[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 4 08:10:26 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d8a2086a by security tracker role at 2022-11-04T08:10:15+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1107 @@
+CVE-2023-21403
+	RESERVED
+CVE-2023-21402
+	RESERVED
+CVE-2023-21401
+	RESERVED
+CVE-2023-21400
+	RESERVED
+CVE-2023-21399
+	RESERVED
+CVE-2023-21398
+	RESERVED
+CVE-2023-21397
+	RESERVED
+CVE-2023-21396
+	RESERVED
+CVE-2023-21395
+	RESERVED
+CVE-2023-21394
+	RESERVED
+CVE-2023-21393
+	RESERVED
+CVE-2023-21392
+	RESERVED
+CVE-2023-21391
+	RESERVED
+CVE-2023-21390
+	RESERVED
+CVE-2023-21389
+	RESERVED
+CVE-2023-21388
+	RESERVED
+CVE-2023-21387
+	RESERVED
+CVE-2023-21386
+	RESERVED
+CVE-2023-21385
+	RESERVED
+CVE-2023-21384
+	RESERVED
+CVE-2023-21383
+	RESERVED
+CVE-2023-21382
+	RESERVED
+CVE-2023-21381
+	RESERVED
+CVE-2023-21380
+	RESERVED
+CVE-2023-21379
+	RESERVED
+CVE-2023-21378
+	RESERVED
+CVE-2023-21377
+	RESERVED
+CVE-2023-21376
+	RESERVED
+CVE-2023-21375
+	RESERVED
+CVE-2023-21374
+	RESERVED
+CVE-2023-21373
+	RESERVED
+CVE-2023-21372
+	RESERVED
+CVE-2023-21371
+	RESERVED
+CVE-2023-21370
+	RESERVED
+CVE-2023-21369
+	RESERVED
+CVE-2023-21368
+	RESERVED
+CVE-2023-21367
+	RESERVED
+CVE-2023-21366
+	RESERVED
+CVE-2023-21365
+	RESERVED
+CVE-2023-21364
+	RESERVED
+CVE-2023-21363
+	RESERVED
+CVE-2023-21362
+	RESERVED
+CVE-2023-21361
+	RESERVED
+CVE-2023-21360
+	RESERVED
+CVE-2023-21359
+	RESERVED
+CVE-2023-21358
+	RESERVED
+CVE-2023-21357
+	RESERVED
+CVE-2023-21356
+	RESERVED
+CVE-2023-21355
+	RESERVED
+CVE-2023-21354
+	RESERVED
+CVE-2023-21353
+	RESERVED
+CVE-2023-21352
+	RESERVED
+CVE-2023-21351
+	RESERVED
+CVE-2023-21350
+	RESERVED
+CVE-2023-21349
+	RESERVED
+CVE-2023-21348
+	RESERVED
+CVE-2023-21347
+	RESERVED
+CVE-2023-21346
+	RESERVED
+CVE-2023-21345
+	RESERVED
+CVE-2023-21344
+	RESERVED
+CVE-2023-21343
+	RESERVED
+CVE-2023-21342
+	RESERVED
+CVE-2023-21341
+	RESERVED
+CVE-2023-21340
+	RESERVED
+CVE-2023-21339
+	RESERVED
+CVE-2023-21338
+	RESERVED
+CVE-2023-21337
+	RESERVED
+CVE-2023-21336
+	RESERVED
+CVE-2023-21335
+	RESERVED
+CVE-2023-21334
+	RESERVED
+CVE-2023-21333
+	RESERVED
+CVE-2023-21332
+	RESERVED
+CVE-2023-21331
+	RESERVED
+CVE-2023-21330
+	RESERVED
+CVE-2023-21329
+	RESERVED
+CVE-2023-21328
+	RESERVED
+CVE-2023-21327
+	RESERVED
+CVE-2023-21326
+	RESERVED
+CVE-2023-21325
+	RESERVED
+CVE-2023-21324
+	RESERVED
+CVE-2023-21323
+	RESERVED
+CVE-2023-21322
+	RESERVED
+CVE-2023-21321
+	RESERVED
+CVE-2023-21320
+	RESERVED
+CVE-2023-21319
+	RESERVED
+CVE-2023-21318
+	RESERVED
+CVE-2023-21317
+	RESERVED
+CVE-2023-21316
+	RESERVED
+CVE-2023-21315
+	RESERVED
+CVE-2023-21314
+	RESERVED
+CVE-2023-21313
+	RESERVED
+CVE-2023-21312
+	RESERVED
+CVE-2023-21311
+	RESERVED
+CVE-2023-21310
+	RESERVED
+CVE-2023-21309
+	RESERVED
+CVE-2023-21308
+	RESERVED
+CVE-2023-21307
+	RESERVED
+CVE-2023-21306
+	RESERVED
+CVE-2023-21305
+	RESERVED
+CVE-2023-21304
+	RESERVED
+CVE-2023-21303
+	RESERVED
+CVE-2023-21302
+	RESERVED
+CVE-2023-21301
+	RESERVED
+CVE-2023-21300
+	RESERVED
+CVE-2023-21299
+	RESERVED
+CVE-2023-21298
+	RESERVED
+CVE-2023-21297
+	RESERVED
+CVE-2023-21296
+	RESERVED
+CVE-2023-21295
+	RESERVED
+CVE-2023-21294
+	RESERVED
+CVE-2023-21293
+	RESERVED
+CVE-2023-21292
+	RESERVED
+CVE-2023-21291
+	RESERVED
+CVE-2023-21290
+	RESERVED
+CVE-2023-21289
+	RESERVED
+CVE-2023-21288
+	RESERVED
+CVE-2023-21287
+	RESERVED
+CVE-2023-21286
+	RESERVED
+CVE-2023-21285
+	RESERVED
+CVE-2023-21284
+	RESERVED
+CVE-2023-21283
+	RESERVED
+CVE-2023-21282
+	RESERVED
+CVE-2023-21281
+	RESERVED
+CVE-2023-21280
+	RESERVED
+CVE-2023-21279
+	RESERVED
+CVE-2023-21278
+	RESERVED
+CVE-2023-21277
+	RESERVED
+CVE-2023-21276
