[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Jan 1 08:10:21 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
51e35d25 by security tracker role at 2023-01-01T08:10:11+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,117 @@
+CVE-2023-22550
+	RESERVED
+CVE-2023-22549
+	RESERVED
+CVE-2023-22548
+	RESERVED
+CVE-2023-22547
+	RESERVED
+CVE-2023-22546
+	RESERVED
+CVE-2023-22545
+	RESERVED
+CVE-2023-22544
+	RESERVED
+CVE-2023-22543
+	RESERVED
+CVE-2023-22542
+	RESERVED
+CVE-2023-22541
+	RESERVED
+CVE-2023-22540
+	RESERVED
+CVE-2023-22539
+	RESERVED
+CVE-2023-22538
+	RESERVED
+CVE-2023-22537
+	RESERVED
+CVE-2023-22536
+	RESERVED
+CVE-2023-22535
+	RESERVED
+CVE-2023-22534
+	RESERVED
+CVE-2023-22533
+	RESERVED
+CVE-2023-22532
+	RESERVED
+CVE-2023-22531
+	RESERVED
+CVE-2023-22530
+	RESERVED
+CVE-2023-22529
+	RESERVED
+CVE-2023-22528
+	RESERVED
+CVE-2023-22527
+	RESERVED
+CVE-2023-22526
+	RESERVED
+CVE-2023-22525
+	RESERVED
+CVE-2023-22524
+	RESERVED
+CVE-2023-22523
+	RESERVED
+CVE-2023-22522
+	RESERVED
+CVE-2023-22521
+	RESERVED
+CVE-2023-22520
+	RESERVED
+CVE-2023-22519
+	RESERVED
+CVE-2023-22518
+	RESERVED
+CVE-2023-22517
+	RESERVED
+CVE-2023-22516
+	RESERVED
+CVE-2023-22515
+	RESERVED
+CVE-2023-22514
+	RESERVED
+CVE-2023-22513
+	RESERVED
+CVE-2023-22512
+	RESERVED
+CVE-2023-22511
+	RESERVED
+CVE-2023-22510
+	RESERVED
+CVE-2023-22509
+	RESERVED
+CVE-2023-22508
+	RESERVED
+CVE-2023-22507
+	RESERVED
+CVE-2023-22506
+	RESERVED
+CVE-2023-22505
+	RESERVED
+CVE-2023-22504
+	RESERVED
+CVE-2023-22503
+	RESERVED
+CVE-2023-22502
+	RESERVED
+CVE-2023-22501
+	RESERVED
+CVE-2023-0028 (Cross-site Scripting (XSS) - Stored in GitHub repository linagora/twak ...)
+	TODO: check
+CVE-2022-48198 (The ntpd_driver component before 1.3.0 and 2.x before 2.2.0 for Robot  ...)
+	TODO: check
+CVE-2022-48197
+	RESERVED
+CVE-2018-25061 (A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as ...)
+	TODO: check
+CVE-2017-20160 (A vulnerability was found in flitto express-param up to 0.x. It has be ...)
+	TODO: check
+CVE-2014-125029
+	RESERVED
+CVE-2014-125028 (A vulnerability was found in valtech IDP Test Client and classified as ...)
+	TODO: check
 CVE-2022-4868 (Improper Authorization in GitHub repository froxlor/froxlor prior to 2 ...)
 	- froxlor <itp> (bug #581792)
 CVE-2022-4867 (Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor ...)
@@ -1131,8 +1245,8 @@ CVE-2021-4278 (A vulnerability classified as problematic has been found in cronv
 	NOT-FOR-US: cronvel tree-kit
 CVE-2019-25084 (A vulnerability, which was classified as problematic, has been found i ...)
 	TODO: check
-CVE-2022-47952
-	RESERVED
+CVE-2022-47952 (lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may al ...)
