[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Fri Nov 6 20:10:27 GMT 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e7d7de2c by security tracker role at 2020-11-06T20:10:20+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1643 @@
+CVE-2021-1050
+	RESERVED
+CVE-2021-1049
+	RESERVED
+CVE-2021-1048
+	RESERVED
+CVE-2021-1047
+	RESERVED
+CVE-2021-1046
+	RESERVED
+CVE-2021-1045
+	RESERVED
+CVE-2021-1044
+	RESERVED
+CVE-2021-1043
+	RESERVED
+CVE-2021-1042
+	RESERVED
+CVE-2021-1041
+	RESERVED
+CVE-2021-1040
+	RESERVED
+CVE-2021-1039
+	RESERVED
+CVE-2021-1038
+	RESERVED
+CVE-2021-1037
+	RESERVED
+CVE-2021-1036
+	RESERVED
+CVE-2021-1035
+	RESERVED
+CVE-2021-1034
+	RESERVED
+CVE-2021-1033
+	RESERVED
+CVE-2021-1032
+	RESERVED
+CVE-2021-1031
+	RESERVED
+CVE-2021-1030
+	RESERVED
+CVE-2021-1029
+	RESERVED
+CVE-2021-1028
+	RESERVED
+CVE-2021-1027
+	RESERVED
+CVE-2021-1026
+	RESERVED
+CVE-2021-1025
+	RESERVED
+CVE-2021-1024
+	RESERVED
+CVE-2021-1023
+	RESERVED
+CVE-2021-1022
+	RESERVED
+CVE-2021-1021
+	RESERVED
+CVE-2021-1020
+	RESERVED
+CVE-2021-1019
+	RESERVED
+CVE-2021-1018
+	RESERVED
+CVE-2021-1017
+	RESERVED
+CVE-2021-1016
+	RESERVED
+CVE-2021-1015
+	RESERVED
+CVE-2021-1014
+	RESERVED
+CVE-2021-1013
+	RESERVED
+CVE-2021-1012
+	RESERVED
+CVE-2021-1011
+	RESERVED
+CVE-2021-1010
+	RESERVED
+CVE-2021-1009
+	RESERVED
+CVE-2021-1008
+	RESERVED
+CVE-2021-1007
+	RESERVED
+CVE-2021-1006
+	RESERVED
+CVE-2021-1005
+	RESERVED
+CVE-2021-1004
+	RESERVED
+CVE-2021-1003
+	RESERVED
+CVE-2021-1002
+	RESERVED
+CVE-2021-1001
+	RESERVED
+CVE-2021-1000
+	RESERVED
+CVE-2021-0999
+	RESERVED
+CVE-2021-0998
+	RESERVED
+CVE-2021-0997
+	RESERVED
+CVE-2021-0996
+	RESERVED
+CVE-2021-0995
+	RESERVED
+CVE-2021-0994
+	RESERVED
+CVE-2021-0993
+	RESERVED
+CVE-2021-0992
+	RESERVED
+CVE-2021-0991
+	RESERVED
+CVE-2021-0990
+	RESERVED
+CVE-2021-0989
+	RESERVED
+CVE-2021-0988
+	RESERVED
+CVE-2021-0987
+	RESERVED
+CVE-2021-0986
+	RESERVED
+CVE-2021-0985
+	RESERVED
+CVE-2021-0984
+	RESERVED
+CVE-2021-0983
+	RESERVED
+CVE-2021-0982
+	RESERVED
+CVE-2021-0981
+	RESERVED
+CVE-2021-0980
+	RESERVED
+CVE-2021-0979
+	RESERVED
+CVE-2021-0978
+	RESERVED
+CVE-2021-0977
+	RESERVED
+CVE-2021-0976
+	RESERVED
+CVE-2021-0975
+	RESERVED
+CVE-2021-0974
+	RESERVED
+CVE-2021-0973
+	RESERVED
+CVE-2021-0972
+	RESERVED
+CVE-2021-0971
+	RESERVED
+CVE-2021-0970
+	RESERVED
+CVE-2021-0969
+	RESERVED
+CVE-2021-0968
+	RESERVED
+CVE-2021-0967
+	RESERVED
+CVE-2021-0966
+	RESERVED
+CVE-2021-0965
+	RESERVED
+CVE-2021-0964
+	RESERVED
+CVE-2021-0963
+	RESERVED
+CVE-2021-0962
+	RESERVED
+CVE-2021-0961
+	RESERVED
+CVE-2021-0960
+	RESERVED
+CVE-2021-0959
+	RESERVED
+CVE-2021-0958
+	RESERVED
+CVE-2021-0957
+	RESERVED
+CVE-2021-0956
+	RESERVED
+CVE-2021-0955
+	RESERVED
+CVE-2021-0954
+	RESERVED
+CVE-2021-0953
+	RESERVED
+CVE-2021-0952
+	RESERVED
+CVE-2021-0951
+	RESERVED
+CVE-2021-0950
+	RESERVED
+CVE-2021-0949
+	RESERVED
+CVE-2021-0948
+	RESERVED
+CVE-2021-0947
+	RESERVED
+CVE-2021-0946
+	RESERVED
+CVE-2021-0945
+	RESERVED
+CVE-2021-0944
+	RESERVED
+CVE-2021-0943
+	RESERVED
+CVE-2021-0942
+	RESERVED
+CVE-2021-0941
+	RESERVED
+CVE-2021-0940
+	RESERVED
+CVE-2021-0939
+	RESERVED
+CVE-2021-0938
+	RESERVED
+CVE-2021-0937
+	RESERVED
+CVE-2021-0936
+	RESERVED
+CVE-2021-0935
+	RESERVED
+CVE-2021-0934
+	RESERVED
+CVE-2021-0933
+	RESERVED
+CVE-2021-0932
+	RESERVED
+CVE-2021-0931
+	RESERVED
+CVE-2021-0930
+	RESERVED
+CVE-2021-0929
+	RESERVED
+CVE-2021-0928
+	RESERVED
+CVE-2021-0927
+	RESERVED
+CVE-2021-0926
+	RESERVED
+CVE-2021-0925
+	RESERVED
+CVE-2021-0924
+	RESERVED
+CVE-2021-0923
+	RESERVED
+CVE-2021-0922
+	RESERVED
+CVE-2021-0921
+	RESERVED
+CVE-2021-0920
+	RESERVED
+CVE-2021-0919
+	RESERVED
+CVE-2021-0918
+	RESERVED
+CVE-2021-0917
+	RESERVED
+CVE-2021-0916
+	RESERVED
+CVE-2021-0915
+	RESERVED
+CVE-2021-0914
+	RESERVED
+CVE-2021-0913
+	RESERVED
+CVE-2021-0912
+	RESERVED
+CVE-2021-0911
+	RESERVED
+CVE-2021-0910
+	RESERVED
+CVE-2021-0909
+	RESERVED
+CVE-2021-0908
+	RESERVED
+CVE-2021-0907
+	RESERVED
+CVE-2021-0906
+	RESERVED
+CVE-2021-0905
+	RESERVED
+CVE-2021-0904
+	RESERVED
+CVE-2021-0903
+	RESERVED
+CVE-2021-0902
+	RESERVED
+CVE-2021-0901
+	RESERVED
+CVE-2021-0900
+	RESERVED
+CVE-2021-0899
+	RESERVED
+CVE-2021-0898
+	RESERVED
+CVE-2021-0897
+	RESERVED
+CVE-2021-0896
+	RESERVED
+CVE-2021-0895
+	RESERVED
+CVE-2021-0894
+	RESERVED
+CVE-2021-0893
+	RESERVED
+CVE-2021-0892
+	RESERVED
+CVE-2021-0891
+	RESERVED