+	RESERVED
+CVE-2023-21275
+	RESERVED
+CVE-2023-21274
+	RESERVED
+CVE-2023-21273
+	RESERVED
+CVE-2023-21272
+	RESERVED
+CVE-2023-21271
+	RESERVED
+CVE-2023-21270
+	RESERVED
+CVE-2023-21269
+	RESERVED
+CVE-2023-21268
+	RESERVED
+CVE-2023-21267
+	RESERVED
+CVE-2023-21266
+	RESERVED
+CVE-2023-21265
+	RESERVED
+CVE-2023-21264
+	RESERVED
+CVE-2023-21263
+	RESERVED
+CVE-2023-21262
+	RESERVED
+CVE-2023-21261
+	RESERVED
+CVE-2023-21260
+	RESERVED
+CVE-2023-21259
+	RESERVED
+CVE-2023-21258
+	RESERVED
+CVE-2023-21257
+	RESERVED
+CVE-2023-21256
+	RESERVED
+CVE-2023-21255
+	RESERVED
+CVE-2023-21254
+	RESERVED
+CVE-2023-21253
+	RESERVED
+CVE-2023-21252
+	RESERVED
+CVE-2023-21251
+	RESERVED
+CVE-2023-21250
+	RESERVED
+CVE-2023-21249
+	RESERVED
+CVE-2023-21248
+	RESERVED
+CVE-2023-21247
+	RESERVED
+CVE-2023-21246
+	RESERVED
+CVE-2023-21245
+	RESERVED
+CVE-2023-21244
+	RESERVED
+CVE-2023-21243
+	RESERVED
+CVE-2023-21242
+	RESERVED
+CVE-2023-21241
+	RESERVED
+CVE-2023-21240
+	RESERVED
+CVE-2023-21239
+	RESERVED
+CVE-2023-21238
+	RESERVED
+CVE-2023-21237
+	RESERVED
+CVE-2023-21236
+	RESERVED
+CVE-2023-21235
+	RESERVED
+CVE-2023-21234
+	RESERVED
+CVE-2023-21233
+	RESERVED
+CVE-2023-21232
+	RESERVED
+CVE-2023-21231
+	RESERVED
+CVE-2023-21230
+	RESERVED
+CVE-2023-21229
+	RESERVED
+CVE-2023-21228
+	RESERVED
+CVE-2023-21227
+	RESERVED
+CVE-2023-21226
+	RESERVED
+CVE-2023-21225
+	RESERVED
+CVE-2023-21224
+	RESERVED
+CVE-2023-21223
+	RESERVED
+CVE-2023-21222
+	RESERVED
+CVE-2023-21221
+	RESERVED
+CVE-2023-21220
+	RESERVED
+CVE-2023-21219
+	RESERVED
+CVE-2023-21218
+	RESERVED
+CVE-2023-21217
+	RESERVED
+CVE-2023-21216
+	RESERVED
+CVE-2023-21215
+	RESERVED
+CVE-2023-21214
+	RESERVED
+CVE-2023-21213
+	RESERVED
+CVE-2023-21212
+	RESERVED
+CVE-2023-21211
+	RESERVED
+CVE-2023-21210
+	RESERVED
+CVE-2023-21209
+	RESERVED
+CVE-2023-21208
+	RESERVED
+CVE-2023-21207
+	RESERVED
+CVE-2023-21206
+	RESERVED
+CVE-2023-21205
+	RESERVED
+CVE-2023-21204
+	RESERVED
+CVE-2023-21203
+	RESERVED
+CVE-2023-21202
+	RESERVED
+CVE-2023-21201
+	RESERVED
+CVE-2023-21200
+	RESERVED
+CVE-2023-21199
+	RESERVED
+CVE-2023-21198
+	RESERVED
+CVE-2023-21197
+	RESERVED
+CVE-2023-21196
+	RESERVED
+CVE-2023-21195
+	RESERVED
+CVE-2023-21194
+	RESERVED
+CVE-2023-21193
+	RESERVED
+CVE-2023-21192
+	RESERVED
+CVE-2023-21191
+	RESERVED
+CVE-2023-21190
+	RESERVED
+CVE-2023-21189
+	RESERVED
+CVE-2023-21188
+	RESERVED
+CVE-2023-21187
+	RESERVED
+CVE-2023-21186
+	RESERVED
+CVE-2023-21185
+	RESERVED
+CVE-2023-21184
+	RESERVED
+CVE-2023-21183
+	RESERVED
+CVE-2023-21182
+	RESERVED
+CVE-2023-21181
+	RESERVED
+CVE-2023-21180
+	RESERVED
+CVE-2023-21179
+	RESERVED
+CVE-2023-21178
+	RESERVED
+CVE-2023-21177
+	RESERVED
+CVE-2023-21176
+	RESERVED
+CVE-2023-21175
+	RESERVED
+CVE-2023-21174
+	RESERVED
+CVE-2023-21173
+	RESERVED
+CVE-2023-21172
+	RESERVED
+CVE-2023-21171
+	RESERVED
+CVE-2023-21170
+	RESERVED
+CVE-2023-21169
+	RESERVED
+CVE-2023-21168
+	RESERVED
+CVE-2023-21167
+	RESERVED
+CVE-2023-21166
+	RESERVED
+CVE-2023-21165
+	RESERVED
+CVE-2023-21164
+	RESERVED
+CVE-2023-21163
+	RESERVED
+CVE-2023-21162
+	RESERVED
+CVE-2023-21161
+	RESERVED
+CVE-2023-21160
+	RESERVED
+CVE-2023-21159
+	RESERVED
+CVE-2023-21158
+	RESERVED
+CVE-2023-21157
+	RESERVED
+CVE-2023-21156
+	RESERVED
+CVE-2023-21155
+	RESERVED
+CVE-2023-21154
+	RESERVED
+CVE-2023-21153
+	RESERVED
+CVE-2023-21152
+	RESERVED
+CVE-2023-21151
+	RESERVED
+CVE-2023-21150
+	RESERVED
+CVE-2023-21149
+	RESERVED
+CVE-2023-21148
+	RESERVED
+CVE-2023-21147
+	RESERVED
+CVE-2023-21146
+	RESERVED
+CVE-2023-21145
+	RESERVED
+CVE-2023-21144
+	RESERVED
+CVE-2023-21143
+	RESERVED
+CVE-2023-21142
+	RESERVED
+CVE-2023-21141
+	RESERVED
+CVE-2023-21140
