[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Nov 4 08:10:26 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d8a2086a by security tracker role at 2022-11-04T08:10:15+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1107 @@
+CVE-2023-21403
+ RESERVED
+CVE-2023-21402
+ RESERVED
+CVE-2023-21401
+ RESERVED
+CVE-2023-21400
+ RESERVED
+CVE-2023-21399
+ RESERVED
+CVE-2023-21398
+ RESERVED
+CVE-2023-21397
+ RESERVED
+CVE-2023-21396
+ RESERVED
+CVE-2023-21395
+ RESERVED
+CVE-2023-21394
+ RESERVED
+CVE-2023-21393
+ RESERVED
+CVE-2023-21392
+ RESERVED
+CVE-2023-21391
+ RESERVED
+CVE-2023-21390
+ RESERVED
+CVE-2023-21389
+ RESERVED
+CVE-2023-21388
+ RESERVED
+CVE-2023-21387
+ RESERVED
+CVE-2023-21386
+ RESERVED
+CVE-2023-21385
+ RESERVED
+CVE-2023-21384
+ RESERVED
+CVE-2023-21383
+ RESERVED
+CVE-2023-21382
+ RESERVED
+CVE-2023-21381
+ RESERVED
+CVE-2023-21380
+ RESERVED
+CVE-2023-21379
+ RESERVED
+CVE-2023-21378
+ RESERVED
+CVE-2023-21377
+ RESERVED
+CVE-2023-21376
+ RESERVED
+CVE-2023-21375
+ RESERVED
+CVE-2023-21374
+ RESERVED
+CVE-2023-21373
+ RESERVED
+CVE-2023-21372
+ RESERVED
+CVE-2023-21371
+ RESERVED
+CVE-2023-21370
+ RESERVED
+CVE-2023-21369
+ RESERVED
+CVE-2023-21368
+ RESERVED
+CVE-2023-21367
+ RESERVED
+CVE-2023-21366
+ RESERVED
+CVE-2023-21365
+ RESERVED
+CVE-2023-21364
+ RESERVED
+CVE-2023-21363
+ RESERVED
+CVE-2023-21362
+ RESERVED
+CVE-2023-21361
+ RESERVED
+CVE-2023-21360
+ RESERVED
+CVE-2023-21359
+ RESERVED
+CVE-2023-21358
+ RESERVED
+CVE-2023-21357
+ RESERVED
+CVE-2023-21356
+ RESERVED
+CVE-2023-21355
+ RESERVED
+CVE-2023-21354
+ RESERVED
+CVE-2023-21353
+ RESERVED
+CVE-2023-21352
+ RESERVED
+CVE-2023-21351
+ RESERVED
+CVE-2023-21350
+ RESERVED
+CVE-2023-21349
+ RESERVED
+CVE-2023-21348
+ RESERVED
+CVE-2023-21347
+ RESERVED
+CVE-2023-21346
+ RESERVED
+CVE-2023-21345
+ RESERVED
+CVE-2023-21344
+ RESERVED
+CVE-2023-21343
+ RESERVED
+CVE-2023-21342
+ RESERVED
+CVE-2023-21341
+ RESERVED
+CVE-2023-21340
+ RESERVED
+CVE-2023-21339
+ RESERVED
+CVE-2023-21338
+ RESERVED
+CVE-2023-21337
+ RESERVED
+CVE-2023-21336
+ RESERVED
+CVE-2023-21335
+ RESERVED
+CVE-2023-21334
+ RESERVED
+CVE-2023-21333
+ RESERVED
+CVE-2023-21332
+ RESERVED
+CVE-2023-21331
+ RESERVED
+CVE-2023-21330
+ RESERVED
+CVE-2023-21329
+ RESERVED
+CVE-2023-21328
+ RESERVED
+CVE-2023-21327
+ RESERVED
+CVE-2023-21326
+ RESERVED
+CVE-2023-21325
+ RESERVED
+CVE-2023-21324
+ RESERVED
+CVE-2023-21323
+ RESERVED
+CVE-2023-21322
+ RESERVED
+CVE-2023-21321
+ RESERVED
+CVE-2023-21320
+ RESERVED
+CVE-2023-21319
+ RESERVED
+CVE-2023-21318
+ RESERVED
+CVE-2023-21317
+ RESERVED
+CVE-2023-21316
+ RESERVED
+CVE-2023-21315
+ RESERVED
+CVE-2023-21314
+ RESERVED
+CVE-2023-21313
+ RESERVED
+CVE-2023-21312
+ RESERVED
+CVE-2023-21311
+ RESERVED
+CVE-2023-21310
+ RESERVED
+CVE-2023-21309
+ RESERVED
+CVE-2023-21308
+ RESERVED
+CVE-2023-21307
+ RESERVED
+CVE-2023-21306
+ RESERVED
+CVE-2023-21305
+ RESERVED
+CVE-2023-21304
+ RESERVED
+CVE-2023-21303
+ RESERVED
+CVE-2023-21302
+ RESERVED
+CVE-2023-21301
+ RESERVED
+CVE-2023-21300
+ RESERVED
+CVE-2023-21299
+ RESERVED
+CVE-2023-21298
+ RESERVED
+CVE-2023-21297
+ RESERVED
+CVE-2023-21296
+ RESERVED
+CVE-2023-21295
+ RESERVED
+CVE-2023-21294
+ RESERVED
+CVE-2023-21293
+ RESERVED
+CVE-2023-21292
+ RESERVED
+CVE-2023-21291
+ RESERVED
+CVE-2023-21290
+ RESERVED
+CVE-2023-21289
+ RESERVED
+CVE-2023-21288
+ RESERVED
+CVE-2023-21287
+ RESERVED
+CVE-2023-21286
+ RESERVED
+CVE-2023-21285
+ RESERVED
+CVE-2023-21284
+ RESERVED
+CVE-2023-21283
+ RESERVED
+CVE-2023-21282
+ RESERVED
+CVE-2023-21281
+ RESERVED
+CVE-2023-21280
+ RESERVED
+CVE-2023-21279
