[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Oct 27 21:10:35 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
42fcc87f by security tracker role at 2022-10-27T20:10:24+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1279 @@
+CVE-2023-20601
+ RESERVED
+CVE-2023-20600
+ RESERVED
+CVE-2023-20599
+ RESERVED
+CVE-2023-20598
+ RESERVED
+CVE-2023-20597
+ RESERVED
+CVE-2023-20596
+ RESERVED
+CVE-2023-20595
+ RESERVED
+CVE-2023-20594
+ RESERVED
+CVE-2023-20593
+ RESERVED
+CVE-2023-20592
+ RESERVED
+CVE-2023-20591
+ RESERVED
+CVE-2023-20590
+ RESERVED
+CVE-2023-20589
+ RESERVED
+CVE-2023-20588
+ RESERVED
+CVE-2023-20587
+ RESERVED
+CVE-2023-20586
+ RESERVED
+CVE-2023-20585
+ RESERVED
+CVE-2023-20584
+ RESERVED
+CVE-2023-20583
+ RESERVED
+CVE-2023-20582
+ RESERVED
+CVE-2023-20581
+ RESERVED
+CVE-2023-20580
+ RESERVED
+CVE-2023-20579
+ RESERVED
+CVE-2023-20578
+ RESERVED
+CVE-2023-20577
+ RESERVED
+CVE-2023-20576
+ RESERVED
+CVE-2023-20575
+ RESERVED
+CVE-2023-20574
+ RESERVED
+CVE-2023-20573
+ RESERVED
+CVE-2023-20572
+ RESERVED
+CVE-2023-20571
+ RESERVED
+CVE-2023-20570
+ RESERVED
+CVE-2023-20569
+ RESERVED
+CVE-2023-20568
+ RESERVED
+CVE-2023-20567
+ RESERVED
+CVE-2023-20566
+ RESERVED
+CVE-2023-20565
+ RESERVED
+CVE-2023-20564
+ RESERVED
+CVE-2023-20563
+ RESERVED
+CVE-2023-20562
+ RESERVED
+CVE-2023-20561
+ RESERVED
+CVE-2023-20560
+ RESERVED
+CVE-2023-20559
+ RESERVED
+CVE-2023-20558
+ RESERVED
+CVE-2023-20557
+ RESERVED
+CVE-2023-20556
+ RESERVED
+CVE-2023-20555
+ RESERVED
+CVE-2023-20554
+ RESERVED
+CVE-2023-20553
+ RESERVED
+CVE-2023-20552
+ RESERVED
+CVE-2023-20551
+ RESERVED
+CVE-2023-20550
+ RESERVED
+CVE-2023-20549
+ RESERVED
+CVE-2023-20548
+ RESERVED
+CVE-2023-20547
+ RESERVED
+CVE-2023-20546
+ RESERVED
+CVE-2023-20545
+ RESERVED
+CVE-2023-20544
+ RESERVED
+CVE-2023-20543
+ RESERVED
+CVE-2023-20542
+ RESERVED
+CVE-2023-20541
+ RESERVED
+CVE-2023-20540
+ RESERVED
+CVE-2023-20539
+ RESERVED
+CVE-2023-20538
+ RESERVED
+CVE-2023-20537
+ RESERVED
+CVE-2023-20536
+ RESERVED
+CVE-2023-20535
+ RESERVED
+CVE-2023-20534
+ RESERVED
+CVE-2023-20533
+ RESERVED
+CVE-2023-20532
+ RESERVED
+CVE-2023-20531
+ RESERVED
+CVE-2023-20530
+ RESERVED
+CVE-2023-20529
+ RESERVED
+CVE-2023-20528
+ RESERVED
+CVE-2023-20527
+ RESERVED
+CVE-2023-20526
+ RESERVED
+CVE-2023-20525
+ RESERVED
+CVE-2023-20524
+ RESERVED
+CVE-2023-20523
+ RESERVED
+CVE-2023-20522
+ RESERVED
+CVE-2023-20521
+ RESERVED
+CVE-2023-20520
+ RESERVED
+CVE-2023-20519
+ RESERVED
+CVE-2023-20518
+ RESERVED
+CVE-2023-20517
+ RESERVED
+CVE-2023-20516
+ RESERVED
+CVE-2023-20515
+ RESERVED
+CVE-2023-20514
+ RESERVED
+CVE-2023-20513
+ RESERVED
+CVE-2023-20512
+ RESERVED
+CVE-2023-20511
+ RESERVED
+CVE-2023-20510
+ RESERVED
+CVE-2023-20509
+ RESERVED
+CVE-2023-20508
+ RESERVED
+CVE-2023-20507
+ RESERVED
+CVE-2023-20506
+ RESERVED
+CVE-2023-20505
+ RESERVED
+CVE-2023-20504
+ RESERVED
+CVE-2023-20503
+ RESERVED
+CVE-2023-20502
+ RESERVED
+CVE-2023-20501
+ RESERVED
+CVE-2023-20500
+ RESERVED
+CVE-2023-20499
+ RESERVED
+CVE-2023-20498
+ RESERVED
+CVE-2023-20497
+ RESERVED
+CVE-2023-20496
+ RESERVED
+CVE-2023-20495
+ RESERVED
+CVE-2023-20494
+ RESERVED
+CVE-2023-20493
+ RESERVED
+CVE-2023-20492
+ RESERVED
+CVE-2023-20491
+ RESERVED
+CVE-2023-20490
+ RESERVED
+CVE-2023-20489
+ RESERVED