+	RESERVED
+CVE-2023-21139
+	RESERVED
+CVE-2023-21138
+	RESERVED
+CVE-2023-21137
+	RESERVED
+CVE-2023-21136
+	RESERVED
+CVE-2023-21135
+	RESERVED
+CVE-2023-21134
+	RESERVED
+CVE-2023-21133
+	RESERVED
+CVE-2023-21132
+	RESERVED
+CVE-2023-21131
+	RESERVED
+CVE-2023-21130
+	RESERVED
+CVE-2023-21129
+	RESERVED
+CVE-2023-21128
+	RESERVED
+CVE-2023-21127
+	RESERVED
+CVE-2023-21126
+	RESERVED
+CVE-2023-21125
+	RESERVED
+CVE-2023-21124
+	RESERVED
+CVE-2023-21123
+	RESERVED
+CVE-2023-21122
+	RESERVED
+CVE-2023-21121
+	RESERVED
+CVE-2023-21120
+	RESERVED
+CVE-2023-21119
+	RESERVED
+CVE-2023-21118
+	RESERVED
+CVE-2023-21117
+	RESERVED
+CVE-2023-21116
+	RESERVED
+CVE-2023-21115
+	RESERVED
+CVE-2023-21114
+	RESERVED
+CVE-2023-21113
+	RESERVED
+CVE-2023-21112
+	RESERVED
+CVE-2023-21111
+	RESERVED
+CVE-2023-21110
+	RESERVED
+CVE-2023-21109
+	RESERVED
+CVE-2023-21108
+	RESERVED
+CVE-2023-21107
+	RESERVED
+CVE-2023-21106
+	RESERVED
+CVE-2023-21105
+	RESERVED
+CVE-2023-21104
+	RESERVED
+CVE-2023-21103
+	RESERVED
+CVE-2023-21102
+	RESERVED
+CVE-2023-21101
+	RESERVED
+CVE-2023-21100
+	RESERVED
+CVE-2023-21099
+	RESERVED
+CVE-2023-21098
+	RESERVED
+CVE-2023-21097
+	RESERVED
+CVE-2023-21096
+	RESERVED
+CVE-2023-21095
+	RESERVED
+CVE-2023-21094
+	RESERVED
+CVE-2023-21093
+	RESERVED
+CVE-2023-21092
+	RESERVED
+CVE-2023-21091
+	RESERVED
+CVE-2023-21090
+	RESERVED
+CVE-2023-21089
+	RESERVED
+CVE-2023-21088
+	RESERVED
+CVE-2023-21087
+	RESERVED
+CVE-2023-21086
+	RESERVED
+CVE-2023-21085
+	RESERVED
+CVE-2023-21084
+	RESERVED
+CVE-2023-21083
+	RESERVED
+CVE-2023-21082
+	RESERVED
+CVE-2023-21081
+	RESERVED
+CVE-2023-21080
+	RESERVED
+CVE-2023-21079
+	RESERVED
+CVE-2023-21078
+	RESERVED
+CVE-2023-21077
+	RESERVED
+CVE-2023-21076
+	RESERVED
+CVE-2023-21075
+	RESERVED
+CVE-2023-21074
+	RESERVED
+CVE-2023-21073
+	RESERVED
+CVE-2023-21072
+	RESERVED
+CVE-2023-21071
+	RESERVED
+CVE-2023-21070
+	RESERVED
+CVE-2023-21069
+	RESERVED
+CVE-2023-21068
+	RESERVED
+CVE-2023-21067
+	RESERVED
+CVE-2023-21066
+	RESERVED
+CVE-2023-21065
+	RESERVED
+CVE-2023-21064
+	RESERVED
+CVE-2023-21063
+	RESERVED
+CVE-2023-21062
+	RESERVED
+CVE-2023-21061
+	RESERVED
+CVE-2023-21060
+	RESERVED
+CVE-2023-21059
+	RESERVED
+CVE-2023-21058
+	RESERVED
+CVE-2023-21057
+	RESERVED
+CVE-2023-21056
+	RESERVED
+CVE-2023-21055
+	RESERVED
+CVE-2023-21054
+	RESERVED
+CVE-2023-21053
+	RESERVED
+CVE-2023-21052
+	RESERVED
+CVE-2023-21051
+	RESERVED
+CVE-2023-21050
+	RESERVED
+CVE-2023-21049
+	RESERVED
+CVE-2023-21048
+	RESERVED
+CVE-2023-21047
+	RESERVED
+CVE-2023-21046
+	RESERVED
+CVE-2023-21045
+	RESERVED
+CVE-2023-21044
+	RESERVED
+CVE-2023-21043
+	RESERVED
+CVE-2023-21042
+	RESERVED
+CVE-2023-21041
+	RESERVED
+CVE-2023-21040
+	RESERVED
+CVE-2023-21039
+	RESERVED
+CVE-2023-21038
+	RESERVED
+CVE-2023-21037
+	RESERVED
+CVE-2023-21036
+	RESERVED
+CVE-2023-21035
+	RESERVED
+CVE-2023-21034
+	RESERVED
+CVE-2023-21033
+	RESERVED
+CVE-2023-21032
+	RESERVED
+CVE-2023-21031
+	RESERVED
+CVE-2023-21030
+	RESERVED
+CVE-2023-21029
+	RESERVED
+CVE-2023-21028
+	RESERVED
+CVE-2023-21027
+	RESERVED
+CVE-2023-21026
+	RESERVED
+CVE-2023-21025
+	RESERVED
+CVE-2023-21024
+	RESERVED
+CVE-2023-21023
+	RESERVED
+CVE-2023-21022
+	RESERVED
+CVE-2023-21021
+	RESERVED
+CVE-2023-21020
+	RESERVED
+CVE-2023-21019
+	RESERVED
+CVE-2023-21018
+	RESERVED
+CVE-2023-21017
+	RESERVED
+CVE-2023-21016
+	RESERVED
+CVE-2023-21015
+	RESERVED
+CVE-2023-21014
+	RESERVED
+CVE-2023-21013
+	RESERVED
+CVE-2023-21012
+	RESERVED
+CVE-2023-21011
+	RESERVED
+CVE-2023-21010
+	RESERVED
+CVE-2023-21009
+	RESERVED
+CVE-2023-21008
+	RESERVED
+CVE-2023-21007
+	RESERVED
+CVE-2023-21006
+	RESERVED
+CVE-2023-21005
+	RESERVED
+CVE-2023-21004
+	RESERVED
