[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri May 3 21:12:23 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c7a548e1 by security tracker role at 2024-05-03T20:11:55+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,125 +1,2057 @@
-CVE-2022-48705 [wifi: mt76: mt7921e: fix crash in chip reset fail]
+CVE-2024-4466 (SQL injection vulnerability in Gescen on the centrosdigitales.net plat ...)
+	TODO: check
+CVE-2024-4461 (Unquoted path or search item vulnerability in SugarSync versions prior ...)
+	TODO: check
+CVE-2024-4439 (WordPress Core is vulnerable to Stored Cross-Site Scripting via user d ...)
+	TODO: check
+CVE-2024-4433 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-4406 (Xiaomi Pro 13 GetApps integral-dialog-page Cross-Site Scripting Remote ...)
+	TODO: check
+CVE-2024-4405 (Xiaomi Pro 13 mimarket manual-upgrade Cross-Site Scripting Remote Code ...)
+	TODO: check
+CVE-2024-4334 (The Supreme Modules Lite \u2013 Divi Theme, Extra Theme and Divi Build ...)
+	TODO: check
+CVE-2024-4324 (The WP Video Lightbox plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-4265 (The Master Addons \u2013 Free Widgets, Hover Effects, Toggle, Conditio ...)
+	TODO: check
+CVE-2024-4216 (pgAdmin <= 8.5 is affected by XSS vulnerability in /settings/store API ...)
+	TODO: check
+CVE-2024-4215 (pgAdmin <= 8.5 is affected by a multi-factor authentication bypass vul ...)
+	TODO: check
+CVE-2024-4203 (The Premium Addons Pro for Elementor plugin for WordPress is vulnerabl ...)
+	TODO: check
+CVE-2024-4156 (The Essential Addons for Elementor \u2013 Best Elementor Templates, Wi ...)
+	TODO: check
+CVE-2024-4133 (The ARMember \u2013 Membership Plugin, Content Restriction, Member Lev ...)
+	TODO: check
+CVE-2024-4128 (This vulnerability was a potential CSRF attack.When running the Fireba ...)
+	TODO: check
+CVE-2024-4097 (The Cost Calculator Builder plugin for WordPress is vulnerable to Stor ...)
+	TODO: check
+CVE-2024-4092 (The Slider Revolution plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-4086 (The CM Tooltip Glossary \u2013 Powerful Glossary Plugin plugin for Wor ...)
+	TODO: check
+CVE-2024-4085 (The Tabellen von faustball.com plugin for WordPress is vulnerable to S ...)
+	TODO: check
+CVE-2024-4083 (The Easy Restaurant Table Booking plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2024-4036 (The Sydney Toolbox plugin for WordPress is vulnerable to Stored Cross- ...)
+	TODO: check
+CVE-2024-4034 (The Virtue theme for WordPress is vulnerable to Stored Cross-Site Scri ...)
+	TODO: check
+CVE-2024-4033 (The All-in-One Video Gallery plugin for WordPress is vulnerable to arb ...)
+	TODO: check
+CVE-2024-4003 (The Essential Addons for Elementor \u2013 Best Elementor Templates, Wi ...)
+	TODO: check
+CVE-2024-4000 (The WordPress Header Builder Plugin \u2013 Pearl plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3991 (The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +1 ...)
+	TODO: check
+CVE-2024-3985 (The Exclusive Addons for Elementor plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-3957 (The Booster for WooCommerce plugin is vulnerable to Unauthenticated Ar ...)
+	TODO: check
+CVE-2024-3955 (URL GET parameter "logtime" utilized within the "downloadlog" function ...)
+	TODO: check
+CVE-2024-3942 (The MasterStudy LMS WordPress Plugin \u2013 for Online Courses and Edu ...)
+	TODO: check
+CVE-2024-3936 (The The Post Grid \u2013 Shortcode, Gutenberg Blocks and Elementor Add ...)
+	TODO: check
+CVE-2024-3897 (The Popup Box \u2013 Best WordPress Popup Plugin plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3895 (The WP Datepicker plugin for WordPress is vulnerable to unauthorized m ...)
+	TODO: check
+CVE-2024-3891 (The Happy Addons for Elementor plugin for WordPress is vulnerable to S ...)
+	TODO: check
+CVE-2024-3885 (The Premium Addons for Elementor plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3883 (The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2024-3870 (The Contact Form 7 Database Addon \u2013 CFDB7 plugin for WordPress is ...)
+	TODO: check
+CVE-2024-3849 (The Click to Chat \u2013 HoliThemes plugin for WordPress is vulnerable ...)
+	TODO: check
+CVE-2024-3819 (The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-3747 (The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scr ...)
+	TODO: check
+CVE-2024-3743 (The Elementor Addon Elements plugin for WordPress is vulnerable to Sto ...)
+	TODO: check
+CVE-2024-3734 (The FOX \u2013 Currency Switcher Professional for WooCommerce plugin i ...)