+CVE-2021-0890
+	RESERVED
+CVE-2021-0889
+	RESERVED
+CVE-2021-0888
+	RESERVED
+CVE-2021-0887
+	RESERVED
+CVE-2021-0886
+	RESERVED
+CVE-2021-0885
+	RESERVED
+CVE-2021-0884
+	RESERVED
+CVE-2021-0883
+	RESERVED
+CVE-2021-0882
+	RESERVED
+CVE-2021-0881
+	RESERVED
+CVE-2021-0880
+	RESERVED
+CVE-2021-0879
+	RESERVED
+CVE-2021-0878
+	RESERVED
+CVE-2021-0877
+	RESERVED
+CVE-2021-0876
+	RESERVED
+CVE-2021-0875
+	RESERVED
+CVE-2021-0874
+	RESERVED
+CVE-2021-0873
+	RESERVED
+CVE-2021-0872
+	RESERVED
+CVE-2021-0871
+	RESERVED
+CVE-2021-0870
+	RESERVED
+CVE-2021-0869
+	RESERVED
+CVE-2021-0868
+	RESERVED
+CVE-2021-0867
+	RESERVED
+CVE-2021-0866
+	RESERVED
+CVE-2021-0865
+	RESERVED
+CVE-2021-0864
+	RESERVED
+CVE-2021-0863
+	RESERVED
+CVE-2021-0862
+	RESERVED
+CVE-2021-0861
+	RESERVED
+CVE-2021-0860
+	RESERVED
+CVE-2021-0859
+	RESERVED
+CVE-2021-0858
+	RESERVED
+CVE-2021-0857
+	RESERVED
+CVE-2021-0856
+	RESERVED
+CVE-2021-0855
+	RESERVED
+CVE-2021-0854
+	RESERVED
+CVE-2021-0853
+	RESERVED
+CVE-2021-0852
+	RESERVED
+CVE-2021-0851
+	RESERVED
+CVE-2021-0850
+	RESERVED
+CVE-2021-0849
+	RESERVED
+CVE-2021-0848
+	RESERVED
+CVE-2021-0847
+	RESERVED
+CVE-2021-0846
+	RESERVED
+CVE-2021-0845
+	RESERVED
+CVE-2021-0844
+	RESERVED
+CVE-2021-0843
+	RESERVED
+CVE-2021-0842
+	RESERVED
+CVE-2021-0841
+	RESERVED
+CVE-2021-0840
+	RESERVED
+CVE-2021-0839
+	RESERVED
+CVE-2021-0838
+	RESERVED
+CVE-2021-0837
+	RESERVED
+CVE-2021-0836
+	RESERVED
+CVE-2021-0835
+	RESERVED
+CVE-2021-0834
+	RESERVED
+CVE-2021-0833
+	RESERVED
+CVE-2021-0832
+	RESERVED
+CVE-2021-0831
+	RESERVED
+CVE-2021-0830
+	RESERVED
+CVE-2021-0829
+	RESERVED
+CVE-2021-0828
+	RESERVED
+CVE-2021-0827
+	RESERVED
+CVE-2021-0826
+	RESERVED
+CVE-2021-0825
+	RESERVED
+CVE-2021-0824
+	RESERVED
+CVE-2021-0823
+	RESERVED
+CVE-2021-0822
+	RESERVED
+CVE-2021-0821
+	RESERVED
+CVE-2021-0820
+	RESERVED
+CVE-2021-0819
+	RESERVED
+CVE-2021-0818
+	RESERVED
+CVE-2021-0817
+	RESERVED
+CVE-2021-0816
+	RESERVED
+CVE-2021-0815
+	RESERVED
+CVE-2021-0814
+	RESERVED
+CVE-2021-0813
+	RESERVED
+CVE-2021-0812
+	RESERVED
+CVE-2021-0811
+	RESERVED
+CVE-2021-0810
+	RESERVED
+CVE-2021-0809
+	RESERVED
+CVE-2021-0808
+	RESERVED
+CVE-2021-0807
+	RESERVED
+CVE-2021-0806
+	RESERVED
+CVE-2021-0805
+	RESERVED
+CVE-2021-0804
+	RESERVED
+CVE-2021-0803
+	RESERVED
+CVE-2021-0802
+	RESERVED
+CVE-2021-0801
+	RESERVED
+CVE-2021-0800
+	RESERVED
+CVE-2021-0799
+	RESERVED
+CVE-2021-0798
+	RESERVED
+CVE-2021-0797
+	RESERVED
+CVE-2021-0796
+	RESERVED
+CVE-2021-0795
+	RESERVED
+CVE-2021-0794
+	RESERVED
+CVE-2021-0793
+	RESERVED
+CVE-2021-0792
+	RESERVED
+CVE-2021-0791
+	RESERVED
+CVE-2021-0790
+	RESERVED
+CVE-2021-0789
+	RESERVED
+CVE-2021-0788
+	RESERVED
+CVE-2021-0787
+	RESERVED
+CVE-2021-0786
+	RESERVED
+CVE-2021-0785
+	RESERVED
+CVE-2021-0784
+	RESERVED
+CVE-2021-0783
+	RESERVED
+CVE-2021-0782
+	RESERVED
+CVE-2021-0781
+	RESERVED
+CVE-2021-0780
+	RESERVED
+CVE-2021-0779
+	RESERVED
+CVE-2021-0778
+	RESERVED
+CVE-2021-0777
+	RESERVED
+CVE-2021-0776
+	RESERVED
+CVE-2021-0775
+	RESERVED
+CVE-2021-0774
+	RESERVED
+CVE-2021-0773
+	RESERVED
+CVE-2021-0772
+	RESERVED
+CVE-2021-0771
+	RESERVED
+CVE-2021-0770
+	RESERVED
+CVE-2021-0769
+	RESERVED
+CVE-2021-0768
+	RESERVED
+CVE-2021-0767
+	RESERVED
+CVE-2021-0766
+	RESERVED
+CVE-2021-0765
+	RESERVED
+CVE-2021-0764
+	RESERVED
+CVE-2021-0763
+	RESERVED
+CVE-2021-0762
+	RESERVED
+CVE-2021-0761
+	RESERVED
+CVE-2021-0760
+	RESERVED
+CVE-2021-0759
+	RESERVED
+CVE-2021-0758
+	RESERVED
+CVE-2021-0757
+	RESERVED
+CVE-2021-0756
+	RESERVED
+CVE-2021-0755
+	RESERVED
+CVE-2021-0754
+	RESERVED
+CVE-2021-0753
+	RESERVED
+CVE-2021-0752
+	RESERVED
+CVE-2021-0751
+	RESERVED
+CVE-2021-0750
+	RESERVED
+CVE-2021-0749
+	RESERVED
+CVE-2021-0748
+	RESERVED
+CVE-2021-0747
+	RESERVED
+CVE-2021-0746
+	RESERVED
+CVE-2021-0745
+	RESERVED
+CVE-2021-0744
+	RESERVED
+CVE-2021-0743
+	RESERVED
+CVE-2021-0742
+	RESERVED
+CVE-2021-0741
+	RESERVED
+CVE-2021-0740
+	RESERVED
+CVE-2021-0739
+	RESERVED
+CVE-2021-0738
+	RESERVED
+CVE-2021-0737
+	RESERVED
+CVE-2021-0736
+	RESERVED
+CVE-2021-0735
+	RESERVED
+CVE-2021-0734
+	RESERVED
+CVE-2021-0733
+	RESERVED
+CVE-2021-0732
+	RESERVED
+CVE-2021-0731
+	RESERVED
+CVE-2021-0730
+	RESERVED
+CVE-2021-0729
+	RESERVED
+CVE-2021-0728
+	RESERVED
+CVE-2021-0727
+	RESERVED
+CVE-2021-0726
+	RESERVED
+CVE-2021-0725
+	RESERVED
+CVE-2021-0724
+	RESERVED
+CVE-2021-0723
+	RESERVED
+CVE-2021-0722
+	RESERVED
+CVE-2021-0721
+	RESERVED