+ RESERVED
+CVE-2023-21278
+ RESERVED
+CVE-2023-21277
+ RESERVED
+CVE-2023-21276
+ RESERVED
+CVE-2023-21275
+ RESERVED
+CVE-2023-21274
+ RESERVED
+CVE-2023-21273
+ RESERVED
+CVE-2023-21272
+ RESERVED
+CVE-2023-21271
+ RESERVED
+CVE-2023-21270
+ RESERVED
+CVE-2023-21269
+ RESERVED
+CVE-2023-21268
+ RESERVED
+CVE-2023-21267
+ RESERVED
+CVE-2023-21266
+ RESERVED
+CVE-2023-21265
+ RESERVED
+CVE-2023-21264
+ RESERVED
+CVE-2023-21263
+ RESERVED
+CVE-2023-21262
+ RESERVED
+CVE-2023-21261
+ RESERVED
+CVE-2023-21260
+ RESERVED
+CVE-2023-21259
+ RESERVED
+CVE-2023-21258
+ RESERVED
+CVE-2023-21257
+ RESERVED
+CVE-2023-21256
+ RESERVED
+CVE-2023-21255
+ RESERVED
+CVE-2023-21254
+ RESERVED
+CVE-2023-21253
+ RESERVED
+CVE-2023-21252
+ RESERVED
+CVE-2023-21251
+ RESERVED
+CVE-2023-21250
+ RESERVED
+CVE-2023-21249
+ RESERVED
+CVE-2023-21248
+ RESERVED
+CVE-2023-21247
+ RESERVED
+CVE-2023-21246
+ RESERVED
+CVE-2023-21245
+ RESERVED
+CVE-2023-21244
+ RESERVED
+CVE-2023-21243
+ RESERVED
+CVE-2023-21242
+ RESERVED
+CVE-2023-21241
+ RESERVED
+CVE-2023-21240
+ RESERVED
+CVE-2023-21239
+ RESERVED
+CVE-2023-21238
+ RESERVED
+CVE-2023-21237
+ RESERVED
+CVE-2023-21236
+ RESERVED
+CVE-2023-21235
+ RESERVED
+CVE-2023-21234
+ RESERVED
+CVE-2023-21233
+ RESERVED
+CVE-2023-21232
+ RESERVED
+CVE-2023-21231
+ RESERVED
+CVE-2023-21230
+ RESERVED
+CVE-2023-21229
+ RESERVED
+CVE-2023-21228
+ RESERVED
+CVE-2023-21227
+ RESERVED
+CVE-2023-21226
+ RESERVED
+CVE-2023-21225
+ RESERVED
+CVE-2023-21224
+ RESERVED
+CVE-2023-21223
+ RESERVED
+CVE-2023-21222
+ RESERVED
+CVE-2023-21221
+ RESERVED
+CVE-2023-21220
+ RESERVED
+CVE-2023-21219
+ RESERVED
+CVE-2023-21218
+ RESERVED
+CVE-2023-21217
+ RESERVED
+CVE-2023-21216
+ RESERVED
+CVE-2023-21215
+ RESERVED
+CVE-2023-21214
+ RESERVED
+CVE-2023-21213
+ RESERVED
+CVE-2023-21212
+ RESERVED
+CVE-2023-21211
+ RESERVED
+CVE-2023-21210
+ RESERVED
+CVE-2023-21209
+ RESERVED
+CVE-2023-21208
+ RESERVED
+CVE-2023-21207
+ RESERVED
+CVE-2023-21206
+ RESERVED
+CVE-2023-21205
+ RESERVED
+CVE-2023-21204
+ RESERVED
+CVE-2023-21203
+ RESERVED
+CVE-2023-21202
+ RESERVED
+CVE-2023-21201
+ RESERVED
+CVE-2023-21200
+ RESERVED
+CVE-2023-21199
+ RESERVED
+CVE-2023-21198
+ RESERVED
+CVE-2023-21197
+ RESERVED
+CVE-2023-21196
+ RESERVED
+CVE-2023-21195
+ RESERVED
+CVE-2023-21194
+ RESERVED
+CVE-2023-21193
+ RESERVED
+CVE-2023-21192
+ RESERVED
+CVE-2023-21191
+ RESERVED
+CVE-2023-21190
+ RESERVED
+CVE-2023-21189
+ RESERVED
+CVE-2023-21188
+ RESERVED
+CVE-2023-21187
+ RESERVED
+CVE-2023-21186
+ RESERVED
+CVE-2023-21185
+ RESERVED
+CVE-2023-21184
+ RESERVED
+CVE-2023-21183
+ RESERVED
+CVE-2023-21182
+ RESERVED
+CVE-2023-21181
+ RESERVED
+CVE-2023-21180
+ RESERVED
+CVE-2023-21179
+ RESERVED
+CVE-2023-21178
+ RESERVED
+CVE-2023-21177
+ RESERVED
+CVE-2023-21176
+ RESERVED
+CVE-2023-21175
+ RESERVED
+CVE-2023-21174
+ RESERVED
+CVE-2023-21173
+ RESERVED
+CVE-2023-21172
+ RESERVED
+CVE-2023-21171
+ RESERVED
+CVE-2023-21170
+ RESERVED
+CVE-2023-21169
+ RESERVED
+CVE-2023-21168
+ RESERVED
+CVE-2023-21167
+ RESERVED
+CVE-2023-21166
+ RESERVED
+CVE-2023-21165
+ RESERVED
+CVE-2023-21164
+ RESERVED
+CVE-2023-21163
+ RESERVED
+CVE-2023-21162
+ RESERVED
+CVE-2023-21161
+ RESERVED
+CVE-2023-21160
+ RESERVED
+CVE-2023-21159
+ RESERVED
+CVE-2023-21158
+ RESERVED
+CVE-2023-21157
+ RESERVED
+CVE-2023-21156
+ RESERVED
+CVE-2023-21155
+ RESERVED
+CVE-2023-21154
+ RESERVED
+CVE-2023-21153
+ RESERVED
+CVE-2023-21152
+ RESERVED
+CVE-2023-21151
+ RESERVED
+CVE-2023-21150
+ RESERVED
+CVE-2023-21149
+ RESERVED
+CVE-2023-21148
+ RESERVED
+CVE-2023-21147
+ RESERVED
+CVE-2023-21146
+ RESERVED
+CVE-2023-21145
