[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Jan 1 08:10:21 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
51e35d25 by security tracker role at 2023-01-01T08:10:11+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,117 @@
+CVE-2023-22550
+ RESERVED
+CVE-2023-22549
+ RESERVED
+CVE-2023-22548
+ RESERVED
+CVE-2023-22547
+ RESERVED
+CVE-2023-22546
+ RESERVED
+CVE-2023-22545
+ RESERVED
+CVE-2023-22544
+ RESERVED
+CVE-2023-22543
+ RESERVED
+CVE-2023-22542
+ RESERVED
+CVE-2023-22541
+ RESERVED
+CVE-2023-22540
+ RESERVED
+CVE-2023-22539
+ RESERVED
+CVE-2023-22538
+ RESERVED
+CVE-2023-22537
+ RESERVED
+CVE-2023-22536
+ RESERVED
+CVE-2023-22535
+ RESERVED
+CVE-2023-22534
+ RESERVED
+CVE-2023-22533
+ RESERVED
+CVE-2023-22532
+ RESERVED
+CVE-2023-22531
+ RESERVED
+CVE-2023-22530
+ RESERVED
+CVE-2023-22529
+ RESERVED
+CVE-2023-22528
+ RESERVED
+CVE-2023-22527
+ RESERVED
+CVE-2023-22526
+ RESERVED
+CVE-2023-22525
+ RESERVED
+CVE-2023-22524
+ RESERVED
+CVE-2023-22523
+ RESERVED
+CVE-2023-22522
+ RESERVED
+CVE-2023-22521
+ RESERVED
+CVE-2023-22520
+ RESERVED
+CVE-2023-22519
+ RESERVED
+CVE-2023-22518
+ RESERVED
+CVE-2023-22517
+ RESERVED
+CVE-2023-22516
+ RESERVED
+CVE-2023-22515
+ RESERVED
+CVE-2023-22514
+ RESERVED
+CVE-2023-22513
+ RESERVED
+CVE-2023-22512
+ RESERVED
+CVE-2023-22511
+ RESERVED
+CVE-2023-22510
+ RESERVED
+CVE-2023-22509
+ RESERVED
+CVE-2023-22508
+ RESERVED
+CVE-2023-22507
+ RESERVED
+CVE-2023-22506
+ RESERVED
+CVE-2023-22505
+ RESERVED
+CVE-2023-22504
+ RESERVED
+CVE-2023-22503
+ RESERVED
+CVE-2023-22502
+ RESERVED
+CVE-2023-22501
+ RESERVED
+CVE-2023-0028 (Cross-site Scripting (XSS) - Stored in GitHub repository linagora/twak ...)
+ TODO: check
+CVE-2022-48198 (The ntpd_driver component before 1.3.0 and 2.x before 2.2.0 for Robot ...)
+ TODO: check
+CVE-2022-48197
+ RESERVED
+CVE-2018-25061 (A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as ...)
+ TODO: check
+CVE-2017-20160 (A vulnerability was found in flitto express-param up to 0.x. It has be ...)
+ TODO: check
+CVE-2014-125029
+ RESERVED
+CVE-2014-125028 (A vulnerability was found in valtech IDP Test Client and classified as ...)
+ TODO: check
CVE-2022-4868 (Improper Authorization in GitHub repository froxlor/froxlor prior to 2 ...)
- froxlor <itp> (bug #581792)
CVE-2022-4867 (Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor ...)
@@ -1131,8 +1245,8 @@ CVE-2021-4278 (A vulnerability classified as problematic has been found in cronv
NOT-FOR-US: cronvel tree-kit
CVE-2019-25084 (A vulnerability, which was classified as problematic, has been found i ...)
TODO: check
-CVE-2022-47952
- RESERVED
+CVE-2022-47952 (lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may al ...)