+CVE-2021-0720
+	RESERVED
+CVE-2021-0719
+	RESERVED
+CVE-2021-0718
+	RESERVED
+CVE-2021-0717
+	RESERVED
+CVE-2021-0716
+	RESERVED
+CVE-2021-0715
+	RESERVED
+CVE-2021-0714
+	RESERVED
+CVE-2021-0713
+	RESERVED
+CVE-2021-0712
+	RESERVED
+CVE-2021-0711
+	RESERVED
+CVE-2021-0710
+	RESERVED
+CVE-2021-0709
+	RESERVED
+CVE-2021-0708
+	RESERVED
+CVE-2021-0707
+	RESERVED
+CVE-2021-0706
+	RESERVED
+CVE-2021-0705
+	RESERVED
+CVE-2021-0704
+	RESERVED
+CVE-2021-0703
+	RESERVED
+CVE-2021-0702
+	RESERVED
+CVE-2021-0701
+	RESERVED
+CVE-2021-0700
+	RESERVED
+CVE-2021-0699
+	RESERVED
+CVE-2021-0698
+	RESERVED
+CVE-2021-0697
+	RESERVED
+CVE-2021-0696
+	RESERVED
+CVE-2021-0695
+	RESERVED
+CVE-2021-0694
+	RESERVED
+CVE-2021-0693
+	RESERVED
+CVE-2021-0692
+	RESERVED
+CVE-2021-0691
+	RESERVED
+CVE-2021-0690
+	RESERVED
+CVE-2021-0689
+	RESERVED
+CVE-2021-0688
+	RESERVED
+CVE-2021-0687
+	RESERVED
+CVE-2021-0686
+	RESERVED
+CVE-2021-0685
+	RESERVED
+CVE-2021-0684
+	RESERVED
+CVE-2021-0683
+	RESERVED
+CVE-2021-0682
+	RESERVED
+CVE-2021-0681
+	RESERVED
+CVE-2021-0680
+	RESERVED
+CVE-2021-0679
+	RESERVED
+CVE-2021-0678
+	RESERVED
+CVE-2021-0677
+	RESERVED
+CVE-2021-0676
+	RESERVED
+CVE-2021-0675
+	RESERVED
+CVE-2021-0674
+	RESERVED
+CVE-2021-0673
+	RESERVED
+CVE-2021-0672
+	RESERVED
+CVE-2021-0671
+	RESERVED
+CVE-2021-0670
+	RESERVED
+CVE-2021-0669
+	RESERVED
+CVE-2021-0668
+	RESERVED
+CVE-2021-0667
+	RESERVED
+CVE-2021-0666
+	RESERVED
+CVE-2021-0665
+	RESERVED
+CVE-2021-0664
+	RESERVED
+CVE-2021-0663
+	RESERVED
+CVE-2021-0662
+	RESERVED
+CVE-2021-0661
+	RESERVED
+CVE-2021-0660
+	RESERVED
+CVE-2021-0659
+	RESERVED
+CVE-2021-0658
+	RESERVED
+CVE-2021-0657
+	RESERVED
+CVE-2021-0656
+	RESERVED
+CVE-2021-0655
+	RESERVED
+CVE-2021-0654
+	RESERVED
+CVE-2021-0653
+	RESERVED
+CVE-2021-0652
+	RESERVED
+CVE-2021-0651
+	RESERVED
+CVE-2021-0650
+	RESERVED
+CVE-2021-0649
+	RESERVED
+CVE-2021-0648
+	RESERVED
+CVE-2021-0647
+	RESERVED
+CVE-2021-0646
+	RESERVED
+CVE-2021-0645
+	RESERVED
+CVE-2021-0644
+	RESERVED
+CVE-2021-0643
+	RESERVED
+CVE-2021-0642
+	RESERVED
+CVE-2021-0641
+	RESERVED
+CVE-2021-0640
+	RESERVED
+CVE-2021-0639
+	RESERVED
+CVE-2021-0638
+	RESERVED
+CVE-2021-0637
+	RESERVED
+CVE-2021-0636
+	RESERVED
+CVE-2021-0635
+	RESERVED
+CVE-2021-0634
+	RESERVED
+CVE-2021-0633
+	RESERVED
+CVE-2021-0632
+	RESERVED
+CVE-2021-0631
+	RESERVED
+CVE-2021-0630
+	RESERVED
+CVE-2021-0629
+	RESERVED
+CVE-2021-0628
+	RESERVED
+CVE-2021-0627
+	RESERVED
+CVE-2021-0626
+	RESERVED
+CVE-2021-0625
+	RESERVED
+CVE-2021-0624
+	RESERVED
+CVE-2021-0623
+	RESERVED
+CVE-2021-0622
+	RESERVED
+CVE-2021-0621
+	RESERVED
+CVE-2021-0620
+	RESERVED
+CVE-2021-0619
+	RESERVED
+CVE-2021-0618
+	RESERVED
+CVE-2021-0617
+	RESERVED
+CVE-2021-0616
+	RESERVED
+CVE-2021-0615
+	RESERVED
+CVE-2021-0614
+	RESERVED
+CVE-2021-0613
+	RESERVED
+CVE-2021-0612
+	RESERVED
+CVE-2021-0611
+	RESERVED
+CVE-2021-0610
+	RESERVED
+CVE-2021-0609
+	RESERVED
+CVE-2021-0608
+	RESERVED
+CVE-2021-0607
+	RESERVED
+CVE-2021-0606
+	RESERVED
+CVE-2021-0605
+	RESERVED
+CVE-2021-0604
+	RESERVED
+CVE-2021-0603
+	RESERVED
+CVE-2021-0602
+	RESERVED
+CVE-2021-0601
+	RESERVED
+CVE-2021-0600
+	RESERVED
+CVE-2021-0599
+	RESERVED
+CVE-2021-0598
+	RESERVED
+CVE-2021-0597
+	RESERVED
+CVE-2021-0596
+	RESERVED
+CVE-2021-0595
+	RESERVED
+CVE-2021-0594
+	RESERVED
+CVE-2021-0593
+	RESERVED
+CVE-2021-0592
+	RESERVED
+CVE-2021-0591
+	RESERVED
+CVE-2021-0590
+	RESERVED
+CVE-2021-0589
+	RESERVED
+CVE-2021-0588
+	RESERVED
+CVE-2021-0587
+	RESERVED
+CVE-2021-0586
+	RESERVED
+CVE-2021-0585
+	RESERVED
+CVE-2021-0584
+	RESERVED
+CVE-2021-0583
+	RESERVED
+CVE-2021-0582
+	RESERVED
+CVE-2021-0581
+	RESERVED
+CVE-2021-0580
+	RESERVED
+CVE-2021-0579
+	RESERVED
+CVE-2021-0578
+	RESERVED
+CVE-2021-0577
+	RESERVED
+CVE-2021-0576
+	RESERVED
+CVE-2021-0575
+	RESERVED
+CVE-2021-0574
+	RESERVED
+CVE-2021-0573
+	RESERVED
+CVE-2021-0572
+	RESERVED
+CVE-2021-0571
+	RESERVED
+CVE-2021-0570
+	RESERVED
+CVE-2021-0569
+	RESERVED
+CVE-2021-0568
+	RESERVED
+CVE-2021-0567
+	RESERVED
+CVE-2021-0566
+	RESERVED
+CVE-2021-0565
+	RESERVED
+CVE-2021-0564
+	RESERVED
+CVE-2021-0563
+	RESERVED
+CVE-2021-0562
+	RESERVED
+CVE-2021-0561
+	RESERVED
+CVE-2021-0560
+	RESERVED
+CVE-2021-0559
+	RESERVED
+CVE-2021-0558
+	RESERVED
+CVE-2021-0557
+	RESERVED
+CVE-2021-0556
+	RESERVED
+CVE-2021-0555
+	RESERVED
+CVE-2021-0554
+	RESERVED
+CVE-2021-0553
+	RESERVED
+CVE-2021-0552
+	RESERVED
+CVE-2021-0551
+	RESERVED