+ RESERVED
+CVE-2023-21144
+ RESERVED
+CVE-2023-21143
+ RESERVED
+CVE-2023-21142
+ RESERVED
+CVE-2023-21141
+ RESERVED
+CVE-2023-21140
+ RESERVED
+CVE-2023-21139
+ RESERVED
+CVE-2023-21138
+ RESERVED
+CVE-2023-21137
+ RESERVED
+CVE-2023-21136
+ RESERVED
+CVE-2023-21135
+ RESERVED
+CVE-2023-21134
+ RESERVED
+CVE-2023-21133
+ RESERVED
+CVE-2023-21132
+ RESERVED
+CVE-2023-21131
+ RESERVED
+CVE-2023-21130
+ RESERVED
+CVE-2023-21129
+ RESERVED
+CVE-2023-21128
+ RESERVED
+CVE-2023-21127
+ RESERVED
+CVE-2023-21126
+ RESERVED
+CVE-2023-21125
+ RESERVED
+CVE-2023-21124
+ RESERVED
+CVE-2023-21123
+ RESERVED
+CVE-2023-21122
+ RESERVED
+CVE-2023-21121
+ RESERVED
+CVE-2023-21120
+ RESERVED
+CVE-2023-21119
+ RESERVED
+CVE-2023-21118
+ RESERVED
+CVE-2023-21117
+ RESERVED
+CVE-2023-21116
+ RESERVED
+CVE-2023-21115
+ RESERVED
+CVE-2023-21114
+ RESERVED
+CVE-2023-21113
+ RESERVED
+CVE-2023-21112
+ RESERVED
+CVE-2023-21111
+ RESERVED
+CVE-2023-21110
+ RESERVED
+CVE-2023-21109
+ RESERVED
+CVE-2023-21108
+ RESERVED
+CVE-2023-21107
+ RESERVED
+CVE-2023-21106
+ RESERVED
+CVE-2023-21105
+ RESERVED
+CVE-2023-21104
+ RESERVED
+CVE-2023-21103
+ RESERVED
+CVE-2023-21102
+ RESERVED
+CVE-2023-21101
+ RESERVED
+CVE-2023-21100
+ RESERVED
+CVE-2023-21099
+ RESERVED
+CVE-2023-21098
+ RESERVED
+CVE-2023-21097
+ RESERVED
+CVE-2023-21096
+ RESERVED
+CVE-2023-21095
+ RESERVED
+CVE-2023-21094
+ RESERVED
+CVE-2023-21093
+ RESERVED
+CVE-2023-21092
+ RESERVED
+CVE-2023-21091
+ RESERVED
+CVE-2023-21090
+ RESERVED
+CVE-2023-21089
+ RESERVED
+CVE-2023-21088
+ RESERVED
+CVE-2023-21087
+ RESERVED
+CVE-2023-21086
+ RESERVED
+CVE-2023-21085
+ RESERVED
+CVE-2023-21084
+ RESERVED
+CVE-2023-21083
+ RESERVED
+CVE-2023-21082
+ RESERVED
+CVE-2023-21081
+ RESERVED
+CVE-2023-21080
+ RESERVED
+CVE-2023-21079
+ RESERVED
+CVE-2023-21078
+ RESERVED
+CVE-2023-21077
+ RESERVED
+CVE-2023-21076
+ RESERVED
+CVE-2023-21075
+ RESERVED
+CVE-2023-21074
+ RESERVED
+CVE-2023-21073
+ RESERVED
+CVE-2023-21072
+ RESERVED
+CVE-2023-21071
+ RESERVED
+CVE-2023-21070
+ RESERVED
+CVE-2023-21069
+ RESERVED
+CVE-2023-21068
+ RESERVED
+CVE-2023-21067
+ RESERVED
+CVE-2023-21066
+ RESERVED
+CVE-2023-21065
+ RESERVED
+CVE-2023-21064
+ RESERVED
+CVE-2023-21063
+ RESERVED
+CVE-2023-21062
+ RESERVED
+CVE-2023-21061
+ RESERVED
+CVE-2023-21060
+ RESERVED
+CVE-2023-21059
+ RESERVED
+CVE-2023-21058
+ RESERVED
+CVE-2023-21057
+ RESERVED
+CVE-2023-21056
+ RESERVED
+CVE-2023-21055
+ RESERVED
+CVE-2023-21054
+ RESERVED
+CVE-2023-21053
+ RESERVED
+CVE-2023-21052
+ RESERVED
+CVE-2023-21051
+ RESERVED
+CVE-2023-21050
+ RESERVED
+CVE-2023-21049
+ RESERVED
+CVE-2023-21048
+ RESERVED
+CVE-2023-21047
+ RESERVED
+CVE-2023-21046
+ RESERVED
+CVE-2023-21045
+ RESERVED
+CVE-2023-21044
+ RESERVED
+CVE-2023-21043
+ RESERVED
+CVE-2023-21042
+ RESERVED
+CVE-2023-21041
+ RESERVED
+CVE-2023-21040
+ RESERVED
+CVE-2023-21039
+ RESERVED
+CVE-2023-21038
+ RESERVED
+CVE-2023-21037
+ RESERVED
+CVE-2023-21036
+ RESERVED
+CVE-2023-21035
+ RESERVED
+CVE-2023-21034
+ RESERVED
+CVE-2023-21033
+ RESERVED
+CVE-2023-21032
+ RESERVED
+CVE-2023-21031
+ RESERVED
+CVE-2023-21030
+ RESERVED
+CVE-2023-21029
+ RESERVED
+CVE-2023-21028
+ RESERVED
+CVE-2023-21027
+ RESERVED
+CVE-2023-21026
+ RESERVED
+CVE-2023-21025
+ RESERVED
+CVE-2023-21024
+ RESERVED
+CVE-2023-21023
+ RESERVED
+CVE-2023-21022
+ RESERVED
+CVE-2023-21021
+ RESERVED
+CVE-2023-21020
+ RESERVED
+CVE-2023-21019
+ RESERVED
+CVE-2023-21018
+ RESERVED
+CVE-2023-21017
+ RESERVED
+CVE-2023-21016
+ RESERVED
+CVE-2023-21015
+ RESERVED
+CVE-2023-21014
+ RESERVED
+CVE-2023-21013
+ RESERVED
+CVE-2023-21012
+ RESERVED