+CVE-2023-20488
+ RESERVED
+CVE-2023-20487
+ RESERVED
+CVE-2023-20486
+ RESERVED
+CVE-2023-20485
+ RESERVED
+CVE-2023-20484
+ RESERVED
+CVE-2023-20483
+ RESERVED
+CVE-2023-20482
+ RESERVED
+CVE-2023-20481
+ RESERVED
+CVE-2023-20480
+ RESERVED
+CVE-2023-20479
+ RESERVED
+CVE-2023-20478
+ RESERVED
+CVE-2023-20477
+ RESERVED
+CVE-2023-20476
+ RESERVED
+CVE-2023-20475
+ RESERVED
+CVE-2023-20474
+ RESERVED
+CVE-2023-20473
+ RESERVED
+CVE-2023-20472
+ RESERVED
+CVE-2023-20471
+ RESERVED
+CVE-2023-20470
+ RESERVED
+CVE-2023-20469
+ RESERVED
+CVE-2023-20468
+ RESERVED
+CVE-2023-20467
+ RESERVED
+CVE-2023-20466
+ RESERVED
+CVE-2023-20465
+ RESERVED
+CVE-2023-20464
+ RESERVED
+CVE-2023-20463
+ RESERVED
+CVE-2023-20462
+ RESERVED
+CVE-2023-20461
+ RESERVED
+CVE-2023-20460
+ RESERVED
+CVE-2023-20459
+ RESERVED
+CVE-2023-20458
+ RESERVED
+CVE-2023-20457
+ RESERVED
+CVE-2023-20456
+ RESERVED
+CVE-2023-20455
+ RESERVED
+CVE-2023-20454
+ RESERVED
+CVE-2023-20453
+ RESERVED
+CVE-2023-20452
+ RESERVED
+CVE-2023-20451
+ RESERVED
+CVE-2023-20450
+ RESERVED
+CVE-2023-20449
+ RESERVED
+CVE-2023-20448
+ RESERVED
+CVE-2023-20447
+ RESERVED
+CVE-2023-20446
+ RESERVED
+CVE-2023-20445
+ RESERVED
+CVE-2023-20444
+ RESERVED
+CVE-2023-20443
+ RESERVED
+CVE-2023-20442
+ RESERVED
+CVE-2023-20441
+ RESERVED
+CVE-2023-20440
+ RESERVED
+CVE-2023-20439
+ RESERVED
+CVE-2023-20438
+ RESERVED
+CVE-2023-20437
+ RESERVED
+CVE-2023-20436
+ RESERVED
+CVE-2023-20435
+ RESERVED
+CVE-2023-20434
+ RESERVED
+CVE-2023-20433
+ RESERVED
+CVE-2023-20432
+ RESERVED
+CVE-2023-20431
+ RESERVED
+CVE-2023-20430
+ RESERVED
+CVE-2023-20429
+ RESERVED
+CVE-2023-20428
+ RESERVED
+CVE-2023-20427
+ RESERVED
+CVE-2023-20426
+ RESERVED
+CVE-2023-20425
+ RESERVED
+CVE-2023-20424
+ RESERVED
+CVE-2023-20423
+ RESERVED
+CVE-2023-20422
+ RESERVED
+CVE-2023-20421
+ RESERVED
+CVE-2023-20420
+ RESERVED
+CVE-2023-20419
+ RESERVED
+CVE-2023-20418
+ RESERVED
+CVE-2023-20417
+ RESERVED
+CVE-2023-20416
+ RESERVED
+CVE-2023-20415
+ RESERVED
+CVE-2023-20414
+ RESERVED
+CVE-2023-20413
+ RESERVED
+CVE-2023-20412
+ RESERVED
+CVE-2023-20411
+ RESERVED
+CVE-2023-20410
+ RESERVED
+CVE-2023-20409
+ RESERVED
+CVE-2023-20408
+ RESERVED
+CVE-2023-20407
+ RESERVED
+CVE-2023-20406
+ RESERVED
+CVE-2023-20405
+ RESERVED
+CVE-2023-20404
+ RESERVED
+CVE-2023-20403
+ RESERVED
+CVE-2023-20402
+ RESERVED
+CVE-2023-20401
+ RESERVED
+CVE-2023-20400
+ RESERVED
+CVE-2023-20399
+ RESERVED
+CVE-2023-20398
+ RESERVED
+CVE-2023-20397
+ RESERVED
+CVE-2023-20396
+ RESERVED
+CVE-2023-20395
+ RESERVED
+CVE-2023-20394
+ RESERVED
+CVE-2023-20393
+ RESERVED
+CVE-2023-20392
+ RESERVED
+CVE-2023-20391
+ RESERVED
+CVE-2023-20390
+ RESERVED
+CVE-2023-20389
+ RESERVED
+CVE-2023-20388
+ RESERVED
+CVE-2023-20387
+ RESERVED
+CVE-2023-20386
+ RESERVED
+CVE-2023-20385
+ RESERVED
+CVE-2023-20384
+ RESERVED
+CVE-2023-20383
+ RESERVED
+CVE-2023-20382
+ RESERVED
+CVE-2023-20381
+ RESERVED
+CVE-2023-20380
+ RESERVED
+CVE-2023-20379
+ RESERVED
+CVE-2023-20378
+ RESERVED
+CVE-2023-20377
+ RESERVED
+CVE-2023-20376
+ RESERVED
+CVE-2023-20375
+ RESERVED
+CVE-2023-20374
+ RESERVED
+CVE-2023-20373
+ RESERVED
+CVE-2023-20372
+ RESERVED
+CVE-2023-20371
+ RESERVED
+CVE-2023-20370
+ RESERVED
+CVE-2023-20369
+ RESERVED
+CVE-2023-20368
+ RESERVED
+CVE-2023-20367
+ RESERVED