+	TODO: check
+CVE-2024-3729 (The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3728 (The Essential Addons for Elementor \u2013 Best Elementor Templates, Wi ...)
+	TODO: check
+CVE-2024-3725 (The Otter Blocks \u2013 Gutenberg Blocks, Page Builder for Gutenberg E ...)
+	TODO: check
+CVE-2024-3724 (The Happy Addons for Elementor plugin for WordPress is vulnerable to S ...)
+	TODO: check
+CVE-2024-3717 (The Drag and Drop Multiple File Upload \u2013 Contact Form 7 plugin fo ...)
+	TODO: check
+CVE-2024-3715 (The Database for Contact Form 7, WPforms, Elementor forms plugin for W ...)
+	TODO: check
+CVE-2024-3703 (The Carousel Slider WordPress plugin before 2.2.10 does not validate a ...)
+	TODO: check
+CVE-2024-3692 (The Gutenverse  WordPress plugin before 1.9.1 does not validate the ht ...)
+	TODO: check
+CVE-2024-3681 (The Interactive World Maps plugin for WordPress is vulnerable to Refle ...)
+	TODO: check
+CVE-2024-3677 (The Ultimate 410 Gone Status Code plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2024-3675 (The Royal Elementor Addons and Templates plugin for WordPress is vulne ...)
+	TODO: check
+CVE-2024-3674 (The Inline Google Spreadsheet Viewer plugin for WordPress is vulnerabl ...)
+	TODO: check
+CVE-2024-3670 (The Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) plugin ...)
+	TODO: check
+CVE-2024-3650 (The ElementsKit Elementor addons plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3649 (The Contact Form by WPForms \u2013 Drag & Drop Form Builder for WordPr ...)
+	TODO: check
+CVE-2024-3647 (The Premium Addons for Elementor plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3637 (The Responsive Contact Form Builder & Lead Generation Plugin WordPress ...)
+	TODO: check
+CVE-2024-3607 (The PropertyHive plugin for WordPress is vulnerable to unauthorized lo ...)
+	TODO: check
+CVE-2024-3606 (The ProfileGrid \u2013 User Profiles, Memberships, Groups and Communit ...)
+	TODO: check
+CVE-2024-3601 (The Poll Maker \u2013 Best WordPress Poll Plugin plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3599 (The WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) plugin for WordPre ...)
+	TODO: check
+CVE-2024-3588 (The Getwid \u2013 Gutenberg Blocks plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-3585 (The Send PDF for Contact Form 7 plugin for WordPress is vulnerable to  ...)
+	TODO: check
+CVE-2024-3581 (The MaxGalleria plugin for WordPress is vulnerable to unauthorized ima ...)
+	TODO: check
+CVE-2024-3554 (The All in One SEO \u2013 Best WordPress SEO Plugin \u2013 Easily Impr ...)
+	TODO: check
+CVE-2024-3553 (The Tutor LMS \u2013 eLearning and online course solution plugin for W ...)
+	TODO: check
+CVE-2024-3550 (The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPre ...)
+	TODO: check
+CVE-2024-3546 (The WordPress Backup & Migration plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3544 (Unauthenticated attackers can perform actions, using SSH private keys, ...)
+	TODO: check
+CVE-2024-3543 (Use of reversible password encryption algorithm allows attackers to de ...)
+	TODO: check
+CVE-2024-3520 (The Country State City Dropdown CF7 plugin for WordPress is vulnerable ...)
+	TODO: check
+CVE-2024-3517 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2024-3500 (The ElementsKit Pro plugin for WordPress is vulnerable to Local File I ...)
+	TODO: check
+CVE-2024-3499 (The ElementsKit Elementor addons plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-3489 (The Exclusive Addons for Elementor plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-3480 (An Implicit intent vulnerability was reported in the Motorola framewor ...)
+	TODO: check
+CVE-2024-3479 (An improper export vulnerability was reported in the Motorola Enterpri ...)
+	TODO: check
+CVE-2024-3473 (The Header Footer Code Manager Pro plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-3341 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2024-3340 (The Colibri Page Builder plugin for WordPress is vulnerable to Stored  ...)
+	TODO: check
+CVE-2024-3338 (The Colibri Page Builder plugin for WordPress is vulnerable to Stored  ...)
+	TODO: check
+CVE-2024-3337 (The Colibri Page Builder plugin for WordPress is vulnerable to Stored  ...)
+	TODO: check
+CVE-2024-3312 (The Easy Custom Auto Excerpt plugin for WordPress is vulnerable to Sen ...)
+	TODO: check
+CVE-2024-3308 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3307 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3295 (The User Registration \u2013 Custom Registration Form, Login Form, and ...)
+	TODO: check
+CVE-2024-3287 (The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plug ...)