+CVE-2023-21011
+ RESERVED
+CVE-2023-21010
+ RESERVED
+CVE-2023-21009
+ RESERVED
+CVE-2023-21008
+ RESERVED
+CVE-2023-21007
+ RESERVED
+CVE-2023-21006
+ RESERVED
+CVE-2023-21005
+ RESERVED
+CVE-2023-21004
+ RESERVED
+CVE-2023-21003
+ RESERVED
+CVE-2023-21002
+ RESERVED
+CVE-2023-21001
+ RESERVED
+CVE-2023-21000
+ RESERVED
+CVE-2023-20999
+ RESERVED
+CVE-2023-20998
+ RESERVED
+CVE-2023-20997
+ RESERVED
+CVE-2023-20996
+ RESERVED
+CVE-2023-20995
+ RESERVED
+CVE-2023-20994
+ RESERVED
+CVE-2023-20993
+ RESERVED
+CVE-2023-20992
+ RESERVED
+CVE-2023-20991
+ RESERVED
+CVE-2023-20990
+ RESERVED
+CVE-2023-20989
+ RESERVED
+CVE-2023-20988
+ RESERVED
+CVE-2023-20987
+ RESERVED
+CVE-2023-20986
+ RESERVED
+CVE-2023-20985
+ RESERVED
+CVE-2023-20984
+ RESERVED
+CVE-2023-20983
+ RESERVED
+CVE-2023-20982
+ RESERVED
+CVE-2023-20981
+ RESERVED
+CVE-2023-20980
+ RESERVED
+CVE-2023-20979
+ RESERVED
+CVE-2023-20978
+ RESERVED
+CVE-2023-20977
+ RESERVED
+CVE-2023-20976
+ RESERVED
+CVE-2023-20975
+ RESERVED
+CVE-2023-20974
+ RESERVED
+CVE-2023-20973
+ RESERVED
+CVE-2023-20972
+ RESERVED
+CVE-2023-20971
+ RESERVED
+CVE-2023-20970
+ RESERVED
+CVE-2023-20969
+ RESERVED
+CVE-2023-20968
+ RESERVED
+CVE-2023-20967
+ RESERVED
+CVE-2023-20966
+ RESERVED
+CVE-2023-20965
+ RESERVED
+CVE-2023-20964
+ RESERVED
+CVE-2023-20963
+ RESERVED
+CVE-2023-20962
+ RESERVED
+CVE-2023-20961
+ RESERVED
+CVE-2023-20960
+ RESERVED
+CVE-2023-20959
+ RESERVED
+CVE-2023-20958
+ RESERVED
+CVE-2023-20957
+ RESERVED
+CVE-2023-20956
+ RESERVED
+CVE-2023-20955
+ RESERVED
+CVE-2023-20954
+ RESERVED
+CVE-2023-20953
+ RESERVED
+CVE-2023-20952
+ RESERVED
+CVE-2023-20951
+ RESERVED
+CVE-2023-20950
+ RESERVED
+CVE-2023-20949
+ RESERVED
+CVE-2023-20948
+ RESERVED
+CVE-2023-20947
+ RESERVED
+CVE-2023-20946
+ RESERVED
+CVE-2023-20945
+ RESERVED
+CVE-2023-20944
+ RESERVED
+CVE-2023-20943
+ RESERVED
+CVE-2023-20942
+ RESERVED
+CVE-2023-20941
+ RESERVED
+CVE-2023-20940
+ RESERVED
+CVE-2023-20939
+ RESERVED
+CVE-2023-20938
+ RESERVED
+CVE-2023-20937
+ RESERVED
+CVE-2023-20936
+ RESERVED
+CVE-2023-20935
+ RESERVED
+CVE-2023-20934
+ RESERVED
+CVE-2023-20933
+ RESERVED
+CVE-2023-20932
+ RESERVED
+CVE-2023-20931
+ RESERVED
+CVE-2023-20930
+ RESERVED
+CVE-2023-20929
+ RESERVED
+CVE-2023-20928
+ RESERVED
+CVE-2023-20927
+ RESERVED
+CVE-2023-20926
+ RESERVED
+CVE-2023-20925
+ RESERVED
+CVE-2023-20924
+ RESERVED
+CVE-2023-20923
+ RESERVED
+CVE-2023-20922
+ RESERVED
+CVE-2023-20921
+ RESERVED
+CVE-2023-20920
+ RESERVED
+CVE-2023-20919
+ RESERVED
+CVE-2023-20918
+ RESERVED
+CVE-2023-20917
+ RESERVED
+CVE-2023-20916
+ RESERVED
+CVE-2023-20915
+ RESERVED
+CVE-2023-20914
+ RESERVED
+CVE-2023-20913
+ RESERVED
+CVE-2023-20912
+ RESERVED
+CVE-2023-20911
+ RESERVED
+CVE-2023-20910
+ RESERVED
+CVE-2023-20909
+ RESERVED
+CVE-2023-20908
+ RESERVED
+CVE-2023-20907
+ RESERVED
+CVE-2023-20906
+ RESERVED
+CVE-2023-20905
+ RESERVED
+CVE-2023-20904
+ RESERVED
+CVE-2022-44714
+ RESERVED
+CVE-2022-44713
+ RESERVED
+CVE-2022-44712
+ RESERVED
+CVE-2022-44711
+ RESERVED
+CVE-2022-44710
+ RESERVED
+CVE-2022-44709
+ RESERVED
+CVE-2022-44708
+ RESERVED
+CVE-2022-44707
+ RESERVED
+CVE-2022-44706
+ RESERVED
+CVE-2022-44705
+ RESERVED
+CVE-2022-44704
+ RESERVED
+CVE-2022-44703
+ RESERVED
+CVE-2022-44702
+ RESERVED
+CVE-2022-44701
+ RESERVED
+CVE-2022-44700
+ RESERVED
+CVE-2022-44699
+ RESERVED
+CVE-2022-44698
+ RESERVED
+CVE-2022-44697
+ RESERVED
+CVE-2022-44696
+ RESERVED
+CVE-2022-44695
+ RESERVED
+CVE-2022-44694
+ RESERVED
+CVE-2022-44693
+ RESERVED
+CVE-2022-44692
+ RESERVED
+CVE-2022-44691
+ RESERVED
+CVE-2022-44690
+ RESERVED
+CVE-2022-44689