+CVE-2023-20366
+ RESERVED
+CVE-2023-20365
+ RESERVED
+CVE-2023-20364
+ RESERVED
+CVE-2023-20363
+ RESERVED
+CVE-2023-20362
+ RESERVED
+CVE-2023-20361
+ RESERVED
+CVE-2023-20360
+ RESERVED
+CVE-2023-20359
+ RESERVED
+CVE-2023-20358
+ RESERVED
+CVE-2023-20357
+ RESERVED
+CVE-2023-20356
+ RESERVED
+CVE-2023-20355
+ RESERVED
+CVE-2023-20354
+ RESERVED
+CVE-2023-20353
+ RESERVED
+CVE-2023-20352
+ RESERVED
+CVE-2023-20351
+ RESERVED
+CVE-2023-20350
+ RESERVED
+CVE-2023-20349
+ RESERVED
+CVE-2023-20348
+ RESERVED
+CVE-2023-20347
+ RESERVED
+CVE-2023-20346
+ RESERVED
+CVE-2023-20345
+ RESERVED
+CVE-2023-20344
+ RESERVED
+CVE-2023-20343
+ RESERVED
+CVE-2023-20342
+ RESERVED
+CVE-2023-20341
+ RESERVED
+CVE-2023-20340
+ RESERVED
+CVE-2023-20339
+ RESERVED
+CVE-2023-20338
+ RESERVED
+CVE-2023-20337
+ RESERVED
+CVE-2023-20336
+ RESERVED
+CVE-2023-20335
+ RESERVED
+CVE-2023-20334
+ RESERVED
+CVE-2023-20333
+ RESERVED
+CVE-2023-20332
+ RESERVED
+CVE-2023-20331
+ RESERVED
+CVE-2023-20330
+ RESERVED
+CVE-2023-20329
+ RESERVED
+CVE-2023-20328
+ RESERVED
+CVE-2023-20327
+ RESERVED
+CVE-2023-20326
+ RESERVED
+CVE-2023-20325
+ RESERVED
+CVE-2023-20324
+ RESERVED
+CVE-2023-20323
+ RESERVED
+CVE-2023-20322
+ RESERVED
+CVE-2023-20321
+ RESERVED
+CVE-2023-20320
+ RESERVED
+CVE-2023-20319
+ RESERVED
+CVE-2023-20318
+ RESERVED
+CVE-2023-20317
+ RESERVED
+CVE-2023-20316
+ RESERVED
+CVE-2023-20315
+ RESERVED
+CVE-2023-20314
+ RESERVED
+CVE-2023-20313
+ RESERVED
+CVE-2023-20312
+ RESERVED
+CVE-2023-20311
+ RESERVED
+CVE-2023-20310
+ RESERVED
+CVE-2023-20309
+ RESERVED
+CVE-2023-20308
+ RESERVED
+CVE-2023-20307
+ RESERVED
+CVE-2023-20306
+ RESERVED
+CVE-2023-20305
+ RESERVED
+CVE-2023-20304
+ RESERVED
+CVE-2023-20303
+ RESERVED
+CVE-2023-20302
+ RESERVED
+CVE-2023-20301
+ RESERVED
+CVE-2023-20300
+ RESERVED
+CVE-2023-20299
+ RESERVED
+CVE-2023-20298
+ RESERVED
+CVE-2023-20297
+ RESERVED
+CVE-2023-20296
+ RESERVED
+CVE-2023-20295
+ RESERVED
+CVE-2023-20294
+ RESERVED
+CVE-2023-20293
+ RESERVED
+CVE-2023-20292
+ RESERVED
+CVE-2023-20291
+ RESERVED
+CVE-2023-20290
+ RESERVED
+CVE-2023-20289
+ RESERVED
+CVE-2023-20288
+ RESERVED
+CVE-2023-20287
+ RESERVED
+CVE-2023-20286
+ RESERVED
+CVE-2023-20285
+ RESERVED
+CVE-2023-20284
+ RESERVED
+CVE-2023-20283
+ RESERVED
+CVE-2023-20282
+ RESERVED
+CVE-2023-20281
+ RESERVED
+CVE-2023-20280
+ RESERVED
+CVE-2023-20279
+ RESERVED
+CVE-2023-20278
+ RESERVED
+CVE-2023-20277
+ RESERVED
+CVE-2023-20276
+ RESERVED
+CVE-2023-20275
+ RESERVED
+CVE-2023-20274
+ RESERVED
+CVE-2023-20273
+ RESERVED
+CVE-2023-20272
+ RESERVED
+CVE-2023-20271
+ RESERVED
+CVE-2023-20270
+ RESERVED
+CVE-2023-20269
+ RESERVED
+CVE-2023-20268
+ RESERVED
+CVE-2023-20267
+ RESERVED
+CVE-2023-20266
+ RESERVED
+CVE-2023-20265
+ RESERVED
+CVE-2023-20264
+ RESERVED
+CVE-2023-20263
+ RESERVED
+CVE-2023-20262
+ RESERVED
+CVE-2023-20261
+ RESERVED
+CVE-2023-20260
+ RESERVED
+CVE-2023-20259
+ RESERVED
+CVE-2023-20258
+ RESERVED
+CVE-2023-20257
+ RESERVED
+CVE-2023-20256
+ RESERVED
+CVE-2023-20255
+ RESERVED
+CVE-2023-20254
+ RESERVED
+CVE-2023-20253
+ RESERVED
+CVE-2023-20252
+ RESERVED
+CVE-2023-20251
+ RESERVED
+CVE-2023-20250
+ RESERVED
+CVE-2023-20249
+ RESERVED
+CVE-2023-20248
+ RESERVED
+CVE-2023-20247
+ RESERVED
+CVE-2023-20246
+ RESERVED
+CVE-2023-20245
+ RESERVED