+CVE-2021-0550
+	RESERVED
+CVE-2021-0549
+	RESERVED
+CVE-2021-0548
+	RESERVED
+CVE-2021-0547
+	RESERVED
+CVE-2021-0546
+	RESERVED
+CVE-2021-0545
+	RESERVED
+CVE-2021-0544
+	RESERVED
+CVE-2021-0543
+	RESERVED
+CVE-2021-0542
+	RESERVED
+CVE-2021-0541
+	RESERVED
+CVE-2021-0540
+	RESERVED
+CVE-2021-0539
+	RESERVED
+CVE-2021-0538
+	RESERVED
+CVE-2021-0537
+	RESERVED
+CVE-2021-0536
+	RESERVED
+CVE-2021-0535
+	RESERVED
+CVE-2021-0534
+	RESERVED
+CVE-2021-0533
+	RESERVED
+CVE-2021-0532
+	RESERVED
+CVE-2021-0531
+	RESERVED
+CVE-2021-0530
+	RESERVED
+CVE-2021-0529
+	RESERVED
+CVE-2021-0528
+	RESERVED
+CVE-2021-0527
+	RESERVED
+CVE-2021-0526
+	RESERVED
+CVE-2021-0525
+	RESERVED
+CVE-2021-0524
+	RESERVED
+CVE-2021-0523
+	RESERVED
+CVE-2021-0522
+	RESERVED
+CVE-2021-0521
+	RESERVED
+CVE-2021-0520
+	RESERVED
+CVE-2021-0519
+	RESERVED
+CVE-2021-0518
+	RESERVED
+CVE-2021-0517
+	RESERVED
+CVE-2021-0516
+	RESERVED
+CVE-2021-0515
+	RESERVED
+CVE-2021-0514
+	RESERVED
+CVE-2021-0513
+	RESERVED
+CVE-2021-0512
+	RESERVED
+CVE-2021-0511
+	RESERVED
+CVE-2021-0510
+	RESERVED
+CVE-2021-0509
+	RESERVED
+CVE-2021-0508
+	RESERVED
+CVE-2021-0507
+	RESERVED
+CVE-2021-0506
+	RESERVED
+CVE-2021-0505
+	RESERVED
+CVE-2021-0504
+	RESERVED
+CVE-2021-0503
+	RESERVED
+CVE-2021-0502
+	RESERVED
+CVE-2021-0501
+	RESERVED
+CVE-2021-0500
+	RESERVED
+CVE-2021-0499
+	RESERVED
+CVE-2021-0498
+	RESERVED
+CVE-2021-0497
+	RESERVED
+CVE-2021-0496
+	RESERVED
+CVE-2021-0495
+	RESERVED
+CVE-2021-0494
+	RESERVED
+CVE-2021-0493
+	RESERVED
+CVE-2021-0492
+	RESERVED
+CVE-2021-0491
+	RESERVED
+CVE-2021-0490
+	RESERVED
+CVE-2021-0489
+	RESERVED
+CVE-2021-0488
+	RESERVED
+CVE-2021-0487
+	RESERVED
+CVE-2021-0486
+	RESERVED
+CVE-2021-0485
+	RESERVED
+CVE-2021-0484
+	RESERVED
+CVE-2021-0483
+	RESERVED
+CVE-2021-0482
+	RESERVED
+CVE-2021-0481
+	RESERVED
+CVE-2021-0480
+	RESERVED
+CVE-2021-0479
+	RESERVED
+CVE-2021-0478
+	RESERVED
+CVE-2021-0477
+	RESERVED
+CVE-2021-0476
+	RESERVED
+CVE-2021-0475
+	RESERVED
+CVE-2021-0474
+	RESERVED
+CVE-2021-0473
+	RESERVED
+CVE-2021-0472
+	RESERVED
+CVE-2021-0471
+	RESERVED
+CVE-2021-0470
+	RESERVED
+CVE-2021-0469
+	RESERVED
+CVE-2021-0468
+	RESERVED
+CVE-2021-0467
+	RESERVED
+CVE-2021-0466
+	RESERVED
+CVE-2021-0465
+	RESERVED
+CVE-2021-0464
+	RESERVED
+CVE-2021-0463
+	RESERVED
+CVE-2021-0462
+	RESERVED
+CVE-2021-0461
+	RESERVED
+CVE-2021-0460
+	RESERVED
+CVE-2021-0459
+	RESERVED
+CVE-2021-0458
+	RESERVED
+CVE-2021-0457
+	RESERVED
+CVE-2021-0456
+	RESERVED
+CVE-2021-0455
+	RESERVED
+CVE-2021-0454
+	RESERVED
+CVE-2021-0453
+	RESERVED
+CVE-2021-0452
+	RESERVED
+CVE-2021-0451
+	RESERVED
+CVE-2021-0450
+	RESERVED
+CVE-2021-0449
+	RESERVED
+CVE-2021-0448
+	RESERVED
+CVE-2021-0447
+	RESERVED
+CVE-2021-0446
+	RESERVED
+CVE-2021-0445
+	RESERVED
+CVE-2021-0444
+	RESERVED
+CVE-2021-0443
+	RESERVED
+CVE-2021-0442
+	RESERVED
+CVE-2021-0441
+	RESERVED
+CVE-2021-0440
+	RESERVED
+CVE-2021-0439
+	RESERVED
+CVE-2021-0438
+	RESERVED
+CVE-2021-0437
+	RESERVED
+CVE-2021-0436
+	RESERVED
+CVE-2021-0435
+	RESERVED
+CVE-2021-0434
+	RESERVED
+CVE-2021-0433
+	RESERVED
+CVE-2021-0432
+	RESERVED
+CVE-2021-0431
+	RESERVED
+CVE-2021-0430
+	RESERVED
+CVE-2021-0429
+	RESERVED
+CVE-2021-0428
+	RESERVED
+CVE-2021-0427
+	RESERVED
+CVE-2021-0426
+	RESERVED
+CVE-2021-0425
+	RESERVED
+CVE-2021-0424
+	RESERVED
+CVE-2021-0423
+	RESERVED
+CVE-2021-0422
+	RESERVED
+CVE-2021-0421
+	RESERVED
+CVE-2021-0420
+	RESERVED
+CVE-2021-0419
+	RESERVED
+CVE-2021-0418
+	RESERVED
+CVE-2021-0417
+	RESERVED
+CVE-2021-0416
+	RESERVED
+CVE-2021-0415
+	RESERVED
+CVE-2021-0414
+	RESERVED
+CVE-2021-0413
+	RESERVED
+CVE-2021-0412
+	RESERVED
+CVE-2021-0411
+	RESERVED
+CVE-2021-0410
+	RESERVED
+CVE-2021-0409
+	RESERVED
+CVE-2021-0408
+	RESERVED
+CVE-2021-0407
+	RESERVED
+CVE-2021-0406
+	RESERVED
+CVE-2021-0405
+	RESERVED
+CVE-2021-0404
+	RESERVED
+CVE-2021-0403
+	RESERVED
+CVE-2021-0402
+	RESERVED
+CVE-2021-0401
+	RESERVED
+CVE-2021-0400
+	RESERVED
+CVE-2021-0399
+	RESERVED
+CVE-2021-0398
+	RESERVED
+CVE-2021-0397
+	RESERVED
+CVE-2021-0396
+	RESERVED
+CVE-2021-0395
+	RESERVED
+CVE-2021-0394
+	RESERVED
+CVE-2021-0393
+	RESERVED
+CVE-2021-0392
+	RESERVED
+CVE-2021-0391
+	RESERVED
+CVE-2021-0390
+	RESERVED
+CVE-2021-0389
+	RESERVED
+CVE-2021-0388
+	RESERVED
+CVE-2021-0387
+	RESERVED
+CVE-2021-0386
+	RESERVED
+CVE-2021-0385
+	RESERVED
+CVE-2021-0384
+	RESERVED
+CVE-2021-0383
+	RESERVED
+CVE-2021-0382
+	RESERVED
+CVE-2021-0381