+CVE-2023-21003
+	RESERVED
+CVE-2023-21002
+	RESERVED
+CVE-2023-21001
+	RESERVED
+CVE-2023-21000
+	RESERVED
+CVE-2023-20999
+	RESERVED
+CVE-2023-20998
+	RESERVED
+CVE-2023-20997
+	RESERVED
+CVE-2023-20996
+	RESERVED
+CVE-2023-20995
+	RESERVED
+CVE-2023-20994
+	RESERVED
+CVE-2023-20993
+	RESERVED
+CVE-2023-20992
+	RESERVED
+CVE-2023-20991
+	RESERVED
+CVE-2023-20990
+	RESERVED
+CVE-2023-20989
+	RESERVED
+CVE-2023-20988
+	RESERVED
+CVE-2023-20987
+	RESERVED
+CVE-2023-20986
+	RESERVED
+CVE-2023-20985
+	RESERVED
+CVE-2023-20984
+	RESERVED
+CVE-2023-20983
+	RESERVED
+CVE-2023-20982
+	RESERVED
+CVE-2023-20981
+	RESERVED
+CVE-2023-20980
+	RESERVED
+CVE-2023-20979
+	RESERVED
+CVE-2023-20978
+	RESERVED
+CVE-2023-20977
+	RESERVED
+CVE-2023-20976
+	RESERVED
+CVE-2023-20975
+	RESERVED
+CVE-2023-20974
+	RESERVED
+CVE-2023-20973
+	RESERVED
+CVE-2023-20972
+	RESERVED
+CVE-2023-20971
+	RESERVED
+CVE-2023-20970
+	RESERVED
+CVE-2023-20969
+	RESERVED
+CVE-2023-20968
+	RESERVED
+CVE-2023-20967
+	RESERVED
+CVE-2023-20966
+	RESERVED
+CVE-2023-20965
+	RESERVED
+CVE-2023-20964
+	RESERVED
+CVE-2023-20963
+	RESERVED
+CVE-2023-20962
+	RESERVED
+CVE-2023-20961
+	RESERVED
+CVE-2023-20960
+	RESERVED
+CVE-2023-20959
+	RESERVED
+CVE-2023-20958
+	RESERVED
+CVE-2023-20957
+	RESERVED
+CVE-2023-20956
+	RESERVED
+CVE-2023-20955
+	RESERVED
+CVE-2023-20954
+	RESERVED
+CVE-2023-20953
+	RESERVED
+CVE-2023-20952
+	RESERVED
+CVE-2023-20951
+	RESERVED
+CVE-2023-20950
+	RESERVED
+CVE-2023-20949
+	RESERVED
+CVE-2023-20948
+	RESERVED
+CVE-2023-20947
+	RESERVED
+CVE-2023-20946
+	RESERVED
+CVE-2023-20945
+	RESERVED
+CVE-2023-20944
+	RESERVED
+CVE-2023-20943
+	RESERVED
+CVE-2023-20942
+	RESERVED
+CVE-2023-20941
+	RESERVED
+CVE-2023-20940
+	RESERVED
+CVE-2023-20939
+	RESERVED
+CVE-2023-20938
+	RESERVED
+CVE-2023-20937
+	RESERVED
+CVE-2023-20936
+	RESERVED
+CVE-2023-20935
+	RESERVED
+CVE-2023-20934
+	RESERVED
+CVE-2023-20933
+	RESERVED
+CVE-2023-20932
+	RESERVED
+CVE-2023-20931
+	RESERVED
+CVE-2023-20930
+	RESERVED
+CVE-2023-20929
+	RESERVED
+CVE-2023-20928
+	RESERVED
+CVE-2023-20927
+	RESERVED
+CVE-2023-20926
+	RESERVED
+CVE-2023-20925
+	RESERVED
+CVE-2023-20924
+	RESERVED
+CVE-2023-20923
+	RESERVED
+CVE-2023-20922
+	RESERVED
+CVE-2023-20921
+	RESERVED
+CVE-2023-20920
+	RESERVED
+CVE-2023-20919
+	RESERVED
+CVE-2023-20918
+	RESERVED
+CVE-2023-20917
+	RESERVED
+CVE-2023-20916
+	RESERVED
+CVE-2023-20915
+	RESERVED
+CVE-2023-20914
+	RESERVED
+CVE-2023-20913
+	RESERVED
+CVE-2023-20912
+	RESERVED
+CVE-2023-20911
+	RESERVED
+CVE-2023-20910
+	RESERVED
+CVE-2023-20909
+	RESERVED
+CVE-2023-20908
+	RESERVED
+CVE-2023-20907
+	RESERVED
+CVE-2023-20906
+	RESERVED
+CVE-2023-20905
+	RESERVED
+CVE-2023-20904
+	RESERVED
+CVE-2022-44714
+	RESERVED
+CVE-2022-44713
+	RESERVED
+CVE-2022-44712
+	RESERVED
+CVE-2022-44711
+	RESERVED
+CVE-2022-44710
+	RESERVED
+CVE-2022-44709
+	RESERVED
+CVE-2022-44708
+	RESERVED
+CVE-2022-44707
+	RESERVED
+CVE-2022-44706
+	RESERVED
+CVE-2022-44705
+	RESERVED
+CVE-2022-44704
+	RESERVED
+CVE-2022-44703
+	RESERVED
+CVE-2022-44702
+	RESERVED
+CVE-2022-44701
+	RESERVED
+CVE-2022-44700
+	RESERVED
+CVE-2022-44699
+	RESERVED
+CVE-2022-44698
+	RESERVED
+CVE-2022-44697
+	RESERVED
+CVE-2022-44696
+	RESERVED
+CVE-2022-44695
+	RESERVED
+CVE-2022-44694
+	RESERVED
+CVE-2022-44693
+	RESERVED
+CVE-2022-44692
+	RESERVED
+CVE-2022-44691
+	RESERVED
+CVE-2022-44690
+	RESERVED
+CVE-2022-44689
+	RESERVED
+CVE-2022-44688
+	RESERVED
+CVE-2022-44687
+	RESERVED
+CVE-2022-44686
+	RESERVED
+CVE-2022-44685
+	RESERVED
+CVE-2022-44684
+	RESERVED
+CVE-2022-44683
+	RESERVED
+CVE-2022-44682
+	RESERVED
+CVE-2022-44681
+	RESERVED
+CVE-2022-44680
+	RESERVED
+CVE-2022-44679
+	RESERVED