+CVE-2023-20244
+ RESERVED
+CVE-2023-20243
+ RESERVED
+CVE-2023-20242
+ RESERVED
+CVE-2023-20241
+ RESERVED
+CVE-2023-20240
+ RESERVED
+CVE-2023-20239
+ RESERVED
+CVE-2023-20238
+ RESERVED
+CVE-2023-20237
+ RESERVED
+CVE-2023-20236
+ RESERVED
+CVE-2023-20235
+ RESERVED
+CVE-2023-20234
+ RESERVED
+CVE-2023-20233
+ RESERVED
+CVE-2023-20232
+ RESERVED
+CVE-2023-20231
+ RESERVED
+CVE-2023-20230
+ RESERVED
+CVE-2023-20229
+ RESERVED
+CVE-2023-20228
+ RESERVED
+CVE-2023-20227
+ RESERVED
+CVE-2023-20226
+ RESERVED
+CVE-2023-20225
+ RESERVED
+CVE-2023-20224
+ RESERVED
+CVE-2023-20223
+ RESERVED
+CVE-2023-20222
+ RESERVED
+CVE-2023-20221
+ RESERVED
+CVE-2023-20220
+ RESERVED
+CVE-2023-20219
+ RESERVED
+CVE-2023-20218
+ RESERVED
+CVE-2023-20217
+ RESERVED
+CVE-2023-20216
+ RESERVED
+CVE-2023-20215
+ RESERVED
+CVE-2023-20214
+ RESERVED
+CVE-2023-20213
+ RESERVED
+CVE-2023-20212
+ RESERVED
+CVE-2023-20211
+ RESERVED
+CVE-2023-20210
+ RESERVED
+CVE-2023-20209
+ RESERVED
+CVE-2023-20208
+ RESERVED
+CVE-2023-20207
+ RESERVED
+CVE-2023-20206
+ RESERVED
+CVE-2023-20205
+ RESERVED
+CVE-2023-20204
+ RESERVED
+CVE-2023-20203
+ RESERVED
+CVE-2023-20202
+ RESERVED
+CVE-2023-20201
+ RESERVED
+CVE-2023-20200
+ RESERVED
+CVE-2023-20199
+ RESERVED
+CVE-2023-20198
+ RESERVED
+CVE-2023-20197
+ RESERVED
+CVE-2023-20196
+ RESERVED
+CVE-2023-20195
+ RESERVED
+CVE-2023-20194
+ RESERVED
+CVE-2023-20193
+ RESERVED
+CVE-2023-20192
+ RESERVED
+CVE-2023-20191
+ RESERVED
+CVE-2023-20190
+ RESERVED
+CVE-2023-20189
+ RESERVED
+CVE-2023-20188
+ RESERVED
+CVE-2023-20187
+ RESERVED
+CVE-2023-20186
+ RESERVED
+CVE-2023-20185
+ RESERVED
+CVE-2023-20184
+ RESERVED
+CVE-2023-20183
+ RESERVED
+CVE-2023-20182
+ RESERVED
+CVE-2023-20181
+ RESERVED
+CVE-2023-20180
+ RESERVED
+CVE-2023-20179
+ RESERVED
+CVE-2023-20178
+ RESERVED
+CVE-2023-20177
+ RESERVED
+CVE-2023-20176
+ RESERVED
+CVE-2023-20175
+ RESERVED
+CVE-2023-20174
+ RESERVED
+CVE-2023-20173
+ RESERVED
+CVE-2023-20172
+ RESERVED
+CVE-2023-20171
+ RESERVED
+CVE-2023-20170
+ RESERVED
+CVE-2023-20169
+ RESERVED
+CVE-2023-20168
+ RESERVED
+CVE-2023-20167
+ RESERVED
+CVE-2023-20166
+ RESERVED
+CVE-2023-20165
+ RESERVED
+CVE-2023-20164
+ RESERVED
+CVE-2023-20163
+ RESERVED
+CVE-2023-20162
+ RESERVED
+CVE-2023-20161
+ RESERVED
+CVE-2023-20160
+ RESERVED
+CVE-2023-20159
+ RESERVED
+CVE-2023-20158
+ RESERVED
+CVE-2023-20157
+ RESERVED
+CVE-2023-20156
+ RESERVED
+CVE-2023-20155
+ RESERVED
+CVE-2023-20154
+ RESERVED
+CVE-2023-20153
+ RESERVED
+CVE-2023-20152
+ RESERVED
+CVE-2023-20151
+ RESERVED
+CVE-2023-20150
+ RESERVED
+CVE-2023-20149
+ RESERVED
+CVE-2023-20148
+ RESERVED
+CVE-2023-20147
+ RESERVED
+CVE-2023-20146
+ RESERVED
+CVE-2023-20145
+ RESERVED
+CVE-2023-20144
+ RESERVED
+CVE-2023-20143
+ RESERVED
+CVE-2023-20142
+ RESERVED
+CVE-2023-20141
+ RESERVED
+CVE-2023-20140
+ RESERVED
+CVE-2023-20139
+ RESERVED
+CVE-2023-20138
+ RESERVED
+CVE-2023-20137
+ RESERVED
+CVE-2023-20136
+ RESERVED
+CVE-2023-20135
+ RESERVED
+CVE-2023-20134
+ RESERVED
+CVE-2023-20133
+ RESERVED
+CVE-2023-20132
+ RESERVED
+CVE-2023-20131
+ RESERVED
+CVE-2023-20130
+ RESERVED
+CVE-2023-20129
+ RESERVED
+CVE-2023-20128
+ RESERVED
+CVE-2023-20127
+ RESERVED
+CVE-2023-20126
+ RESERVED
+CVE-2023-20125
+ RESERVED
+CVE-2023-20124
+ RESERVED
+CVE-2023-20123
+ RESERVED