+ TODO: check
CVE-2022-47951
RESERVED
CVE-2022-47950
@@ -16981,102 +17095,102 @@ CVE-2022-43832
RESERVED
CVE-2022-43831
RESERVED
-CVE-2022-43830
- RESERVED
-CVE-2022-43829
- RESERVED
-CVE-2022-43828
- RESERVED
-CVE-2022-43827
- RESERVED
-CVE-2022-43826
- RESERVED
-CVE-2022-43825
- RESERVED
-CVE-2022-43824
- RESERVED
-CVE-2022-43823
- RESERVED
-CVE-2022-43822
- RESERVED
-CVE-2022-43821
- RESERVED
-CVE-2022-43820
- RESERVED
-CVE-2022-43819
- RESERVED
-CVE-2022-43818
- RESERVED
-CVE-2022-43817
- RESERVED
-CVE-2022-43816
- RESERVED
-CVE-2022-43815
- RESERVED
-CVE-2022-43814
- RESERVED
-CVE-2022-43813
- RESERVED
-CVE-2022-43812
- RESERVED
-CVE-2022-43811
- RESERVED
-CVE-2022-43810
- RESERVED
-CVE-2022-43809
- RESERVED
-CVE-2022-43808
- RESERVED
-CVE-2022-43807
- RESERVED
-CVE-2022-43806
- RESERVED
-CVE-2022-43805
- RESERVED
-CVE-2022-43804
- RESERVED
-CVE-2022-43803
- RESERVED
-CVE-2022-43802
- RESERVED
-CVE-2022-43801
- RESERVED
-CVE-2022-43800
- RESERVED
-CVE-2022-43799
- RESERVED
-CVE-2022-43798
- RESERVED
-CVE-2022-43797
- RESERVED
-CVE-2022-43796
- RESERVED
-CVE-2022-43795
- RESERVED
-CVE-2022-43794
- RESERVED
-CVE-2022-43793
- RESERVED
-CVE-2022-43792
- RESERVED
-CVE-2022-43791
- RESERVED
-CVE-2022-43790
- RESERVED
-CVE-2022-43789
- RESERVED
-CVE-2022-43788
- RESERVED
-CVE-2022-43787
- RESERVED
-CVE-2022-43786
- RESERVED
-CVE-2022-43785
- RESERVED
-CVE-2022-43784
- RESERVED
-CVE-2022-43783
- RESERVED
+CVE-2022-43830 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43829 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43828 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43827 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43826 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43825 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43824 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43823 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43822 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43821 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43820 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43819 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43818 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43817 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43816 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43815 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43814 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43813 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43812 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43811 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43810 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43809 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43808 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43807 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43806 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43805 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43804 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43803 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43802 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43801 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43800 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43799 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43798 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43797 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43796 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43795 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43794 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43793 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43792 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43791 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43790 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43789 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43788 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43787 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43786 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43785 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43784 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
+CVE-2022-43783 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
CVE-2022-43782 (Affected versions of Atlassian Crowd allow an attacker to authenticate ...)
NOT-FOR-US: Atlassian
CVE-2022-43781 (There is a command injection vulnerability using environment variables ...)
@@ -35887,8 +36001,8 @@ CVE-2022-36829 (PendingIntent hijacking vulnerability in releaseAlarm in Charm b
NOT-FOR-US: Samsung
CVE-2022-36828
RESERVED
-CVE-2022-36827
- RESERVED
+CVE-2022-36827 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
CVE-2022-36826
RESERVED
CVE-2022-36825
@@ -35909,8 +36023,8 @@ CVE-2022-36818
RESERVED
CVE-2022-36817
RESERVED
-CVE-2022-36816
- RESERVED
+CVE-2022-36816 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+ TODO: check
CVE-2022-36815
RESERVED
CVE-2022-36814
@@ -96126,8 +96240,8 @@ CVE-2021-41825 (Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML inje
NOT-FOR-US: Verint Workforce Optimization (WFO)
CVE-2021-41824 (Craft CMS before 3.7.14 allows CSV injection. ...)
NOT-FOR-US: Craft CMS
-CVE-2021-41823
- RESERVED
+CVE-2021-41823 (The Web Application Firewall (WAF) in Kemp LoadMaster 7.2.54.1 allows ...)
+ TODO: check
CVE-2021-41822
RESERVED
CVE-2021-41821 (Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer U ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51e35d253932e7407ece2e2fba2caefd527f9dda
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51e35d253932e7407ece2e2fba2caefd527f9dda
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230101/4c3c1459/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list