2022-36783 (AlgoSec FireFlow Reflected Cross-Site-Scripting (RXSS): A 
malicious us ...)
+CVE-2022-36783 (AlgoSec &#8211; FireFlow Reflected Cross-Site-Scripting (RXSS) 
A malic ...)
        TODO: check
 CVE-2022-36782 (Pal Electronics Systems - Pal Gate Authorization Errors. The 
vulnerabi ...)
        NOT-FOR-US: Pal Electronics Systems
@@ -20300,10 +20690,10 @@ CVE-2022-2424 (The Google Maps Anywhere WordPress 
plugin through 1.2.6.3 does no
        NOT-FOR-US: WordPress plugin
 CVE-2022-2423 (The DW Promobar WordPress plugin through 1.0.4 does not 
sanitise and e ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-2422
-       RESERVED
-CVE-2022-2421
-       RESERVED
+CVE-2022-2422 (Due to improper input validation in the Feathers js library, it 
is pos ...)
+       TODO: check
+CVE-2022-2421 (Due to improper type validation in attachment parsing the 
Socket.io js ...)
+       TODO: check
 CVE-2022-2420 (A vulnerability was found in URVE Web Manager. It has been 
rated as cr ...)
        NOT-FOR-US: URVE Web Manager
 CVE-2022-2419 (A vulnerability was found in URVE Web Manager. It has been 
declared as ...)
@@ -32931,8 +33321,8 @@ CVE-2022-1808 (Execution with Unnecessary Privileges in 
GitHub repository polone
        NOT-FOR-US: Trudesk
 CVE-2022-31257 (A vulnerability has been identified in Mendix Applications 
using Mendi ...)
        NOT-FOR-US: Mendix
-CVE-2022-31256
-       RESERVED
+CVE-2022-31256 (A Improper Link Resolution Before File Access ('Link 
Following') vulne ...)
+       TODO: check
 CVE-2022-31255
        RESERVED
 CVE-2022-31254
@@ -37026,6 +37416,7 @@ CVE-2022-29897 (On various RAD-ISM-900-EN-* devices by 
PHOENIX CONTACT an admin
 CVE-2022-29892 (Improper input validation vulnerability in Space of Cybozu 
Garoon 4.0. ...)
        NOT-FOR-US: Cybozu
 CVE-2022-29885 (The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 
10.0.0-M1  ...)
+       {DLA-3160-1}
        - tomcat9 9.0.63-1
        [bullseye] - tomcat9 <postponed> (Minor issue)
        - tomcat8 <removed>
@@ -37228,10 +37619,10 @@ CVE-2022-29824 (In libxml2 before 2.9.14, several 
buffer handling functions in b
        NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=2272
 CVE-2022-29516 (The web console of FUJITSU Network IPCOM series (IPCOM EX2 
IN(3200, 35 ...)
        NOT-FOR-US: FUJITSU
-CVE-2022-29823
-       RESERVED
-CVE-2022-29822
-       RESERVED
+CVE-2022-29823 (Feather-Sequalize cleanQuery method uses insecure recursive 
logic to f ...)
+       TODO: check
+CVE-2022-29822 (Due to improper parameter filtering in the Feathers js 
library, which  ...)
+       TODO: check
 CVE-2022-29821 (In JetBrains Rider before 2022.1 local code execution via 
links in ReS ...)
        NOT-FOR-US: JetBrains Rider
 CVE-2022-29820 (In JetBrains PyCharm before 2022.1 exposure of the debugger 
port to th ...)
@@ -57962,6 +58353,7 @@ CVE-2022-23185
 CVE-2022-23184 (In affected Octopus Server versions when the server HTTP and 
HTTPS bin ...)
        NOT-FOR-US: Octopus Server
 CVE-2022-23181 (The fix for bug CVE-2020-9484 introduced a time of check, time 
of use  ...)
+       {DLA-3160-1}
        - tomcat9 9.0.58-1
        [bullseye] - tomcat9 <postponed> (Minor issue, fix along in future DSA)
        - tomcat8 <removed>
@@ -68615,6 +69007,7 @@ CVE-2021-43982 (Delta Electronics CNCSoft Versions 
1.01.30 and prior are vulnera
 CVE-2021-43981 (mySCADA myPRO: Versions 8.20.0 and prior has a feature to send 
emails, ...)