+CVE-2023-20122
+ RESERVED
+CVE-2023-20121
+ RESERVED
+CVE-2023-20120
+ RESERVED
+CVE-2023-20119
+ RESERVED
+CVE-2023-20118
+ RESERVED
+CVE-2023-20117
+ RESERVED
+CVE-2023-20116
+ RESERVED
+CVE-2023-20115
+ RESERVED
+CVE-2023-20114
+ RESERVED
+CVE-2023-20113
+ RESERVED
+CVE-2023-20112
+ RESERVED
+CVE-2023-20111
+ RESERVED
+CVE-2023-20110
+ RESERVED
+CVE-2023-20109
+ RESERVED
+CVE-2023-20108
+ RESERVED
+CVE-2023-20107
+ RESERVED
+CVE-2023-20106
+ RESERVED
+CVE-2023-20105
+ RESERVED
+CVE-2023-20104
+ RESERVED
+CVE-2023-20103
+ RESERVED
+CVE-2023-20102
+ RESERVED
+CVE-2023-20101
+ RESERVED
+CVE-2023-20100
+ RESERVED
+CVE-2023-20099
+ RESERVED
+CVE-2023-20098
+ RESERVED
+CVE-2023-20097
+ RESERVED
+CVE-2023-20096
+ RESERVED
+CVE-2023-20095
+ RESERVED
+CVE-2023-20094
+ RESERVED
+CVE-2023-20093
+ RESERVED
+CVE-2023-20092
+ RESERVED
+CVE-2023-20091
+ RESERVED
+CVE-2023-20090
+ RESERVED
+CVE-2023-20089
+ RESERVED
+CVE-2023-20088
+ RESERVED
+CVE-2023-20087
+ RESERVED
+CVE-2023-20086
+ RESERVED
+CVE-2023-20085
+ RESERVED
+CVE-2023-20084
+ RESERVED
+CVE-2023-20083
+ RESERVED
+CVE-2023-20082
+ RESERVED
+CVE-2023-20081
+ RESERVED
+CVE-2023-20080
+ RESERVED
+CVE-2023-20079
+ RESERVED
+CVE-2023-20078
+ RESERVED
+CVE-2023-20077
+ RESERVED
+CVE-2023-20076
+ RESERVED
+CVE-2023-20075
+ RESERVED
+CVE-2023-20074
+ RESERVED
+CVE-2023-20073
+ RESERVED
+CVE-2023-20072
+ RESERVED
+CVE-2023-20071
+ RESERVED
+CVE-2023-20070
+ RESERVED
+CVE-2023-20069
+ RESERVED
+CVE-2023-20068
+ RESERVED
+CVE-2023-20067
+ RESERVED
+CVE-2023-20066
+ RESERVED
+CVE-2023-20065
+ RESERVED
+CVE-2023-20064
+ RESERVED
+CVE-2023-20063
+ RESERVED
+CVE-2023-20062
+ RESERVED
+CVE-2023-20061
+ RESERVED
+CVE-2023-20060
+ RESERVED
+CVE-2023-20059
+ RESERVED
+CVE-2023-20058
+ RESERVED
+CVE-2023-20057
+ RESERVED
+CVE-2023-20056
+ RESERVED
+CVE-2023-20055
+ RESERVED
+CVE-2023-20054
+ RESERVED
+CVE-2023-20053
+ RESERVED
+CVE-2023-20052
+ RESERVED
+CVE-2023-20051
+ RESERVED
+CVE-2023-20050
+ RESERVED
+CVE-2023-20049
+ RESERVED
+CVE-2023-20048
+ RESERVED
+CVE-2023-20047
+ RESERVED
+CVE-2023-20046
+ RESERVED
+CVE-2023-20045
+ RESERVED
+CVE-2023-20044
+ RESERVED
+CVE-2023-20043
+ RESERVED
+CVE-2023-20042
+ RESERVED
+CVE-2023-20041
+ RESERVED
+CVE-2023-20040
+ RESERVED
+CVE-2023-20039
+ RESERVED
+CVE-2023-20038
+ RESERVED
+CVE-2023-20037
+ RESERVED
+CVE-2023-20036
+ RESERVED
+CVE-2023-20035
+ RESERVED
+CVE-2023-20034
+ RESERVED
+CVE-2023-20033
+ RESERVED
+CVE-2023-20032
+ RESERVED
+CVE-2023-20031
+ RESERVED
+CVE-2023-20030
+ RESERVED
+CVE-2023-20029
+ RESERVED
+CVE-2023-20028
+ RESERVED
+CVE-2023-20027
+ RESERVED
+CVE-2023-20026
+ RESERVED
+CVE-2023-20025
+ RESERVED
+CVE-2023-20024
+ RESERVED
+CVE-2023-20023
+ RESERVED
+CVE-2023-20022
+ RESERVED
+CVE-2023-20021
+ RESERVED
+CVE-2023-20020
+ RESERVED
+CVE-2023-20019
+ RESERVED
+CVE-2023-20018
+ RESERVED
+CVE-2023-20017
+ RESERVED
+CVE-2023-20016
+ RESERVED
+CVE-2023-20015
+ RESERVED
+CVE-2023-20014
+ RESERVED
+CVE-2023-20013
+ RESERVED
+CVE-2023-20012
+ RESERVED
+CVE-2023-20011
+ RESERVED
+CVE-2023-20010
+ RESERVED
+CVE-2023-20009
+ RESERVED
+CVE-2023-20008
+ RESERVED
+CVE-2023-20007
+ RESERVED
+CVE-2023-20006
+ RESERVED
+CVE-2023-20005
+ RESERVED
+CVE-2023-20004
+ RESERVED
+CVE-2023-20003
+ RESERVED
+CVE-2023-20002
+ RESERVED
+CVE-2023-20001
+ RESERVED
+CVE-2023-0010