+CVE-2022-44678
+	RESERVED
+CVE-2022-44677
+	RESERVED
+CVE-2022-44676
+	RESERVED
+CVE-2022-44675
+	RESERVED
+CVE-2022-44674
+	RESERVED
+CVE-2022-44673
+	RESERVED
+CVE-2022-44672
+	RESERVED
+CVE-2022-44671
+	RESERVED
+CVE-2022-44670
+	RESERVED
+CVE-2022-44669
+	RESERVED
+CVE-2022-44668
+	RESERVED
+CVE-2022-44667
+	RESERVED
+CVE-2022-44666
+	RESERVED
+CVE-2022-44665
+	RESERVED
+CVE-2022-3855
+	RESERVED
+CVE-2022-3854
+	RESERVED
 CVE-2022-44664
 	RESERVED
 CVE-2022-44663
@@ -99,10 +1203,10 @@ CVE-2022-44630
 	RESERVED
 CVE-2022-44629
 	RESERVED
-CVE-2022-44628
-	RESERVED
-CVE-2022-44627
-	RESERVED
+CVE-2022-44628 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Jump ...)
+	TODO: check
+CVE-2022-44627 (Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple S ...)
+	TODO: check
 CVE-2022-44626
 	RESERVED
 CVE-2022-44625
@@ -418,7 +1522,8 @@ CVE-2022-3798 (A vulnerability classified as critical has been found in IBAX go-
 	NOT-FOR-US: IBAX go-ibax
 CVE-2022-3797 (A vulnerability was found in eolinker apinto-dashboard. It has been ra ...)
 	NOT-FOR-US: eolinker apinto-dashboard
-CVE-2022-3796 (A vulnerability was found in Events Calendar Plugin. It has been decla ...)
+CVE-2022-3796
+	REJECTED
 	NOT-FOR-US: Events Calendar Plugin
 CVE-2022-3795
 	RESERVED
@@ -677,16 +1782,16 @@ CVE-2022-44457
 	RESERVED
 CVE-2022-43506
 	RESERVED
-CVE-2022-43495
-	RESERVED
+CVE-2022-43495 (OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distr ...)
+	TODO: check
 CVE-2022-43457
 	RESERVED
 CVE-2022-43452
 	RESERVED
-CVE-2022-43451
-	RESERVED
-CVE-2022-43449
-	RESERVED
+CVE-2022-43451 (OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal v ...)
+	TODO: check
+CVE-2022-43449 (OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulne ...)
+	TODO: check
 CVE-2022-43447
 	RESERVED
 CVE-2022-41775
@@ -705,7 +1810,8 @@ CVE-2022-3775
 	RESERVED
 CVE-2022-3774 (A vulnerability was found in SourceCodester Train Scheduler App 1.0 an ...)
 	NOT-FOR-US: SourceCodester Train Scheduler App
-CVE-2022-3773 (A vulnerability has been found in EmbedPress Plugin and classified as  ...)
+CVE-2022-3773
+	REJECTED
 	NOT-FOR-US: EmbedPress Plugin
 CVE-2022-3772 (A vulnerability, which was classified as problematic, was found in eas ...)
 	NOT-FOR-US: easyii CMS
@@ -4520,14 +5626,14 @@ CVE-2022-43576
 	RESERVED
 CVE-2022-43575
 	RESERVED
-CVE-2022-43574
-	RESERVED
+CVE-2022-43574 ("IBM Robotic Process Automation 21.0.1, 21.0.2, 21.0.3, 21.0.4, and 21 ...)
+	TODO: check
 CVE-2022-43573
 	RESERVED
 CVE-2022-43572
 	RESERVED
-CVE-2022-43571
-	RESERVED
+CVE-2022-43571 (In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authe ...)
+	TODO: check
 CVE-2022-43570
 	RESERVED
 CVE-2022-43569
@@ -4546,8 +5652,8 @@ CVE-2022-43563
 	RESERVED
 CVE-2022-43562
 	RESERVED
-CVE-2022-43561
-	RESERVED
+CVE-2022-43561 (In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote ...)
+	TODO: check
 CVE-2022-43560
 	RESERVED
 CVE-2022-43559
@@ -5831,12 +6937,12 @@ CVE-2022-43065
 	RESERVED
 CVE-2022-43064
 	RESERVED
-CVE-2022-43063
-	RESERVED
-CVE-2022-43062
-	RESERVED
-CVE-2022-43061
-	RESERVED
+CVE-2022-43063 (Online Diagnostic Lab Management System v1.0 was discovered to contain ...)
+	TODO: check
+CVE-2022-43062 (Online Diagnostic Lab Management System v1.0 was discovered to contain ...)
+	TODO: check
+CVE-2022-43061 (Online Tours & Travels Management System v1.0 was discovered to co ...)
+	TODO: check
 CVE-2022-43060
 	RESERVED
 CVE-2022-43059
@@ -6854,20 +7960,20 @@ CVE-2022-42751 (CandidATS version 3.0.0 allows an external attacker to elevate p
 	NOT-FOR-US: CandidATS
 CVE-2022-42750 (CandidATS version 3.0.0 allows an external attacker to steal the cooki ...)