+ RESERVED
+CVE-2022-44688
+ RESERVED
+CVE-2022-44687
+ RESERVED
+CVE-2022-44686
+ RESERVED
+CVE-2022-44685
+ RESERVED
+CVE-2022-44684
+ RESERVED
+CVE-2022-44683
+ RESERVED
+CVE-2022-44682
+ RESERVED
+CVE-2022-44681
+ RESERVED
+CVE-2022-44680
+ RESERVED
+CVE-2022-44679
+ RESERVED
+CVE-2022-44678
+ RESERVED
+CVE-2022-44677
+ RESERVED
+CVE-2022-44676
+ RESERVED
+CVE-2022-44675
+ RESERVED
+CVE-2022-44674
+ RESERVED
+CVE-2022-44673
+ RESERVED
+CVE-2022-44672
+ RESERVED
+CVE-2022-44671
+ RESERVED
+CVE-2022-44670
+ RESERVED
+CVE-2022-44669
+ RESERVED
+CVE-2022-44668
+ RESERVED
+CVE-2022-44667
+ RESERVED
+CVE-2022-44666
+ RESERVED
+CVE-2022-44665
+ RESERVED
+CVE-2022-3855
+ RESERVED
+CVE-2022-3854
+ RESERVED
CVE-2022-44664
RESERVED
CVE-2022-44663
@@ -99,10 +1203,10 @@ CVE-2022-44630
RESERVED
CVE-2022-44629
RESERVED
-CVE-2022-44628
- RESERVED
-CVE-2022-44627
- RESERVED
+CVE-2022-44628 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jump ...)
+ TODO: check
+CVE-2022-44627 (Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple S ...)
+ TODO: check
CVE-2022-44626
RESERVED
CVE-2022-44625
@@ -418,7 +1522,8 @@ CVE-2022-3798 (A vulnerability classified as critical has been found in IBAX go-
NOT-FOR-US: IBAX go-ibax
CVE-2022-3797 (A vulnerability was found in eolinker apinto-dashboard. It has been ra ...)
NOT-FOR-US: eolinker apinto-dashboard
-CVE-2022-3796 (A vulnerability was found in Events Calendar Plugin. It has been decla ...)
+CVE-2022-3796
+ REJECTED
NOT-FOR-US: Events Calendar Plugin
CVE-2022-3795
RESERVED
@@ -677,16 +1782,16 @@ CVE-2022-44457
RESERVED
CVE-2022-43506
RESERVED
-CVE-2022-43495
- RESERVED
+CVE-2022-43495 (OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distr ...)
+ TODO: check
CVE-2022-43457
RESERVED
CVE-2022-43452
RESERVED
-CVE-2022-43451
- RESERVED
-CVE-2022-43449
- RESERVED
+CVE-2022-43451 (OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal v ...)
+ TODO: check
+CVE-2022-43449 (OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulne ...)
+ TODO: check
CVE-2022-43447
RESERVED
CVE-2022-41775
@@ -705,7 +1810,8 @@ CVE-2022-3775
RESERVED
CVE-2022-3774 (A vulnerability was found in SourceCodester Train Scheduler App 1.0 an ...)
NOT-FOR-US: SourceCodester Train Scheduler App
-CVE-2022-3773 (A vulnerability has been found in EmbedPress Plugin and classified as ...)
+CVE-2022-3773
+ REJECTED
NOT-FOR-US: EmbedPress Plugin
CVE-2022-3772 (A vulnerability, which was classified as problematic, was found in eas ...)
NOT-FOR-US: easyii CMS
@@ -4520,14 +5626,14 @@ CVE-2022-43576
RESERVED
CVE-2022-43575
RESERVED
-CVE-2022-43574
- RESERVED
+CVE-2022-43574 ("IBM Robotic Process Automation 21.0.1, 21.0.2, 21.0.3, 21.0.4, and 21 ...)
+ TODO: check
CVE-2022-43573
RESERVED
CVE-2022-43572
RESERVED
-CVE-2022-43571
- RESERVED
+CVE-2022-43571 (In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authe ...)
+ TODO: check
CVE-2022-43570
RESERVED
CVE-2022-43569
@@ -4546,8 +5652,8 @@ CVE-2022-43563
RESERVED
CVE-2022-43562
RESERVED
-CVE-2022-43561
- RESERVED
+CVE-2022-43561 (In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote ...)
+ TODO: check
CVE-2022-43560
RESERVED
CVE-2022-43559
@@ -5831,12 +6937,12 @@ CVE-2022-43065
RESERVED
CVE-2022-43064
RESERVED
-CVE-2022-43063
- RESERVED
-CVE-2022-43062
- RESERVED
-CVE-2022-43061
- RESERVED
+CVE-2022-43063 (Online Diagnostic Lab Management System v1.0 was discovered to contain ...)
+ TODO: check
+CVE-2022-43062 (Online Diagnostic Lab Management System v1.0 was discovered to contain ...)
+ TODO: check
+CVE-2022-43061 (Online Tours & Travels Management System v1.0 was discovered to co ...)