+ RESERVED
+CVE-2023-0009
+ RESERVED
+CVE-2023-0008
+ RESERVED
+CVE-2023-0007
+ RESERVED
+CVE-2023-0006
+ RESERVED
+CVE-2023-0005
+ RESERVED
+CVE-2023-0004
+ RESERVED
+CVE-2023-0003
+ RESERVED
+CVE-2023-0002
+ RESERVED
+CVE-2023-0001
+ RESERVED
+CVE-2022-43958
+ RESERVED
+CVE-2022-43957
+ RESERVED
+CVE-2022-43956
+ RESERVED
+CVE-2022-43955
+ RESERVED
+CVE-2022-43954
+ RESERVED
+CVE-2022-43953
+ RESERVED
+CVE-2022-43952
+ RESERVED
+CVE-2022-43951
+ RESERVED
+CVE-2022-43950
+ RESERVED
+CVE-2022-43949
+ RESERVED
+CVE-2022-43948
+ RESERVED
+CVE-2022-43947
+ RESERVED
+CVE-2022-43946
+ RESERVED
+CVE-2022-3727
+ RESERVED
+CVE-2022-3726
+ RESERVED
+CVE-2022-3725 (Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allow ...)
+ TODO: check
+CVE-2022-3724
+ RESERVED
+CVE-2022-3723
+ RESERVED
+CVE-2022-3722
+ RESERVED
+CVE-2022-3721
+ RESERVED
+CVE-2022-3720
+ RESERVED
+CVE-2022-3719 (A vulnerability has been found in Exiv2 and classified as critical. Th ...)
+ TODO: check
+CVE-2022-3718 (A vulnerability, which was classified as problematic, was found in Exi ...)
+ TODO: check
+CVE-2022-3717 (A vulnerability, which was classified as critical, has been found in E ...)
+ TODO: check
+CVE-2022-3716 (A vulnerability classified as problematic was found in SourceCodester ...)
+ TODO: check
+CVE-2022-3715
+ RESERVED
+CVE-2022-3714 (A vulnerability classified as critical has been found in SourceCodeste ...)
+ TODO: check
CVE-2022-43945
RESERVED
CVE-2022-43944
@@ -1134,8 +2410,8 @@ CVE-2022-42460
RESERVED
CVE-2022-42459
RESERVED
-CVE-2022-41996
- RESERVED
+CVE-2022-41996 (Cross-Site Request Forgery (CSRF) vulnerability in ThemeFusion Avada p ...)
+ TODO: check
CVE-2022-41995
RESERVED
CVE-2022-41992
@@ -1586,14 +2862,14 @@ CVE-2022-43369
RESERVED
CVE-2022-43368
RESERVED
-CVE-2022-43367
- RESERVED
-CVE-2022-43366
- RESERVED
-CVE-2022-43365
- RESERVED
-CVE-2022-43364
- RESERVED
+CVE-2022-43367 (IP-COM EW9 V15.11.0.14(9732) was discovered to contain a command injec ...)
+ TODO: check
+CVE-2022-43366 (IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to acces ...)
+ TODO: check
+CVE-2022-43365 (IP-COM EW9 V15.11.0.14(9732) was discovered to contain a buffer overfl ...)
+ TODO: check
+CVE-2022-43364 (An access control issue in the password reset page of IP-COM EW9 V15.1 ...)
+ TODO: check
CVE-2022-43363
RESERVED
CVE-2022-43362
@@ -1640,8 +2916,8 @@ CVE-2022-43342
RESERVED
CVE-2022-43341
RESERVED
-CVE-2022-43340
- RESERVED
+CVE-2022-43340 (A Cross-Site Request Forgery (CSRF) in dzzoffice 2.02.1_SC_UTF8 allows ...)
+ TODO: check
CVE-2022-43339
RESERVED
CVE-2022-43338
@@ -2354,12 +3630,12 @@ CVE-2022-42995
RESERVED
CVE-2022-42994
RESERVED
-CVE-2022-42993
- RESERVED
-CVE-2022-42992
- RESERVED
-CVE-2022-42991
- RESERVED
+CVE-2022-42993 (Password Storage Application v1.0 was discovered to contain a cross-si ...)
+ TODO: check
+CVE-2022-42992 (Multiple stored cross-site scripting (XSS) vulnerabilities in Train Sc ...)
+ TODO: check
+CVE-2022-42991 (A stored cross-site scripting (XSS) vulnerability in Simple Online Pub ...)
+ TODO: check
CVE-2022-42990
RESERVED
CVE-2022-42989
@@ -3922,8 +5198,8 @@ CVE-2022-3411
RESERVED
CVE-2022-3410
RESERVED
-CVE-2022-3409
- RESERVED
+CVE-2022-3409 (A vulnerability in bmcweb of OpenBMC Project allows user to cause deni ...)