        NOT-FOR-US: mySCADA myPRO
 CVE-2021-43980 (The simplified implementation of blocking reads and writes 
introduced  ...)
+       {DLA-3160-1}
        - tomcat9 9.0.62-1
        - tomcat8 <removed>
        NOTE: https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3
@@ -72246,20 +72639,20 @@ CVE-2022-20961
        RESERVED
 CVE-2022-20960
        RESERVED
-CVE-2022-20959
-       RESERVED
+CVE-2022-20959 (A vulnerability in the External RESTful Services (ERS) API of 
Cisco Id ...)
+       TODO: check
 CVE-2022-20958
        RESERVED
 CVE-2022-20957
        RESERVED
 CVE-2022-20956
        RESERVED
-CVE-2022-20955
-       RESERVED
-CVE-2022-20954
-       RESERVED
-CVE-2022-20953
-       RESERVED
+CVE-2022-20955 (Multiple vulnerabilities in Cisco TelePresence Collaboration 
Endpoint  ...)
+       TODO: check
+CVE-2022-20954 (Multiple vulnerabilities in Cisco TelePresence Collaboration 
Endpoint  ...)
+       TODO: check
+CVE-2022-20953 (Multiple vulnerabilities in Cisco TelePresence Collaboration 
Endpoint  ...)
+       TODO: check
 CVE-2022-20952
        RESERVED
 CVE-2022-20951
@@ -72298,8 +72691,8 @@ CVE-2022-20935
        RESERVED
 CVE-2022-20934
        RESERVED
-CVE-2022-20933
-       RESERVED
+CVE-2022-20933 (A vulnerability in the Cisco AnyConnect VPN server of Cisco 
Meraki MX  ...)
+       TODO: check
 CVE-2022-20932
        RESERVED
 CVE-2022-20931
@@ -72520,8 +72913,8 @@ CVE-2022-20824 (A vulnerability in the Cisco Discovery 
Protocol feature of Cisco
        NOT-FOR-US: Cisco
 CVE-2022-20823 (A vulnerability in the OSPF version 3 (OSPFv3) feature of 
Cisco NX-OS  ...)
        NOT-FOR-US: Cisco
-CVE-2022-20822
-       RESERVED
+CVE-2022-20822 (A vulnerability in the web-based management interface of Cisco 
Identit ...)
+       TODO: check
 CVE-2022-20821 (A vulnerability in the health check RPM of Cisco IOS XR 
Software could ...)
        NOT-FOR-US: Cisco
 CVE-2022-20820 (Multiple vulnerabilities in the web interface of Cisco Webex 
Meetings  ...)
@@ -72542,8 +72935,8 @@ CVE-2022-20813 (Multiple vulnerabilities in the API and 
in the web-based managem
        NOT-FOR-US: Cisco
 CVE-2022-20812 (Multiple vulnerabilities in the API and in the web-based 
management in ...)
        NOT-FOR-US: Cisco
-CVE-2022-20811
-       RESERVED
+CVE-2022-20811 (Multiple vulnerabilities in Cisco TelePresence Collaboration 
Endpoint  ...)
+       TODO: check
 CVE-2022-20810 (A vulnerability in the Simple Network Management Protocol 
(SNMP) of Ci ...)
        NOT-FOR-US: Cisco
 CVE-2022-20809 (Multiple vulnerabilities in the API and web-based management 
interface ...)
@@ -72626,8 +73019,8 @@ CVE-2022-20778 (A vulnerability in the authentication 
component of Cisco Webex M
        NOT-FOR-US: Cisco
 CVE-2022-20777 (Multiple vulnerabilities in Cisco Enterprise NFV 
Infrastructure Softwa ...)
        NOT-FOR-US: Cisco
-CVE-2022-20776
-       RESERVED
+CVE-2022-20776 (Multiple vulnerabilities in Cisco TelePresence Collaboration 
Endpoint  ...)
+       TODO: check
 CVE-2022-20775 (Multiple vulnerabilities in the CLI of Cisco SD-WAN Software 
could all ...)
        NOT-FOR-US: Cisco
 CVE-2022-20774 (A vulnerability in the web-based management interface of Cisco 
IP Phon ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fb434b3c25b666a129079f90706b2ba191b311d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6fb434b3c25b666a129079f90706b2ba191b311d
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to