 	NOT-FOR-US: CandidATS
-CVE-2022-42749
-	RESERVED
-CVE-2022-42748
-	RESERVED
-CVE-2022-42747
-	RESERVED
-CVE-2022-42746
-	RESERVED
-CVE-2022-42745
-	RESERVED
-CVE-2022-42744
-	RESERVED
-CVE-2022-42743
-	RESERVED
+CVE-2022-42749 (CandidATS version 3.0.0 on 'page' of the 'ajax.php' resource, allows a ...)
+	TODO: check
+CVE-2022-42748 (CandidATS version 3.0.0 on 'sortDirection' of the 'ajax.php' resource, ...)
+	TODO: check
+CVE-2022-42747 (CandidATS version 3.0.0 on 'sortBy' of the 'ajax.php' resource, allows ...)
+	TODO: check
+CVE-2022-42746 (CandidATS version 3.0.0 on 'indexFile' of the 'ajax.php' resource, all ...)
+	TODO: check
+CVE-2022-42745 (CandidATS version 3.0.0 allows an external attacker to read arbitrary  ...)
+	TODO: check
+CVE-2022-42744 (CandidATS version 3.0.0 allows an external attacker to perform CRUD op ...)
+	TODO: check
+CVE-2022-42743 (deep-parse-json version 1.0.2 allows an external attacker to edit or a ...)
+	TODO: check
 CVE-2022-42742
 	RESERVED
 CVE-2022-42741
@@ -7625,8 +8731,8 @@ CVE-2022-42444
 	RESERVED
 CVE-2022-42443
 	RESERVED
-CVE-2022-42442
-	RESERVED
+CVE-2022-42442 ("IBM Robotic Process Automation for Cloud Pak 21.0.1, 21.0.2, 21.0.3,  ...)
+	TODO: check
 CVE-2022-42441
 	RESERVED
 CVE-2022-42440
@@ -9311,16 +10417,16 @@ CVE-2022-41715 (Programs which compile regular expressions from untrusted source
 	NOTE: https://go.dev/issue/55949
 	NOTE: https://github.com/golang/go/commit/645abfe529dc325e16daa17210640c2907d1c17a (go1.19.2)
 	NOTE: https://github.com/golang/go/commit/e9017c2416ad0ef642f5e0c2eab2dbf3cba4d997 (go1.18.7)
-CVE-2022-41714
-	RESERVED
-CVE-2022-41713
-	RESERVED
+CVE-2022-41714 (fastest-json-copy version 1.0.1 allows an external attacker to edit or ...)
+	TODO: check
+CVE-2022-41713 (deep-object-diff version 1.1.0 allows an external attacker to edit or  ...)
+	TODO: check
 CVE-2022-41712
 	RESERVED
 CVE-2022-41711 (Badaso version 2.6.0 allows an unauthenticated remote attacker to exec ...)
 	NOT-FOR-US: Badaso
-CVE-2022-41710
-	RESERVED
+CVE-2022-41710 (Markdownify version 1.4.1 allows an external attacker to remotely obta ...)
+	TODO: check
 CVE-2022-41709 (Markdownify version 1.4.1 allows an external attacker to execute arbit ...)
 	NOT-FOR-US: Markdownify
 CVE-2022-41708 (Relatedcode's Messenger version 7bcd20b allows an authenticated extern ...)
@@ -11669,8 +12775,8 @@ CVE-2022-40749
 	RESERVED
 CVE-2022-40748 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
 	NOT-FOR-US: IBM
-CVE-2022-40747
-	RESERVED
+CVE-2022-40747 ("IBM InfoSphere Information Server 11.7 is vulnerable to an XML Extern ...)
+	TODO: check
 CVE-2022-40746
 	RESERVED
 CVE-2022-40745
@@ -11850,8 +12956,8 @@ CVE-2022-40205
 	RESERVED
 CVE-2022-40193 (Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability in Awe ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2022-40131
-	RESERVED
+CVE-2022-40131 (Cross-Site Request Forgery (CSRF) vulnerability in a3rev Software Page ...)
+	TODO: check
 CVE-2022-38974
 	RESERVED
 CVE-2022-38468
@@ -11872,8 +12978,8 @@ CVE-2022-36424
 	RESERVED
 CVE-2022-36417 (Multiple Stored Cross-Site Scripting (XSS) via Cross-Site Request Forg ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2022-36404
-	RESERVED
+CVE-2022-36404 (Auth. (subscriber+) Broken Access Control vulnerability in David Cole  ...)
+	TODO: check
 CVE-2022-35238 (Unauthenticated Plugin Settings Change vulnerability in Awesome Filter ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-33978 (Reflected Cross-Site Scripting (XSS) vulnerability FontMeister plugin  ...)
@@ -12852,8 +13958,8 @@ CVE-2022-40278 (An issue was discovered in Samsung TizenRT through 3.0_GBM (and
 	NOT-FOR-US: Samsung TizenRT
 CVE-2022-40277 (Joplin version 2.8.8 allows an external attacker to execute arbitrary  ...)
 	NOT-FOR-US: Joplin
-CVE-2022-40276
-	RESERVED
+CVE-2022-40276 (Zettlr version 2.3.0 allows an external attacker to remotely obtain ar ...)
+	TODO: check
 CVE-2022-40275
 	RESERVED
 CVE-2022-40274 (Gridea version 0.9.3 allows an external attacker to execute arbitrary  ...)
@@ -12953,8 +14059,8 @@ CVE-2022-40237
 	RESERVED
 CVE-2022-40236
 	RESERVED
-CVE-2022-40235
-	RESERVED
+CVE-2022-40235 ("IBM InfoSphere Information Server 11.7 could allow a user to cause a  ...)
+	TODO: check
 CVE-2022-40234 (Versions of IBM Spectrum Protect Plus prior to 10.1.12 (excluding 10.1 ...)
 	NOT-FOR-US: IBM
 CVE-2022-40233
@@ -12963,8 +14069,8 @@ CVE-2022-40232
 	RESERVED
 CVE-2022-40231
 	RESERVED
-CVE-2022-40230
-	RESERVED
+CVE-2022-40230 ("IBM MQ Appliance 9.2 CD, 9.2 LTS, 9.3 CD, and LTS 9.3 does not invali ...)