+	TODO: check
 CVE-2022-47951
 	RESERVED
 CVE-2022-47950
@@ -16981,102 +17095,102 @@ CVE-2022-43832
 	RESERVED
 CVE-2022-43831
 	RESERVED
-CVE-2022-43830
-	RESERVED
-CVE-2022-43829
-	RESERVED
-CVE-2022-43828
-	RESERVED
-CVE-2022-43827
-	RESERVED
-CVE-2022-43826
-	RESERVED
-CVE-2022-43825
-	RESERVED
-CVE-2022-43824
-	RESERVED
-CVE-2022-43823
-	RESERVED
-CVE-2022-43822
-	RESERVED
-CVE-2022-43821
-	RESERVED
-CVE-2022-43820
-	RESERVED
-CVE-2022-43819
-	RESERVED
-CVE-2022-43818
-	RESERVED
-CVE-2022-43817
-	RESERVED
-CVE-2022-43816
-	RESERVED
-CVE-2022-43815
-	RESERVED
-CVE-2022-43814
-	RESERVED
-CVE-2022-43813
-	RESERVED
-CVE-2022-43812
-	RESERVED
-CVE-2022-43811
-	RESERVED
-CVE-2022-43810
-	RESERVED
-CVE-2022-43809
-	RESERVED
-CVE-2022-43808
-	RESERVED
-CVE-2022-43807
-	RESERVED
-CVE-2022-43806
-	RESERVED
-CVE-2022-43805
-	RESERVED
-CVE-2022-43804
-	RESERVED
-CVE-2022-43803
-	RESERVED
-CVE-2022-43802
-	RESERVED
-CVE-2022-43801
-	RESERVED
-CVE-2022-43800
-	RESERVED
-CVE-2022-43799
-	RESERVED
-CVE-2022-43798
-	RESERVED
-CVE-2022-43797
-	RESERVED
-CVE-2022-43796
-	RESERVED
-CVE-2022-43795
-	RESERVED
-CVE-2022-43794
-	RESERVED
-CVE-2022-43793
-	RESERVED
-CVE-2022-43792
-	RESERVED
-CVE-2022-43791
-	RESERVED
-CVE-2022-43790
-	RESERVED
-CVE-2022-43789
-	RESERVED
-CVE-2022-43788
-	RESERVED
-CVE-2022-43787
-	RESERVED
-CVE-2022-43786
-	RESERVED
-CVE-2022-43785
-	RESERVED
-CVE-2022-43784
-	RESERVED
-CVE-2022-43783
-	RESERVED
+CVE-2022-43830 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43829 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43828 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43827 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43826 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43825 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43824 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43823 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43822 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43821 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43820 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43819 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43818 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43817 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43816 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43815 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43814 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43813 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43812 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43811 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43810 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43809 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43808 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43807 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43806 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43805 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43804 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43803 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43802 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43801 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43800 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43799 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43798 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43797 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43796 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43795 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43794 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43793 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43792 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43791 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43790 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43789 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43788 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43787 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43786 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43785 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43784 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
+CVE-2022-43783 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
 CVE-2022-43782 (Affected versions of Atlassian Crowd allow an attacker to authenticate ...)
 	NOT-FOR-US: Atlassian
 CVE-2022-43781 (There is a command injection vulnerability using environment variables ...)
@@ -35887,8 +36001,8 @@ CVE-2022-36829 (PendingIntent hijacking vulnerability in releaseAlarm in Charm b
 	NOT-FOR-US: Samsung
 CVE-2022-36828
 	RESERVED
-CVE-2022-36827
-	RESERVED
+CVE-2022-36827 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
 CVE-2022-36826
 	RESERVED
 CVE-2022-36825
@@ -35909,8 +36023,8 @@ CVE-2022-36818
 	RESERVED
 CVE-2022-36817
 	RESERVED
-CVE-2022-36816
-	RESERVED
+CVE-2022-36816 (To maintain compliance with CNA rules, we have rejected this CVE recor ...)
+	TODO: check
 CVE-2022-36815
 	RESERVED
 CVE-2022-36814
@@ -96126,8 +96240,8 @@ CVE-2021-41825 (Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML inje
 	NOT-FOR-US: Verint Workforce Optimization (WFO)
 CVE-2021-41824 (Craft CMS before 3.7.14 allows CSV injection. ...)
 	NOT-FOR-US: Craft CMS
-CVE-2021-41823
-	RESERVED
+CVE-2021-41823 (The Web Application Firewall (WAF) in Kemp LoadMaster 7.2.54.1 allows  ...)
+	TODO: check
 CVE-2021-41822
 	RESERVED
 CVE-2021-41821 (Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer U ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51e35d253932e7407ece2e2fba2caefd527f9dda

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51e35d253932e7407ece2e2fba2caefd527f9dda
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230101/4c3c1459/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list