+	RESERVED
+CVE-2021-0380
+	RESERVED
+CVE-2021-0379
+	RESERVED
+CVE-2021-0378
+	RESERVED
+CVE-2021-0377
+	RESERVED
+CVE-2021-0376
+	RESERVED
+CVE-2021-0375
+	RESERVED
+CVE-2021-0374
+	RESERVED
+CVE-2021-0373
+	RESERVED
+CVE-2021-0372
+	RESERVED
+CVE-2021-0371
+	RESERVED
+CVE-2021-0370
+	RESERVED
+CVE-2021-0369
+	RESERVED
+CVE-2021-0368
+	RESERVED
+CVE-2021-0367
+	RESERVED
+CVE-2021-0366
+	RESERVED
+CVE-2021-0365
+	RESERVED
+CVE-2021-0364
+	RESERVED
+CVE-2021-0363
+	RESERVED
+CVE-2021-0362
+	RESERVED
+CVE-2021-0361
+	RESERVED
+CVE-2021-0360
+	RESERVED
+CVE-2021-0359
+	RESERVED
+CVE-2021-0358
+	RESERVED
+CVE-2021-0357
+	RESERVED
+CVE-2021-0356
+	RESERVED
+CVE-2021-0355
+	RESERVED
+CVE-2021-0354
+	RESERVED
+CVE-2021-0353
+	RESERVED
+CVE-2021-0352
+	RESERVED
+CVE-2021-0351
+	RESERVED
+CVE-2021-0350
+	RESERVED
+CVE-2021-0349
+	RESERVED
+CVE-2021-0348
+	RESERVED
+CVE-2021-0347
+	RESERVED
+CVE-2021-0346
+	RESERVED
+CVE-2021-0345
+	RESERVED
+CVE-2021-0344
+	RESERVED
+CVE-2021-0343
+	RESERVED
+CVE-2021-0342
+	RESERVED
+CVE-2021-0341
+	RESERVED
+CVE-2021-0340
+	RESERVED
+CVE-2021-0339
+	RESERVED
+CVE-2021-0338
+	RESERVED
+CVE-2021-0337
+	RESERVED
+CVE-2021-0336
+	RESERVED
+CVE-2021-0335
+	RESERVED
+CVE-2021-0334
+	RESERVED
+CVE-2021-0333
+	RESERVED
+CVE-2021-0332
+	RESERVED
+CVE-2021-0331
+	RESERVED
+CVE-2021-0330
+	RESERVED
+CVE-2021-0329
+	RESERVED
+CVE-2021-0328
+	RESERVED
+CVE-2021-0327
+	RESERVED
+CVE-2021-0326
+	RESERVED
+CVE-2021-0325
+	RESERVED
+CVE-2021-0324
+	RESERVED
+CVE-2021-0323
+	RESERVED
+CVE-2021-0322
+	RESERVED
+CVE-2021-0321
+	RESERVED
+CVE-2021-0320
+	RESERVED
+CVE-2021-0319
+	RESERVED
+CVE-2021-0318
+	RESERVED
+CVE-2021-0317
+	RESERVED
+CVE-2021-0316
+	RESERVED
+CVE-2021-0315
+	RESERVED
+CVE-2021-0314
+	RESERVED
+CVE-2021-0313
+	RESERVED
+CVE-2021-0312
+	RESERVED
+CVE-2021-0311
+	RESERVED
+CVE-2021-0310
+	RESERVED
+CVE-2021-0309
+	RESERVED
+CVE-2021-0308
+	RESERVED
+CVE-2021-0307
+	RESERVED
+CVE-2021-0306
+	RESERVED
+CVE-2021-0305
+	RESERVED
+CVE-2021-0304
+	RESERVED
+CVE-2021-0303
+	RESERVED
+CVE-2021-0302
+	RESERVED
+CVE-2021-0301
+	RESERVED
+CVE-2020-28335
+	RESERVED
+CVE-2020-28334
+	RESERVED
+CVE-2020-28333
+	RESERVED
+CVE-2020-28332
+	RESERVED
+CVE-2020-28331
+	RESERVED
+CVE-2020-28330
+	RESERVED
+CVE-2020-28329
+	RESERVED
+CVE-2020-28328 (SuiteCRM before 7.11.17 is vulnerable to remote code execution via the ...)
+	TODO: check
+CVE-2020-28327 (A res_pjsip_session crash was discovered in Asterisk Open Source 13.x  ...)
+	TODO: check
+CVE-2020-28326
+	RESERVED
+CVE-2020-28325
+	RESERVED
+CVE-2020-28324
+	RESERVED
+CVE-2020-28323
+	RESERVED
+CVE-2020-28322
+	RESERVED
+CVE-2020-28321
+	RESERVED
+CVE-2020-28320
+	RESERVED
+CVE-2020-28319
+	RESERVED
+CVE-2020-28318
+	RESERVED
+CVE-2020-28317
+	RESERVED
+CVE-2020-28316
+	RESERVED
+CVE-2020-28315
+	RESERVED
+CVE-2020-28314
+	RESERVED
+CVE-2020-28313
+	RESERVED
+CVE-2020-28312
+	RESERVED
+CVE-2020-28311
+	RESERVED
+CVE-2020-28310
+	RESERVED
+CVE-2020-28309
+	RESERVED
+CVE-2020-28308
+	RESERVED
+CVE-2020-28307
+	RESERVED
+CVE-2020-28306
+	RESERVED
+CVE-2020-28305
+	RESERVED
+CVE-2020-28304
+	RESERVED
+CVE-2020-28303
+	RESERVED
+CVE-2020-28302
+	RESERVED
+CVE-2020-28301
+	RESERVED
+CVE-2020-28300
+	RESERVED
+CVE-2020-28299
+	RESERVED
+CVE-2020-28298
+	RESERVED
+CVE-2020-28297
+	RESERVED
+CVE-2020-28296
+	RESERVED
+CVE-2020-28295
+	RESERVED
+CVE-2020-28294
+	RESERVED
+CVE-2020-28293
+	RESERVED
+CVE-2020-28292
+	RESERVED
+CVE-2020-28291
+	RESERVED
+CVE-2020-28290
+	RESERVED
+CVE-2020-28289
+	RESERVED
+CVE-2020-28288
+	RESERVED
+CVE-2020-28287
+	RESERVED
+CVE-2020-28286
+	RESERVED
+CVE-2020-28285
+	RESERVED
+CVE-2020-28284
+	RESERVED
+CVE-2020-28283
+	RESERVED
+CVE-2020-28282
+	RESERVED
+CVE-2020-28281
+	RESERVED
+CVE-2020-28280
+	RESERVED
+CVE-2020-28279
+	RESERVED
+CVE-2020-28278
+	RESERVED
+CVE-2020-28277
+	RESERVED
+CVE-2020-28276
+	RESERVED
+CVE-2020-28275
+	RESERVED
+CVE-2020-28274
+	RESERVED
+CVE-2020-28273
+	RESERVED
+CVE-2020-28272
+	RESERVED
+CVE-2020-28271
+	RESERVED
+CVE-2020-28270
+	RESERVED
+CVE-2020-28269
+	RESERVED
+CVE-2020-28268
+	RESERVED
+CVE-2020-28267
+	RESERVED
+CVE-2017-18926 (raptor_xml_writer_start_element_common in raptor_xml_writer.c in Rapto ...)
+	TODO: check
 CVE-2020-28266
 	RESERVED
 CVE-2020-28265
@@ -438,7 +2078,7 @@ CVE-2020-28051
 CVE-2020-28050
 	RESERVED
 CVE-2020-28049 (An issue was discovered in SDDM before 0.19.0. It incorrectly starts t ...)