+	TODO: check
 CVE-2022-40229
 	RESERVED
 CVE-2022-40228
@@ -16846,12 +17952,12 @@ CVE-2022-38714
 	RESERVED
 CVE-2022-38713
 	RESERVED
-CVE-2022-38712
-	RESERVED
+CVE-2022-38712 ("IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Web services  ...)
+	TODO: check
 CVE-2022-38711
 	RESERVED
-CVE-2022-38710
-	RESERVED
+CVE-2022-38710 ("IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensi ...)
+	TODO: check
 CVE-2022-38709 (IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 for Cloud Pa ...)
 	NOT-FOR-US: IBM
 CVE-2022-38708
@@ -18656,8 +19762,8 @@ CVE-2022-2760 (In affected versions of Octopus Deploy it is possible to reveal t
 	NOT-FOR-US: Octopus Deploy
 CVE-2022-38169
 	RESERVED
-CVE-2022-38168
-	RESERVED
+CVE-2022-38168 (Broken Access Control in User Authentication in Avaya Scopia Pathfinde ...)
+	TODO: check
 CVE-2022-38167
 	RESERVED
 CVE-2022-38166
@@ -18887,8 +19993,8 @@ CVE-2022-36793 (Unauthenticated Plugin Settings Change & Data Deletion vulne
 	NOT-FOR-US: WordPress plugin
 CVE-2022-36791 (Authenticated (contributor+) Stored Cross-Site Scripting (XSS) vulnera ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2022-36428
-	RESERVED
+CVE-2022-36428 (Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Stage Rock  ...)
+	TODO: check
 CVE-2022-36427 (Missing Access Control vulnerability in About Rentals. Inc. About Rent ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-36425 (Broken Access Control vulnerability in Beaver Builder plugin <= 2.5 ...)
@@ -19260,28 +20366,28 @@ CVE-2022-37914 (Vulnerabilities in the web-based management interface of Aruba E
 	NOT-FOR-US: Aruba
 CVE-2022-37913 (Vulnerabilities in the web-based management interface of Aruba EdgeCon ...)
 	NOT-FOR-US: Aruba
-CVE-2022-37912
-	RESERVED
-CVE-2022-37911
-	RESERVED
-CVE-2022-37910
-	RESERVED
-CVE-2022-37909
-	RESERVED
-CVE-2022-37908
-	RESERVED
-CVE-2022-37907
-	RESERVED
-CVE-2022-37906
-	RESERVED
-CVE-2022-37905
-	RESERVED
-CVE-2022-37904
-	RESERVED
-CVE-2022-37903
-	RESERVED
-CVE-2022-37902
-	RESERVED
+CVE-2022-37912 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
+	TODO: check
+CVE-2022-37911 (Due to improper restrictions on XML entities multiple vulnerabilities  ...)
+	TODO: check
+CVE-2022-37910 (A buffer overflow vulnerability exists in the ArubaOS command line int ...)
+	TODO: check
+CVE-2022-37909 (Aruba has identified certain configurations of ArubaOS that can lead t ...)
+	TODO: check
+CVE-2022-37908 (An authenticated attacker can impact the integrity of the ArubaOS boot ...)
+	TODO: check
+CVE-2022-37907 (A vulnerability exists in the ArubaOS bootloader on 7xxx series contro ...)
+	TODO: check
+CVE-2022-37906 (An authenticated path traversal vulnerability exists in the ArubaOS co ...)
+	TODO: check
+CVE-2022-37905 (Vulnerabilities in ArubaOS running on 7xxx series controllers exist th ...)
+	TODO: check
+CVE-2022-37904 (Vulnerabilities in ArubaOS running on 7xxx series controllers exist th ...)
+	TODO: check
+CVE-2022-37903 (A vulnerability exists that allows an authenticated attacker to overwr ...)
+	TODO: check
+CVE-2022-37902 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
+	TODO: check
 CVE-2022-37901 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
 	TODO: check
 CVE-2022-37900 (Authenticated command injection vulnerabilities exist in the ArubaOS c ...)
@@ -24891,8 +25997,8 @@ CVE-2022-35719
 	RESERVED
 CVE-2022-35718
 	RESERVED
-CVE-2022-35717
-	RESERVED
+CVE-2022-35717 ("IBM InfoSphere Information Server 11.7 could allow a locally authenti ...)
+	TODO: check
 CVE-2022-35716 (IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.16, 7.0.0.0 through 7 ...)
 	NOT-FOR-US: IBM
 CVE-2022-35715 (IBM InfoSphere Information Server 11.7 could allow a remote attacker t ...)
@@ -25090,8 +26196,8 @@ CVE-2022-35644
 	RESERVED
 CVE-2022-35643 (IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper with syst ...)
 	NOT-FOR-US: IBM
-CVE-2022-35642
-	RESERVED
+CVE-2022-35642 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site sc ...)
+	TODO: check
 CVE-2022-35641
 	RESERVED
 CVE-2022-35640
@@ -26067,8 +27173,8 @@ CVE-2022-35281
 	RESERVED
 CVE-2022-35280 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does not req ...)
 	NOT-FOR-US: IBM
-CVE-2022-35279
-	RESERVED
+CVE-2022-35279 ("IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0 ...)
+	TODO: check
 CVE-2022-35278 (In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show mal ...)
 	NOT-FOR-US: Apache ActiveMQ Artemis
 CVE-2022-34850 (An OS command injection vulnerability exists in the web_server /action ...)
@@ -27391,8 +28497,8 @@ CVE-2022-27235 (Multiple Broken Access Control vulnerabilities in Social Share B
 	NOT-FOR-US: WordPress plugin
 CVE-2022-26366
 	RESERVED
-CVE-2022-25952
-	RESERVED
+CVE-2022-25952 (Cross-Site Request Forgery (CSRF) vulnerability in Keywordrush Content ...)
+	TODO: check
 CVE-2022-2276 (The WP Edit Menu WordPress plugin before 1.5.0 does not have authorisa ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-2275 (The WP Edit Menu WordPress plugin before 1.5.0 does not have CSRF in a ...)
@@ -28832,8 +29938,8 @@ CVE-2022-34341
 	RESERVED
 CVE-2022-34340
 	RESERVED
-CVE-2022-34339
-	RESERVED
+CVE-2022-34339 ("IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user credentials i ...)
+	TODO: check
 CVE-2022-34338 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could disclo ...)