+ TODO: check
CVE-2022-3408
RESERVED
CVE-2022-3407
@@ -4762,10 +6038,10 @@ CVE-2022-42057
RESERVED
CVE-2022-42056
RESERVED
-CVE-2022-42055
- RESERVED
-CVE-2022-42054
- RESERVED
+CVE-2022-42055 (Multiple command injection vulnerabilities in GL.iNet GoodCloud IoT De ...)
+ TODO: check
+CVE-2022-42054 (Multiple stored cross-site scripting (XSS) vulnerabilities in GL.iNet ...)
+ TODO: check
CVE-2022-42053
RESERVED
CVE-2022-42052
@@ -7683,10 +8959,10 @@ CVE-2022-40877 (Exam Reviewer Management System 1.0 is vulnerable to SQL Injecti
NOT-FOR-US: Exam Reviewer Management System
CVE-2022-40876
RESERVED
-CVE-2022-40875
- RESERVED
-CVE-2022-40874
- RESERVED
+CVE-2022-40875 (Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow in the ...)
+ TODO: check
+CVE-2022-40874 (Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow vulner ...)
+ TODO: check
CVE-2022-40873
RESERVED
CVE-2022-40872 (An SQL injection vulnerability issue was discovered in Sourcecodester ...)
@@ -9337,10 +10613,10 @@ CVE-2022-40186 (An issue was discovered in HashiCorp Vault and Vault Enterprise
NOT-FOR-US: HashiCorp Vault and Vault Enterprise
CVE-2022-40185
RESERVED
-CVE-2022-40184
- RESERVED
-CVE-2022-40183
- RESERVED
+CVE-2022-40184 (Incomplete filtering of JavaScript code in different configuration fie ...)
+ TODO: check
+CVE-2022-40183 (An error in the URL handler of the VIDEOJET multi 4000 may lead to a r ...)
+ TODO: check
CVE-2022-40182 (A vulnerability has been identified in Desigo PXM30-1 (All versions &l ...)
NOT-FOR-US: Siemens
CVE-2022-40181 (A vulnerability has been identified in Desigo PXM30-1 (All versions &l ...)
@@ -11197,10 +12473,10 @@ CVE-2022-39367
RESERVED
CVE-2022-39366
RESERVED
-CVE-2022-39365
- RESERVED
-CVE-2022-39364
- RESERVED
+CVE-2022-39365 (Pimcore is an open source data and experience management platform. Pri ...)
+ TODO: check
+CVE-2022-39364 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+ TODO: check
CVE-2022-39363
RESERVED
CVE-2022-39362 (Metabase is data visualization software. Prior to versions 0.44.5, 1.4 ...)
@@ -11267,10 +12543,10 @@ CVE-2022-39332
RESERVED
CVE-2022-39331
RESERVED
-CVE-2022-39330
- RESERVED
-CVE-2022-39329
- RESERVED
+CVE-2022-39330 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+ TODO: check
+CVE-2022-39329 (Nextcloud Server is the file server software for Nextcloud, a self-hos ...)
+ TODO: check
CVE-2022-39328
RESERVED
CVE-2022-39327 (Azure CLI is the command-line interface for Microsoft Azure. In versio ...)
@@ -11626,8 +12902,8 @@ CVE-2022-3097 (The LBStopAttack WordPress plugin through 1.1.2 does not use nonc
NOT-FOR-US: WordPress plugin
CVE-2022-3096
RESERVED
-CVE-2022-3095
- RESERVED
+CVE-2022-3095 (The implementation of backslash parsing in the Dart URI class for vers ...)
+ TODO: check
CVE-2022-3094
RESERVED
CVE-2022-39197 (An XSS (Cross Site Scripting) vulnerability was found in HelpSystems C ...)
@@ -12986,8 +14262,8 @@ CVE-2021-46835 (There is a traffic hijacking vulnerability in WS7200-10 11.0.2.1
NOT-FOR-US: Huawei
CVE-2020-36602 (There is an out-of-bounds read and write vulnerability in some headset ...)
NOT-FOR-US: Huawei
-CVE-2022-38744
- RESERVED
+CVE-2022-38744 (An unauthenticated attacker with network access to a victim's Rockwell ...)
+ TODO: check
CVE-2022-38743 (Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, ...)
NOT-FOR-US: Rockwell Automation
CVE-2022-38742 (Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is ...)
@@ -14745,8 +16021,8 @@ CVE-2022-38182
RESERVED
CVE-2022-38181 (An Arm product family through 2022-08-12 mail GPU kernel driver allows ...)
TODO: check
-CVE-2022-2809
- RESERVED
+CVE-2022-2809 (A vulnerability in bmcweb of OpenBMC Project allows user to cause deni ...)
+ TODO: check
CVE-2022-38180 (In JetBrains Ktor before 2.1.0 the wrong authentication provider could ...)
NOT-FOR-US: JetBrains Ktor
CVE-2022-38179 (JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Downloa ...)
@@ -19948,8 +21224,8 @@ CVE-2022-36184
RESERVED
CVE-2022-36183
RESERVED
-CVE-2022-36182
- RESERVED
+CVE-2022-36182 (Hashicorp Boundary v0.8.0 is vulnerable to Clickjacking which allow fo ...)
+ TODO: check
CVE-2022-36181
RESERVED
CVE-2022-36180
@@ -25260,7 +26536,7 @@ CVE-2022-34267
CVE-2022-34266 (The libtiff-4.0.3-35.amzn2.0.1 package for LibTIFF on Amazon Linux 2 a ...)