+ TODO: check
CVE-2022-43060
RESERVED
CVE-2022-43059
@@ -6854,20 +7960,20 @@ CVE-2022-42751 (CandidATS version 3.0.0 allows an external attacker to elevate p
NOT-FOR-US: CandidATS
CVE-2022-42750 (CandidATS version 3.0.0 allows an external attacker to steal the cooki ...)
NOT-FOR-US: CandidATS
-CVE-2022-42749
- RESERVED
-CVE-2022-42748
- RESERVED
-CVE-2022-42747
- RESERVED
-CVE-2022-42746
- RESERVED
-CVE-2022-42745
- RESERVED
-CVE-2022-42744
- RESERVED
-CVE-2022-42743
- RESERVED
+CVE-2022-42749 (CandidATS version 3.0.0 on 'page' of the 'ajax.php' resource, allows a ...)
+ TODO: check
+CVE-2022-42748 (CandidATS version 3.0.0 on 'sortDirection' of the 'ajax.php' resource, ...)
+ TODO: check
+CVE-2022-42747 (CandidATS version 3.0.0 on 'sortBy' of the 'ajax.php' resource, allows ...)
+ TODO: check
+CVE-2022-42746 (CandidATS version 3.0.0 on 'indexFile' of the 'ajax.php' resource, all ...)
+ TODO: check
+CVE-2022-42745 (CandidATS version 3.0.0 allows an external attacker to read arbitrary ...)
+ TODO: check
+CVE-2022-42744 (CandidATS version 3.0.0 allows an external attacker to perform CRUD op ...)
+ TODO: check
+CVE-2022-42743 (deep-parse-json version 1.0.2 allows an external attacker to edit or a ...)
+ TODO: check
CVE-2022-42742
RESERVED
CVE-2022-42741
@@ -7625,8 +8731,8 @@ CVE-2022-42444
RESERVED
CVE-2022-42443
RESERVED
-CVE-2022-42442
- RESERVED
+CVE-2022-42442 ("IBM Robotic Process Automation for Cloud Pak 21.0.1, 21.0.2, 21.0.3, ...)
+ TODO: check
CVE-2022-42441
RESERVED
CVE-2022-42440
@@ -9311,16 +10417,16 @@ CVE-2022-41715 (Programs which compile regular expressions from untrusted source
NOTE: https://go.dev/issue/55949
NOTE: https://github.com/golang/go/commit/645abfe529dc325e16daa17210640c2907d1c17a (go1.19.2)
NOTE: https://github.com/golang/go/commit/e9017c2416ad0ef642f5e0c2eab2dbf3cba4d997 (go1.18.7)
-CVE-2022-41714
- RESERVED
-CVE-2022-41713
- RESERVED
+CVE-2022-41714 (fastest-json-copy version 1.0.1 allows an external attacker to edit or ...)
+ TODO: check
+CVE-2022-41713 (deep-object-diff version 1.1.0 allows an external attacker to edit or ...)
+ TODO: check
CVE-2022-41712
RESERVED
CVE-2022-41711 (Badaso version 2.6.0 allows an unauthenticated remote attacker to exec ...)
NOT-FOR-US: Badaso
-CVE-2022-41710
- RESERVED
+CVE-2022-41710 (Markdownify version 1.4.1 allows an external attacker to remotely obta ...)
+ TODO: check
CVE-2022-41709 (Markdownify version 1.4.1 allows an external attacker to execute arbit ...)
NOT-FOR-US: Markdownify
CVE-2022-41708 (Relatedcode's Messenger version 7bcd20b allows an authenticated extern ...)
@@ -11669,8 +12775,8 @@ CVE-2022-40749
RESERVED
CVE-2022-40748 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
NOT-FOR-US: IBM
-CVE-2022-40747
- RESERVED
+CVE-2022-40747 ("IBM InfoSphere Information Server 11.7 is vulnerable to an XML Extern ...)
+ TODO: check
CVE-2022-40746
RESERVED
CVE-2022-40745
@@ -11850,8 +12956,8 @@ CVE-2022-40205
RESERVED
CVE-2022-40193 (Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability in Awe ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-40131
- RESERVED
+CVE-2022-40131 (Cross-Site Request Forgery (CSRF) vulnerability in a3rev Software Page ...)
+ TODO: check
CVE-2022-38974
RESERVED
CVE-2022-38468
@@ -11872,8 +12978,8 @@ CVE-2022-36424
RESERVED
CVE-2022-36417 (Multiple Stored Cross-Site Scripting (XSS) via Cross-Site Request Forg ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-36404
- RESERVED
+CVE-2022-36404 (Auth. (subscriber+) Broken Access Control vulnerability in David Cole ...)
+ TODO: check
CVE-2022-35238 (Unauthenticated Plugin Settings Change vulnerability in Awesome Filter ...)
NOT-FOR-US: WordPress plugin
CVE-2022-33978 (Reflected Cross-Site Scripting (XSS) vulnerability FontMeister plugin ...)
@@ -12852,8 +13958,8 @@ CVE-2022-40278 (An issue was discovered in Samsung TizenRT through 3.0_GBM (and
NOT-FOR-US: Samsung TizenRT
CVE-2022-40277 (Joplin version 2.8.8 allows an external attacker to execute arbitrary ...)
NOT-FOR-US: Joplin
-CVE-2022-40276
- RESERVED
+CVE-2022-40276 (Zettlr version 2.3.0 allows an external attacker to remotely obtain ar ...)
+ TODO: check
CVE-2022-40275
RESERVED
CVE-2022-40274 (Gridea version 0.9.3 allows an external attacker to execute arbitrary ...)
@@ -12953,8 +14059,8 @@ CVE-2022-40237
RESERVED
CVE-2022-40236
RESERVED
-CVE-2022-40235
- RESERVED
+CVE-2022-40235 ("IBM InfoSphere Information Server 11.7 could allow a user to cause a ...)
+ TODO: check
CVE-2022-40234 (Versions of IBM Spectrum Protect Plus prior to 10.1.12 (excluding 10.1 ...)