 	NOT-FOR-US: IBM
 CVE-2022-34337
@@ -39084,8 +40190,8 @@ CVE-2022-1700 (Improper Restriction of XML External Entity Reference ('XXE') vul
 	NOT-FOR-US: Forcepoint
 CVE-2022-30616 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow  ...)
 	NOT-FOR-US: IBM
-CVE-2022-30615
-	RESERVED
+CVE-2022-30615 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site sc ...)
+	TODO: check
 CVE-2022-30614 (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to a den ...)
 	NOT-FOR-US: IBM
 CVE-2022-30613 (IBM QRadar SIEM 7.4 and 7.5 could disclose sensitive information via a ...)
@@ -39098,8 +40204,8 @@ CVE-2022-30610 (IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.15.0 is vu
 	NOT-FOR-US: IBM
 CVE-2022-30609
 	RESERVED
-CVE-2022-30608
-	RESERVED
+CVE-2022-30608 ("IBM InfoSphere Information Server 11.7 is vulnerable to cross-site re ...)
+	TODO: check
 CVE-2022-30607 (IBM Robotic Process Automation 20.10.0, 20.12.5, 21.0.0, 21.0.1, and 2 ...)
 	NOT-FOR-US: IBM
 CVE-2022-30546 (Out-of-bounds read vulnerability exists in the simulator module contai ...)
@@ -52776,7 +53882,7 @@ CVE-2022-25894
 	RESERVED
 CVE-2022-25893
 	RESERVED
-CVE-2022-25892 (The package muhammara before 2.6.1, from 3.1.0 and before 3.1.1; all v ...)
+CVE-2022-25892 (The package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all v ...)
 	TODO: check
 CVE-2022-25891 (The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are v ...)
 	NOT-FOR-US: github.com/containrrr/shoutrrr/pkg/util
@@ -64937,8 +66043,8 @@ CVE-2022-22444 (IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user to
 	NOT-FOR-US: IBM
 CVE-2022-22443 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
 	NOT-FOR-US: IBM
-CVE-2022-22442
-	RESERVED
+CVE-2022-22442 ("IBM InfoSphere Information Server 11.7 could allow an authenticated u ...)
+	TODO: check
 CVE-2022-22441 (IBM InfoSphere Information Server 11.7 could allow an authenticated us ...)
 	NOT-FOR-US: IBM
 CVE-2022-22440
@@ -64971,8 +66077,8 @@ CVE-2022-22427 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-si
 	NOT-FOR-US: IBM
 CVE-2022-22426 (IBM Spectrum Copy Data Management Admin 2.2.0.0 through 2.2.15.0 could ...)
 	NOT-FOR-US: IBM
-CVE-2022-22425
-	RESERVED
+CVE-2022-22425 ("IBM InfoSphere Information Server 11.7 is potentially vulnerable to C ...)
+	TODO: check
 CVE-2022-22424 (IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to obtain s ...)
 	NOT-FOR-US: IBM
 CVE-2022-22423 (IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7. ...)
@@ -69905,8 +71011,8 @@ CVE-2021-44864 (TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable t
 	NOT-FOR-US: TP-Link
 CVE-2021-44863
 	RESERVED
-CVE-2021-44862
-	RESERVED
+CVE-2021-44862 (Netskope client is impacted by a vulnerability where an authenticated, ...)
+	TODO: check
 CVE-2021-44861
 	RESERVED
 CVE-2021-44860 (An out-of-bounds read vulnerability exists when reading a TIF file usi ...)
@@ -76028,6 +77134,7 @@ CVE-2021-43307 (An exponential ReDoS (Regular Expression Denial of Service) can
 CVE-2021-43306 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...)
 	NOT-FOR-US: Node jquery-validation
 CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec when parsin ...)
+	{DLA-3176-1}
 	- clickhouse <unfixed> (bug #1008216)
 	[bullseye] - clickhouse <no-dsa> (Minor issue)
 	NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -76035,6 +77142,7 @@ CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec when
 	NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
 	NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-43304 (Heap buffer overflow in Clickhouse's LZ4 compression codec when parsin ...)
+	{DLA-3176-1}
 	- clickhouse <unfixed> (bug #1008216)
 	[bullseye] - clickhouse <no-dsa> (Minor issue)
 	NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -80439,6 +81547,7 @@ CVE-2021-42389 (Divide-by-zero in Clickhouse's Delta compression codec when pars
 	- clickhouse <not-affected> (Vulnerable code introduced later)
 	NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec when par ...)
+	{DLA-3176-1}
 	- clickhouse <unfixed> (bug #1008216)
 	[bullseye] - clickhouse <no-dsa> (Minor issue)
 	NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -80446,6 +81555,7 @@ CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec wh
 	NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
 	NOTE: https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-42387 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec when par ...)
+	{DLA-3176-1}
 	- clickhouse <unfixed> (bug #1008216)
 	[bullseye] - clickhouse <no-dsa> (Minor issue)
 	NOTE: https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9 (v21.9.1.7685)
@@ -89178,8 +90288,8 @@ CVE-2021-39079 (IBM Cognos Analytics Mobile for Android applications prior to ve
 	NOT-FOR-US: IBM
 CVE-2021-39078 (IBM Security Guardium 10.5 stores user credentials in plain clear text ...)
 	NOT-FOR-US: IBM
-CVE-2021-39077
-	RESERVED
+CVE-2021-39077 ("IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 st ...)
+	TODO: check
 CVE-2021-39076 (IBM Security Guardium 10.5 and 11.3 uses weaker than expected cryptogr ...)
 	NOT-FOR-US: IBM
 CVE-2021-39075
@@ -94648,8 +95758,8 @@ CVE-2021-36908 (Cross-Site Request Forgery (CSRF) vulnerability leading to Datab
 	NOT-FOR-US: WordPress plugin
 CVE-2021-36907
 	RESERVED
-CVE-2021-36906
-	RESERVED
+CVE-2021-36906 (Multiple Insecure Direct Object References (IDOR) vulnerabilities in E ...)
+	TODO: check
 CVE-2021-36905
 	RESERVED
 CVE-2021-36904



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221104/f004b204/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list