-	{DSA-4783-1}
+	{DSA-4783-1 DLA-2436-1}
 	- sddm <unfixed> (bug #973748)
 	NOTE: https://www.openwall.com/lists/oss-security/2020/11/04/2
 	NOTE: https://github.com/sddm/sddm/commit/be202f533ab98a684c6a007e8d5b4357846bc222
@@ -468,46 +2108,46 @@ CVE-2020-28042 (ServiceStack before 5.9.2 mishandles JWT signature verification
 CVE-2020-28041 (The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 ...)
 	NOT-FOR-US: Netgear
 CVE-2020-28040 (WordPress before 5.5.2 allows CSRF attacks that change a theme's backg ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://blog.wpscan.com/2020/10/30/wordpress-5.5.2-security-release.html
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 CVE-2020-28039 (is_protected_meta in wp-includes/meta.php in WordPress before 5.5.2 al ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 	NOTE: https://wpscan.com/vulnerability/10452
 CVE-2020-28038 (WordPress before 5.5.2 allows stored XSS via post slugs. ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 CVE-2020-28037 (is_blog_installed in wp-includes/functions.php in WordPress before 5.5 ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://github.com/WordPress/wordpress-develop/commit/2ca15d1e5ce70493c5c0c096ca0c76503d6da07c
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 	NOTE: https://wpscan.com/vulnerability/10450
 CVE-2020-28036 (wp-includes/class-wp-xmlrpc-server.php in WordPress before 5.5.2 allow ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://github.com/WordPress/wordpress-develop/commit/c9e6b98968025b1629015998d12c3102165a7d32
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 	NOTE: https://wpscan.com/vulnerability/10449
 CVE-2020-28035 (WordPress before 5.5.2 allows attackers to gain privileges via XML-RPC ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 CVE-2020-28034 (WordPress before 5.5.2 allows XSS associated with global variables. ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 CVE-2020-28033 (WordPress before 5.5.2 mishandles embeds from disabled sites on a mult ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
 CVE-2020-28032 (WordPress before 5.5.2 mishandles deserialization requests in wp-inclu ...)
-	{DLA-2429-1}
+	{DSA-4784-1 DLA-2429-1}
 	- wordpress 5.5.3+dfsg1-1 (bug #973562)
 	NOTE: https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
 	NOTE: https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
@@ -1968,14 +3608,12 @@ CVE-2020-27618 [iconv when processing invalid multi-byte input sequences fails t
 	RESERVED
 	- glibc <unfixed>
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=26224
-CVE-2020-27617 [net: an assert failure via eth_get_gso_type]
-	RESERVED
+CVE-2020-27617 (eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to t ...)
 	- qemu <unfixed> (bug #973324)
 	[buster] - qemu <postponed> (Fix along in future DSA)
 	[stretch] - qemu <postponed> (Minor issue, fix along in future DLA)
 	NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06023.html
-CVE-2020-27616 [ati-vga: potential crash via invalid x y parameter values]
-	RESERVED
+CVE-2020-27616 (ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outsi ...)
 	- qemu <unfixed>
 	[buster] - qemu <not-affected> (Vulnerable code introduced in ATI VGA device emulation added later)
 	[stretch] - qemu <not-affected> (Vulnerable code introduced in ATI VGA device emulation added later)
@@ -2059,8 +3697,8 @@ CVE-2020-27591
 	RESERVED
 CVE-2020-27590
 	RESERVED
-CVE-2020-27589
-	RESERVED
+CVE-2020-27589 (Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 -  ...)
+	TODO: check
 CVE-2020-27588
 	RESERVED
 CVE-2020-27587
@@ -2854,8 +4492,8 @@ CVE-2020-27198
 	RESERVED
 CVE-2020-27197 (** DISPUTED ** TAXII libtaxii through 1.1.117, as used in EclecticIQ O ...)
 	NOT-FOR-US: TAXII libtaxii
-CVE-2020-27196
-	RESERVED
+CVE-2020-27196 (An issue was discovered in PlayJava in Play Framework 2.6.0 through 2. ...)
+	TODO: check
 CVE-2020-27195 (HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client ...)
 	- nomad <unfixed> (bug #972795)
 	NOTE: https://github.com/hashicorp/nomad/issues/9129
@@ -2951,8 +4589,7 @@ CVE-2020-27155 (An issue was discovered in Octopus Deploy through 2020.4.4. If e
 	NOT-FOR-US: Octopus Deploy
 CVE-2020-27154
 	RESERVED
-CVE-2020-27152 [KVM: host stack overflow due to lazy update IOAPIC]
-	RESERVED
+CVE-2020-27152 (An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioap ...)
 	- linux <unfixed>
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	[stretch] - linux <not-affected> (Vulnerable code not present)
@@ -3009,10 +4646,10 @@ CVE-2020-27131
 	RESERVED
 CVE-2020-27130
 	RESERVED
-CVE-2020-27129
-	RESERVED
-CVE-2020-27128
-	RESERVED
+CVE-2020-27129 (A vulnerability in the remote management feature of Cisco SD-WAN vMana ...)
+	TODO: check
+CVE-2020-27128 (A vulnerability in the application data endpoints of Cisco SD-WAN vMan ...)
+	TODO: check
 CVE-2020-27127
 	RESERVED
 CVE-2020-27126
@@ -3021,12 +4658,12 @@ CVE-2020-27125
 	RESERVED
 CVE-2020-27124
 	RESERVED
-CVE-2020-27123
-	RESERVED
-CVE-2020-27122
-	RESERVED
-CVE-2020-27121
-	RESERVED
+CVE-2020-27123 (A vulnerability in the interprocess communication (IPC) channel of Cis ...)
+	TODO: check
+CVE-2020-27122 (A vulnerability in the Microsoft Active Directory integration of Cisco ...)
+	TODO: check
+CVE-2020-27121 (A vulnerability in Cisco Unified Communications Manager IM &amp; P ...)
+	TODO: check
 CVE-2020-27120
 	RESERVED
 CVE-2020-27119
@@ -3490,8 +5127,7 @@ CVE-2020-26894 (LiveCode v9.6.1 on Windows allows local, low-privileged users to
 	NOT-FOR-US: New Millennium
 CVE-2020-26893 (An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor c ...)
 	NOT-FOR-US: ClamXAV
-CVE-2020-26892
-	RESERVED
+CVE-2020-26892 (The JWT library in NATS nats-server before 2.1.9 has Incorrect Access  ...)
 	- golang-github-nats-io-jwt <unfixed>
 	NOTE: https://advisories.nats.io/CVE/CVE-2020-26892.txt
 CVE-2020-26891 (AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS d ...)
@@ -3511,10 +5147,10 @@ CVE-2020-26885
 	RESERVED
 CVE-2020-26884
 	RESERVED
-CVE-2020-26883
-	RESERVED
-CVE-2020-26882
-	RESERVED
+CVE-2020-26883 (In Play Framework 2.6.0 through 2.8.2, stack consumption can occur bec ...)
+	TODO: check
+CVE-2020-26882 (In Play Framework 2.6.0 through 2.8.2, data amplification can occur wh ...)
+	TODO: check
 CVE-2020-26881
 	RESERVED
 CVE-2020-26880 (Sympa through 6.2.57b.2 allows a local privilege escalation from the s ...)
@@ -4296,8 +5932,7 @@ CVE-2020-26523 (Froala Editor before 3.2.2 allows XSS via pasted content. ...)
 	NOT-FOR-US: Froala Editor
 CVE-2020-26522 (A cross-site request forgery (CSRF) vulnerability in mod/user/act_user ...)
 	NOT-FOR-US: Garfield Petshop
-CVE-2020-26521
-	RESERVED
+CVE-2020-26521 (The JWT library in NATS nats-server before 2.1.9 allows a denial of se ...)