NOT-FOR-US: IBM
CVE-2022-40233
@@ -12963,8 +14069,8 @@ CVE-2022-40232
RESERVED
CVE-2022-40231
RESERVED
-CVE-2022-40230
- RESERVED
+CVE-2022-40230 ("IBM MQ Appliance 9.2 CD, 9.2 LTS, 9.3 CD, and LTS 9.3 does not invali ...)
+ TODO: check
CVE-2022-40229
RESERVED
CVE-2022-40228
@@ -16846,12 +17952,12 @@ CVE-2022-38714
RESERVED
CVE-2022-38713
RESERVED
-CVE-2022-38712
- RESERVED
+CVE-2022-38712 ("IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Web services ...)
+ TODO: check
CVE-2022-38711
RESERVED
-CVE-2022-38710
- RESERVED
+CVE-2022-38710 ("IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensi ...)
+ TODO: check
CVE-2022-38709 (IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 for Cloud Pa ...)
NOT-FOR-US: IBM
CVE-2022-38708
@@ -18656,8 +19762,8 @@ CVE-2022-2760 (In affected versions of Octopus Deploy it is possible to reveal t
NOT-FOR-US: Octopus Deploy
CVE-2022-38169
RESERVED
-CVE-2022-38168
- RESERVED
+CVE-2022-38168 (Broken Access Control in User Authentication in Avaya Scopia Pathfinde ...)
+ TODO: check
CVE-2022-38167
RESERVED
CVE-2022-38166
@@ -18887,8 +19993,8 @@ CVE-2022-36793 (Unauthenticated Plugin Settings Change & Data Deletion vulne
NOT-FOR-US: WordPress plugin
CVE-2022-36791 (Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnera ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-36428
- RESERVED
+CVE-2022-36428 (Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Stage Rock ...)
+ TODO: check
CVE-2022-36427 (Missing Access Control vulnerability in About Rentals. Inc. About Rent ...)
NOT-FOR-US: WordPress plugin
CVE-2022-36425 (Broken Access Control vulnerability in Beaver Builder plugin <= 2.5 ...)
@@ -19260,28 +20366,28 @@ CVE-2022-37914 (Vulnerabilities in the web-based management interface of Aruba E
NOT-FOR-US: Aruba
CVE-2022-37913 (Vulnerabilities in the web-based management interface of Aruba EdgeCon ...)
NOT-FOR-US: Aruba
-CVE-2022-37912
- RESERVED
-CVE-2022-37911
- RESERVED
-CVE-2022-37910
- RESERVED
-CVE-2022-37909
- RESERVED
-CVE-2022-37908
- RESERVED
-CVE-2022-37907
- RESERVED
-CVE-2022-37906
- RESERVED
-CVE-2022-37905
- RESERVED
-CVE-2022-37904
- RESERVED
-CVE-2022-37903
- RESERVED
-CVE-2022-37902
- RESERVED
+CVE-2022-37912 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
+ TODO: check
+CVE-2022-37911 (Due to improper restrictions on XML entities multiple vulnerabilities ...)
+ TODO: check
+CVE-2022-37910 (A buffer overflow vulnerability exists in the ArubaOS command line int ...)
+ TODO: check
+CVE-2022-37909 (Aruba has identified certain configurations of ArubaOS that can lead t ...)
+ TODO: check
+CVE-2022-37908 (An authenticated attacker can impact the integrity of the ArubaOS boot ...)
+ TODO: check
+CVE-2022-37907 (A vulnerability exists in the ArubaOS bootloader on 7xxx series contro ...)
+ TODO: check
+CVE-2022-37906 (An authenticated path traversal vulnerability exists in the ArubaOS co ...)
+ TODO: check
+CVE-2022-37905 (Vulnerabilities in ArubaOS running on 7xxx series controllers exist th ...)
+ TODO: check
+CVE-2022-37904 (Vulnerabilities in ArubaOS running on 7xxx series controllers exist th ...)
+ TODO: check
+CVE-2022-37903 (A vulnerability exists that allows an authenticated attacker to overwr ...)
+ TODO: check
+CVE-2022-37902 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
+ TODO: check
CVE-2022-37901 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
TODO: check
CVE-2022-37900 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
@@ -24891,8 +25997,8 @@ CVE-2022-35719
RESERVED
CVE-2022-35718
RESERVED
-CVE-2022-35717
- RESERVED
+CVE-2022-35717 ("IBM InfoSphere Information Server 11.7 could allow a locally authenti ...)
+ TODO: check
CVE-2022-35716 (IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.16, 7.0.0.0 through 7 ...)
NOT-FOR-US: IBM
CVE-2022-35715 (IBM InfoSphere Information Server 11.7 could allow a remote attacker t ...)
@@ -25090,8 +26196,8 @@ CVE-2022-35644
RESERVED
CVE-2022-35643 (IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with syst ...)
NOT-FOR-US: IBM
-CVE-2022-35642
- RESERVED
+CVE-2022-35642 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site sc ...)
+ TODO: check
CVE-2022-35641
RESERVED
CVE-2022-35640
@@ -26067,8 +27173,8 @@ CVE-2022-35281
RESERVED
CVE-2022-35280 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not req ...)
NOT-FOR-US: IBM
-CVE-2022-35279
- RESERVED
+CVE-2022-35279 ("IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0 ...)
+ TODO: check
CVE-2022-35278 (In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show mal ...)
NOT-FOR-US: Apache ActiveMQ Artemis
CVE-2022-34850 (An OS command injection vulnerability exists in the web_server /action ...)
@@ -27391,8 +28497,8 @@ CVE-2022-27235 (Multiple Broken Access Control vulnerabilities in Social Share B
NOT-FOR-US: WordPress plugin
CVE-2022-26366
RESERVED
-CVE-2022-25952
- RESERVED
+CVE-2022-25952 (Cross-Site Request Forgery (CSRF) vulnerability in Keywordrush Content ...)
+ TODO: check
CVE-2022-2276 (The WP Edit Menu WordPress plugin before 1.5.0 does not have authorisa ...)