NOT-FOR-US: libtiff-4.0.3-35.amzn2.0.1 Amazon package
CVE-2022-34265 (An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0 ...)
- {DSA-5254-1}
+ {DSA-5254-1 DLA-3164-1}
- python-django 2:4.0.6-1 (bug #1014541)
NOTE: https://www.openwall.com/lists/oss-security/2022/07/04/2
NOTE: https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
@@ -29892,8 +31168,8 @@ CVE-2022-32409 (A local file inclusion (LFI) vulnerability in the component code
NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
CVE-2022-32408
RESERVED
-CVE-2022-32407
- RESERVED
+CVE-2022-32407 (Softr v2.0 was discovered to contain a Cross-Site Scripting (XSS) vuln ...)
+ TODO: check
CVE-2022-32406 (GtkRadiant v1.6.6 was discovered to contain a buffer overflow via the ...)
NOT-FOR-US: GtkRadiant
CVE-2022-32405 (Prison Management System v1.0 was discovered to contain a SQL injectio ...)
@@ -31341,8 +32617,8 @@ CVE-2022-31900
RESERVED
CVE-2022-31899
RESERVED
-CVE-2022-31898
- RESERVED
+CVE-2022-31898 (gl-inet GL-MT300N-V2 Mango v3.212 and GL-AX1800 Flint v3.214 were disc ...)
+ TODO: check
CVE-2022-31897 (SourceCodester Zoo Management System 1.0 is vulnerable to Cross Site S ...)
NOT-FOR-US: SourceCodester Zoo Management System
CVE-2022-31896
@@ -52881,10 +54157,10 @@ CVE-2022-21168 (The affected product is vulnerable due to an invalid pointer ini
NOT-FOR-US: Fuji Electric
CVE-2022-24671 (A link following privilege escalation vulnerability in Trend Micro Ant ...)
NOT-FOR-US: Trend Micro
-CVE-2022-24670
- RESERVED
-CVE-2022-24669
- RESERVED
+CVE-2022-24670 (An attacker can use the unrestricted LDAP queries to determine configu ...)
+ TODO: check
+CVE-2022-24669 (It may be possible to gain some details of the deployment through a we ...)
+ TODO: check
CVE-2022-0547 (OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass ...)
{DLA-2992-1}
- openvpn 2.5.6-1 (bug #1008015)
@@ -63440,10 +64716,10 @@ CVE-2021-45478
RESERVED
CVE-2021-45477
RESERVED
-CVE-2021-45476
- RESERVED
-CVE-2021-45475
- RESERVED
+CVE-2021-45476 (Yordam Library Information Document Automation product before version ...)
+ TODO: check
+CVE-2021-45475 (Yordam Library Information Document Automation product before version ...)
+ TODO: check
CVE-2021-4166 (vim is vulnerable to Out-of-bounds Read ...)
- vim 2:8.2.3995-1
[bullseye] - vim <no-dsa> (Minor issue)
@@ -118518,7 +119794,7 @@ CVE-2021-3283 (HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java t
CVE-2021-3282 (HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` ...)
NOT-FOR-US: HashiCorp Vault
CVE-2021-3281 (In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, ...)
- {DLA-2540-1}
+ {DLA-3164-1 DLA-2540-1}
- python-django 2:2.2.18-1 (bug #981562)
NOTE: https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
NOTE: https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23 (master)
@@ -124992,7 +126268,7 @@ CVE-2021-23337 (Lodash versions prior to 4.17.21 are vulnerable to Command Injec
[stretch] - node-lodash <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://snyk.io/vuln/SNYK-JS-LODASH-1040724
CVE-2021-23336 (The package python/cpython from 0 and before 3.6.13, from 3.7.0 and be ...)
- {DLA-2628-1 DLA-2619-1 DLA-2569-1}
+ {DLA-3164-1 DLA-2628-1 DLA-2619-1 DLA-2569-1}
- python-django 2:2.2.19-1 (bug #983090)
- python3.9 3.9.2-1
[buster] - python3.9 <ignored> (Will break existing applications, don't backport to released suites)
@@ -153880,6 +155156,7 @@ CVE-2020-24585 (An issue was discovered in the DTLS handshake implementation in
NOTE: https://github.com/wolfSSL/wolfssl/pull/3219
NOTE: https://github.com/wolfSSL/wolfssl/commit/3be7f3ea3a56d178acf0f7f84ee4ae8cbfee8915 (v4.5.0-stable)
CVE-2020-24584 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10 ...)
+ {DLA-3164-1}
- python-django 2:2.2.16-1 (bug #969367)
[stretch] - python-django <not-affected> (Requires Python 3.7+)
NOTE: https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71 (master)
@@ -153887,6 +155164,7 @@ CVE-2020-24584 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before
NOTE: https://github.com/django/django/commit/cdb367c92a0ba72ddc0cbd13ff42b0e6df709554 (3.0.10)
NOTE: https://github.com/django/django/commit/a3aebfdc8153dc230686b6d2454ccd32ed4c9e6f (2.2.16)
CVE-2020-24583 (An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10 ...)
+ {DLA-3164-1}
- python-django 2:2.2.16-1 (bug #969367)
[stretch] - python-django <not-affected> (Requires Python 3.7+)
NOTE: https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9 (master)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42fcc87f70d5d8f0497393cab5202f50747942d0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42fcc87f70d5d8f0497393cab5202f50747942d0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221027/1a7cc2b6/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list