 	- golang-github-nats-io-jwt <unfixed>
 	NOTE: https://advisories.nats.io/CVE/CVE-2020-26521.txt
 CVE-2020-26520
@@ -4916,10 +6551,10 @@ CVE-2020-26216
 	RESERVED
 CVE-2020-26215
 	RESERVED
-CVE-2020-26214
-	RESERVED
-CVE-2020-26213
-	RESERVED
+CVE-2020-26214 (In Alerta before version 8.1.0, users may be able to bypass LDAP authe ...)
+	TODO: check
+CVE-2020-26213 (In teler before version 0.0.1, if you run teler inside a Docker contai ...)
+	TODO: check
 CVE-2020-26212
 	RESERVED
 CVE-2020-26211 (In BookStack before version 0.30.4, a user with permissions to edit a  ...)
@@ -5238,14 +6873,14 @@ CVE-2020-26089
 	RESERVED
 CVE-2020-26087
 	RESERVED
-CVE-2020-26086
-	RESERVED
+CVE-2020-26086 (A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence ...)
+	TODO: check
 CVE-2020-26085
 	RESERVED
-CVE-2020-26084
-	RESERVED
-CVE-2020-26083
-	RESERVED
+CVE-2020-26084 (A vulnerability in the REST API of Cisco Edge Fog Fabric could allow a ...)
+	TODO: check
+CVE-2020-26083 (A vulnerability in the web-based management interface of Cisco Identit ...)
+	TODO: check
 CVE-2020-26082
 	RESERVED
 CVE-2020-26081
@@ -6444,8 +8079,7 @@ CVE-2020-25594
 	RESERVED
 CVE-2020-25593
 	RESERVED
-CVE-2020-25592
-	RESERVED
+CVE-2020-25592 (In SaltStack Salt through 3002, salt-netapi improperly validates eauth ...)
 	- salt <unfixed>
 	NOTE: https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
 CVE-2020-25591
@@ -7362,16 +8996,16 @@ CVE-2020-25176
 	RESERVED
 CVE-2020-25175
 	RESERVED
-CVE-2020-25174
-	RESERVED
+CVE-2020-25174 (A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3 ...)
+	TODO: check
 CVE-2020-25173
 	RESERVED
-CVE-2020-25172
-	RESERVED
+CVE-2020-25172 (A relative path traversal attack in the B. Braun OnlineSuite Version A ...)
+	TODO: check
 CVE-2020-25171
 	RESERVED
-CVE-2020-25170
-	RESERVED
+CVE-2020-25170 (An Excel Macro Injection vulnerability exists in the export feature in ...)
+	TODO: check
 CVE-2020-25169
 	RESERVED
 CVE-2020-25168
@@ -13339,7 +14973,7 @@ CVE-2020-22280
 	RESERVED
 CVE-2020-22279
 	RESERVED
-CVE-2020-22278 (phpMyAdmin through 5.0.2 allows CSV injection via Export Section ...)
+CVE-2020-22278 (** DISPUTED ** phpMyAdmin through 5.0.2 allows CSV injection via Expor ...)
 	- phpmyadmin <undetermined>
 	NOTE: upstream considers this invalid until now, to be debated
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/issues/16101
@@ -22945,8 +24579,7 @@ CVE-2020-17492
 	RESERVED
 CVE-2020-17491
 	RESERVED
-CVE-2020-17490
-	RESERVED
+CVE-2020-17490 (The TLS module within SaltStack Salt through 3002 creates certificates ...)
 	- salt <unfixed>
 	NOTE: https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
 CVE-2020-17489 (An issue was discovered in certain configurations of GNOME gnome-shell ...)
@@ -24266,8 +25899,7 @@ CVE-2020-16848
 	RESERVED
 CVE-2020-16847 (Extreme Analytics in Extreme Management Center before 8.5.0.169 allows ...)
 	NOT-FOR-US: Extreme Management Center
-CVE-2020-16846
-	RESERVED
+CVE-2020-16846 (An issue was discovered in SaltStack Salt through 3002. Sending crafte ...)
 	- salt <unfixed>
 	NOTE: https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
 CVE-2020-16845 (Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loo ...)
@@ -26730,7 +28362,7 @@ CVE-2020-15780 (An issue was discovered in drivers/acpi/acpi_configfs.c in the L
 	[stretch] - linux <ignored> (securelevel included but not supported)
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/15/3
 	NOTE: Fixed by: https://git.kernel.org/linus/75b0cea7bf307f362057cc778efe89af4c615354
-CVE-2020-15778 (scp in OpenSSH through 8.3p1 allows command injection in scp.c remote  ...)
+CVE-2020-15778 (scp in OpenSSH through 8.3p1 allows command injection in the scp.c tor ...)
 	- openssh <unfixed> (unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1860487
 	NOTE: https://github.com/cpandya2909/CVE-2020-15778
@@ -42788,10 +44420,10 @@ CVE-2020-10294
 	RESERVED
 CVE-2020-10293
 	RESERVED
-CVE-2020-10292
-	RESERVED
-CVE-2020-10291
-	RESERVED
+CVE-2020-10292 (Visual Components (owned by KUKA) is a robotic simulator that allows s ...)
+	TODO: check
+CVE-2020-10291 (Visual Components (owned by KUKA) is a robotic simulator that allows s ...)
+	TODO: check
 CVE-2020-10290 (Universal Robots controller execute URCaps (zip files containing Java- ...)
 	NOT-FOR-US: Universal Robots controller
 CVE-2020-10289 (Use of unsafe yaml load. Allows instantiation of arbitrary objects. Th ...)
@@ -46938,14 +48570,14 @@ CVE-2020-8582
 	RESERVED
 CVE-2020-8581
 	RESERVED
-CVE-2020-8580
-	RESERVED
+CVE-2020-8580 (SANtricity OS Controller Software versions 11.30 and higher are suscep ...)
+	TODO: check
 CVE-2020-8579 (Clustered Data ONTAP versions 9.7 through 9.7P7 are susceptible to a v ...)
 	NOT-FOR-US: Clustered Data ONTAP
 CVE-2020-8578
 	RESERVED
-CVE-2020-8577
-	RESERVED
+CVE-2020-8577 (SANtricity OS Controller Software versions 11.50.1 and higher are susc ...)
+	TODO: check
 CVE-2020-8576 (Clustered Data ONTAP versions prior to 9.3P19, 9.5P14, 9.6P9 and 9.7 a ...)
 	NOT-FOR-US: ONTAP
 CVE-2020-8575 (Active IQ Unified Manager for VMware vSphere and Windows versions prio ...)
@@ -50319,8 +51951,8 @@ CVE-2020-7200
 	RESERVED
 CVE-2020-7199
 	RESERVED
-CVE-2020-7198
-	RESERVED
+CVE-2020-7198 (There is a remote escalation of privilege possible for a malicious use ...)
+	TODO: check
 CVE-2020-7197 (SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreSe ...)
 	NOT-FOR-US: HPE
 CVE-2020-7196 (The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Co ...)
@@ -53988,10 +55620,10 @@ CVE-2020-5797
 	RESERVED
 CVE-2020-5796
 	RESERVED
-CVE-2020-5795
-	RESERVED
-CVE-2020-5794
-	RESERVED
+CVE-2020-5795 (UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200 ...)
+	TODO: check
+CVE-2020-5794 (A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and ...)
+	TODO: check
 CVE-2020-5793 (A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows &a ...)
 	NOT-FOR-US: Nessus
 CVE-2020-5792 (Improper neutralization of argument delimiters in a command in Nagios  ...)
@@ -57308,12 +58940,12 @@ CVE-2020-4486 (IBM QRadar 7.2.0 thorugh 7.2.9 could allow an authenticated user
 	NOT-FOR-US: IBM
 CVE-2020-4485 (IBM QRadar 7.2.0 through 7.2.9 could allow an authenticated user to di ...)