NOT-FOR-US: WordPress plugin
CVE-2022-2275 (The WP Edit Menu WordPress plugin before 1.5.0 does not have CSRF in a ...)
@@ -28832,8 +29938,8 @@ CVE-2022-34341
RESERVED
CVE-2022-34340
RESERVED
-CVE-2022-34339
- RESERVED
+CVE-2022-34339 ("IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user credentials i ...)
+ TODO: check
CVE-2022-34338 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could disclo ...)
NOT-FOR-US: IBM
CVE-2022-34337
@@ -39084,8 +40190,8 @@ CVE-2022-1700 (Improper Restriction of XML External Entity Reference ('XXE') vul
NOT-FOR-US: Forcepoint
CVE-2022-30616 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow ...)
NOT-FOR-US: IBM
-CVE-2022-30615
- RESERVED
+CVE-2022-30615 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site sc ...)
+ TODO: check
CVE-2022-30614 (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to a den ...)
NOT-FOR-US: IBM
CVE-2022-30613 (IBM QRadar SIEM 7.4 and 7.5 could disclose sensitive information via a ...)
@@ -39098,8 +40204,8 @@ CVE-2022-30610 (IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.15.0 is vu
NOT-FOR-US: IBM
CVE-2022-30609
RESERVED
-CVE-2022-30608
- RESERVED
+CVE-2022-30608 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site re ...)
+ TODO: check
CVE-2022-30607 (IBM Robotic Process Automation 20.10.0, 20.12.5, 21.0.0, 21.0.1, and 2 ...)
NOT-FOR-US: IBM
CVE-2022-30546 (Out-of-bounds read vulnerability exists in the simulator module contai ...)
@@ -52776,7 +53882,7 @@ CVE-2022-25894
RESERVED
CVE-2022-25893
RESERVED
-CVE-2022-25892 (The package muhammara before 2.6.1, from 3.1.0 and before 3.1.1; all v ...)
+CVE-2022-25892 (The package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all v ...)
TODO: check
CVE-2022-25891 (The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are v ...)
NOT-FOR-US: github.com/containrrr/shoutrrr/pkg/util
@@ -64937,8 +66043,8 @@ CVE-2022-22444 (IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user to
NOT-FOR-US: IBM
CVE-2022-22443 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
NOT-FOR-US: IBM
-CVE-2022-22442
- RESERVED
+CVE-2022-22442 ("IBM InfoSphere Information Server 11.7 could allow an authenticated u ...)
+ TODO: check
CVE-2022-22441 (IBM InfoSphere Information Server 11.7 could allow an authenticated us ...)
NOT-FOR-US: IBM
CVE-2022-22440
@@ -64971,8 +66077,8 @@ CVE-2022-22427 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-si
NOT-FOR-US: IBM
CVE-2022-22426 (IBM Spectrum Copy Data Management Admin 2.2.0.0 through 2.2.15.0 could ...)
NOT-FOR-US: IBM
-CVE-2022-22425
- RESERVED
+CVE-2022-22425 ("IBM InfoSphere Information Server 11.7 is potentially vulnerable to C ...)
+ TODO: check
CVE-2022-22424 (IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to obtain s ...)
NOT-FOR-US: IBM
CVE-2022-22423 (IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7. ...)
@@ -69905,8 +71011,8 @@ CVE-2021-44864 (TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable t
NOT-FOR-US: TP-Link
CVE-2021-44863
RESERVED
-CVE-2021-44862
- RESERVED
+CVE-2021-44862 (Netskope client is impacted by a vulnerability where an authenticated, ...)
+ TODO: check
CVE-2021-44861
RESERVED
CVE-2021-44860 (An out-of-bounds read vulnerability exists when reading a TIF file usi ...)
@@ -76028,6 +77134,7 @@ CVE-2021-43307 (An exponential ReDoS (Regular Expression Denial of Service) can
CVE-2021-43306 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
NOT-FOR-US: Node jquery-validation
CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec when parsin ...)
+ {DLA-3176-1}
- clickhouse <unfixed> (bug #1008216)
[bullseye] - clickhouse <no-dsa> (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -76035,6 +77142,7 @@ CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec when
NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
CVE-2021-43304 (Heap buffer overflow in Clickhouse's LZ4 compression codec when parsin ...)
+ {DLA-3176-1}
- clickhouse <unfixed> (bug #1008216)
[bullseye] - clickhouse <no-dsa> (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -80439,6 +81547,7 @@ CVE-2021-42389 (Divide-by-zero in Clickhouse's Delta compression codec when pars
- clickhouse <not-affected> (Vulnerable code introduced later)
NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec when par ...)
+ {DLA-3176-1}
- clickhouse <unfixed> (bug #1008216)
[bullseye] - clickhouse <no-dsa> (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -80446,6 +81555,7 @@ CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec wh
NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
CVE-2021-42387 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec when par ...)
+ {DLA-3176-1}
- clickhouse <unfixed> (bug #1008216)
[bullseye] - clickhouse <no-dsa> (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -89178,8 +90288,8 @@ CVE-2021-39079 (IBM Cognos Analytics Mobile for Android applications prior to ve
NOT-FOR-US: IBM
CVE-2021-39078 (IBM Security Guardium 10.5 stores user credentials in plain clear text ...)
NOT-FOR-US: IBM
-CVE-2021-39077
- RESERVED
+CVE-2021-39077 ("IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 st ...)
+ TODO: check
CVE-2021-39076 (IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptogr ...)
NOT-FOR-US: IBM
CVE-2021-39075
@@ -94648,8 +95758,8 @@ CVE-2021-36908 (Cross-Site Request Forgery (CSRF) vulnerability leading to Datab
NOT-FOR-US: WordPress plugin
CVE-2021-36907
RESERVED
-CVE-2021-36906
- RESERVED
+CVE-2021-36906 (Multiple Insecure Direct Object References (IDOR) vulnerabilities in E ...)
+ TODO: check
CVE-2021-36905
RESERVED
CVE-2021-36904
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221104/f004b204/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list