 	NOT-FOR-US: IBM
-CVE-2020-4484
-	RESERVED
-CVE-2020-4483
-	RESERVED
-CVE-2020-4482
-	RESERVED
+CVE-2020-4484 (IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 coul ...)
+	TODO: check
+CVE-2020-4483 (IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 coul ...)
+	TODO: check
+CVE-2020-4482 (IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 coul ...)
+	TODO: check
 CVE-2020-4481 (IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 is v ...)
 	NOT-FOR-US: IBM
 CVE-2020-4480
@@ -60264,16 +61896,16 @@ CVE-2020-3606
 	RESERVED
 CVE-2020-3605
 	RESERVED
-CVE-2020-3604
-	RESERVED
-CVE-2020-3603
-	RESERVED
+CVE-2020-3604 (Multiple vulnerabilities in Cisco Webex Network Recording Player for W ...)
+	TODO: check
+CVE-2020-3603 (Multiple vulnerabilities in Cisco Webex Network Recording Player for W ...)
+	TODO: check
 CVE-2020-3602 (A vulnerability in the CLI of Cisco StarOS operating system for Cisco  ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3601 (A vulnerability in the CLI of Cisco StarOS operating system for Cisco  ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3600
-	RESERVED
+CVE-2020-3600 (A vulnerability in Cisco SD-WAN Software could allow an authenticated, ...)
+	TODO: check
 CVE-2020-3599 (A vulnerability in the web-based management interface of Cisco Adaptiv ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3598 (A vulnerability in the web-based management interface of Cisco Vision  ...)
@@ -60282,24 +61914,24 @@ CVE-2020-3597 (A vulnerability in the configuration restore feature of Cisco Nex
 	NOT-FOR-US: Cisco
 CVE-2020-3596 (A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expr ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3595
-	RESERVED
-CVE-2020-3594
-	RESERVED
-CVE-2020-3593
-	RESERVED
-CVE-2020-3592
-	RESERVED
-CVE-2020-3591
-	RESERVED
-CVE-2020-3590
-	RESERVED
+CVE-2020-3595 (A vulnerability in Cisco SD-WAN Software could allow an authenticated, ...)
+	TODO: check
+CVE-2020-3594 (A vulnerability in Cisco SD-WAN Software could allow an authenticated, ...)
+	TODO: check
+CVE-2020-3593 (A vulnerability in Cisco SD-WAN Software could allow an authenticated, ...)
+	TODO: check
+CVE-2020-3592 (A vulnerability in the web-based management interface of Cisco SD-WAN  ...)
+	TODO: check
+CVE-2020-3591 (A vulnerability in the web-based management interface of the Cisco SD- ...)
+	TODO: check
+CVE-2020-3590 (A vulnerability in the web-based management interface of the Cisco SD- ...)
+	TODO: check
 CVE-2020-3589 (A vulnerability in the web-based management interface of Cisco Identit ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3588
-	RESERVED
-CVE-2020-3587
-	RESERVED
+CVE-2020-3588 (A vulnerability in virtualization channel messaging in Cisco Webex Mee ...)
+	TODO: check
+CVE-2020-3587 (A vulnerability in the web-based management interface of the Cisco SD- ...)
+	TODO: check
 CVE-2020-3586
 	RESERVED
 CVE-2020-3585 (A vulnerability in the TLS handler of Cisco Adaptive Security Applianc ...)
@@ -60314,8 +61946,8 @@ CVE-2020-3581 (Multiple vulnerabilities in the web services interface of Cisco A
 	NOT-FOR-US: Cisco
 CVE-2020-3580 (Multiple vulnerabilities in the web services interface of Cisco Adapti ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3579
-	RESERVED
+CVE-2020-3579 (A vulnerability in the web-based management interface of Cisco SD-WAN  ...)
+	TODO: check
 CVE-2020-3578 (A vulnerability in the web services interface of Cisco Adaptive Securi ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3577 (A vulnerability in the ingress packet processing path of Cisco Firepow ...)
@@ -60324,10 +61956,10 @@ CVE-2020-3576
 	RESERVED
 CVE-2020-3575
 	RESERVED
-CVE-2020-3574
-	RESERVED
-CVE-2020-3573
-	RESERVED
+CVE-2020-3574 (A vulnerability in the TCP packet processing functionality of Cisco IP ...)
+	TODO: check
+CVE-2020-3573 (Multiple vulnerabilities in Cisco Webex Network Recording Player for W ...)
+	TODO: check
 CVE-2020-3572 (A vulnerability in the SSL/TLS session handler of Cisco Adaptive Secur ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3571 (A vulnerability in the ICMP ingress packet processing of Cisco Firepow ...)
@@ -60360,8 +61992,8 @@ CVE-2020-3558 (A vulnerability in the web-based management interface of Cisco Fi
 	NOT-FOR-US: Cisco
 CVE-2020-3557 (A vulnerability in the host input API daemon of Cisco Firepower Manage ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3556
-	RESERVED
+CVE-2020-3556 (A vulnerability in the interprocess communication (IPC) channel of Cis ...)
+	TODO: check
 CVE-2020-3555 (A vulnerability in the SIP inspection process of Cisco Adaptive Securi ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3554 (A vulnerability in the TCP packet processing of Cisco Adaptive Securit ...)
@@ -60370,8 +62002,8 @@ CVE-2020-3553 (Multiple vulnerabilities in the web-based management interface of
 	NOT-FOR-US: Cisco
 CVE-2020-3552 (A vulnerability in the Ethernet packet handling of Cisco Aironet Acces ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3551
-	RESERVED
+CVE-2020-3551 (A vulnerability in the web-based management interface of Cisco Identit ...)
+	TODO: check
 CVE-2020-3550 (A vulnerability in the sfmgr daemon of Cisco Firepower Management Cent ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3549 (A vulnerability in the sftunnel functionality of Cisco Firepower Manag ...)
@@ -60587,8 +62219,8 @@ CVE-2020-3446 (A vulnerability in Cisco Virtual Wide Area Application Services (
 	NOT-FOR-US: Cisco
 CVE-2020-3445
 	RESERVED
-CVE-2020-3444
-	RESERVED
+CVE-2020-3444 (A vulnerability in the packet filtering features of Cisco SD-WAN Softw ...)
+	TODO: check
 CVE-2020-3443 (A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem)  ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3442 (The DuoConnect client enables users to establish SSH connections to ho ...)
@@ -60733,8 +62365,8 @@ CVE-2020-3373 (A vulnerability in the IP fragment-handling implementation of Cis
 	NOT-FOR-US: Cisco
 CVE-2020-3372 (A vulnerability in the web-based management interface of Cisco SD-WAN  ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3371
-	RESERVED
+CVE-2020-3371 (A vulnerability in the web UI of Cisco Integrated Management Controlle ...)
+	TODO: check
 CVE-2020-3370 (A vulnerability in URL filtering of Cisco Content Security Management  ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3369 (A vulnerability in the deep packet inspection (DPI) engine of Cisco SD ...)
@@ -60919,8 +62551,8 @@ CVE-2020-3286 (Multiple vulnerabilities in the web-based management interface of
 	NOT-FOR-US: Cisco
 CVE-2020-3285 (A vulnerability in the Transport Layer Security version 1.3 (TLS 1.3)  ...)
 	NOT-FOR-US: Cisco
-CVE-2020-3284
-	RESERVED
+CVE-2020-3284 (A vulnerability in the enhanced Preboot eXecution Environment (PXE) bo ...)
+	TODO: check
 CVE-2020-3283 (A vulnerability in the Secure Sockets Layer (SSL)/Transport Layer Secu ...)
 	NOT-FOR-US: Cisco
 CVE-2020-3282 (A vulnerability in the web-based management interface of Cisco Unified ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e7d7de2c6aaa54e6f5df16ecffec1344601f0798

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e7d7de2c6aaa54e6f5df16ecffec1344601f0798
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201106/0cf46d2e/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list