+	TODO: check
+CVE-2024-3275 (The eRoom \u2013 Zoom Meetings & Webinars plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2024-3233 (The Ivory Search \u2013 WordPress Search Plugin plugin for WordPress i ...)
+	TODO: check
+CVE-2024-3215 (The Paid Memberships Pro \u2013 Content Restriction, User Registration ...)
+	TODO: check
+CVE-2024-3206 (The Different Menu in Different Pages \u2013 Control Menu Visibility ( ...)
+	TODO: check
+CVE-2024-3199 (The The Plus Addons for Elementor plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2024-3197 (The The Plus Addons for Elementor plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2024-3161 (The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-3109 (A hard-coded AES key vulnerability was reported in the Motorola GuideM ...)
+	TODO: check
+CVE-2024-3108 (An implicit intent vulnerability was reported for Motorola\u2019s Time ...)
+	TODO: check
+CVE-2024-3107 (The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is  ...)
+	TODO: check
+CVE-2024-3074 (The Elementor ImageBox plugin for WordPress is vulnerable to Stored Cr ...)
+	TODO: check
+CVE-2024-3071 (The ACF On-The-Go plugin for WordPress is vulnerable to unauthorized m ...)
+	TODO: check
+CVE-2024-3047 (The PDF Invoices & Packing Slips for WooCommerce plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3045 (The PDF Invoices & Packing Slips for WooCommerce plugin for WordPress  ...)
+	TODO: check
+CVE-2024-3023 (The AnnounceKit plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2024-3021 (The Mhr Post Ticker plugin for WordPress is vulnerable to Stored Cross ...)
+	TODO: check
+CVE-2024-3005 (The LA-Studio Element Kit for Elementor plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2024-34455 (Buildroot before 0b2967e lacks the sticky bit for the /dev/shm directo ...)
+	TODO: check
+CVE-2024-34453 (TwoNav 2.1.13 contains an SSRF vulnerability via the url paramater to  ...)
+	TODO: check
+CVE-2024-34449 (Vditor 3.10.3 allows XSS via an attribute of an A element. NOTE: the v ...)
+	TODO: check
+CVE-2024-34447 (An issue was discovered in Bouncy Castle Java Cryptography APIs before ...)
+	TODO: check
+CVE-2024-34446 (Mullvad VPN through 2024.1 on Android does not set a DNS server in the ...)
+	TODO: check
+CVE-2024-34408 (Tencent libpag through 4.3.51 has an integer overflow in DecodeStream: ...)
+	TODO: check
+CVE-2024-34404 (A vulnerability was discovered in the Alta Recovery Vault feature of V ...)
+	TODO: check
+CVE-2024-34403 (An issue was discovered in uriparser through 0.9.7. ComposeQueryMalloc ...)
+	TODO: check
+CVE-2024-34402 (An issue was discovered in uriparser through 0.9.7. ComposeQueryEngine ...)
+	TODO: check
+CVE-2024-34401 (Savsoft Quiz 6.0 allows stored XSS via the index.php/quiz/insert_quiz/ ...)
+	TODO: check
+CVE-2024-34394 (libxmljs2 is vulnerable to a type confusion vulnerability when parsing ...)
+	TODO: check
+CVE-2024-34393 (libxmljs2 is vulnerable to a type confusion vulnerability when parsing ...)
+	TODO: check
+CVE-2024-34392 (libxmljs is vulnerable to a type confusion vulnerability when parsing  ...)
+	TODO: check
+CVE-2024-34391 (libxmljs is vulnerable to a type confusion vulnerability when parsing  ...)
+	TODO: check
+CVE-2024-34075 (kurwov is a fast, dependency-free library for creating Markov Chains.  ...)
+	TODO: check
+CVE-2024-34073 (sagemaker-python-sdk is a library for training and deploying machine l ...)
+	TODO: check
+CVE-2024-34072 (sagemaker-python-sdk is a library for training and deploying machine l ...)
+	TODO: check
+CVE-2024-34068 (Pterodactyl wings is the server control plane for Pterodactyl Panel. A ...)
+	TODO: check
+CVE-2024-34067 (Pterodactyl is a free, open-source game server management panel built  ...)
+	TODO: check
+CVE-2024-34066 (Pterodactyl wings is the server control plane for Pterodactyl Panel. I ...)
+	TODO: check
+CVE-2024-34063 (vodozemac is an implementation of Olm and Megolm in pure Rust. Version ...)
+	TODO: check
+CVE-2024-34062 (tqdm is an open source progress bar for Python and CLI. Any optional n ...)
+	TODO: check
+CVE-2024-34061 (changedetection.io is a free open source web page change detection, we ...)
+	TODO: check
+CVE-2024-34033 (Delta Electronics DIAEnergie has insufficient input validation which m ...)
+	TODO: check
+CVE-2024-34032 (Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnera ...)
+	TODO: check
+CVE-2024-34031 (Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnera ...)
+	TODO: check
+CVE-2024-33956 (Missing Authorization vulnerability in ThemeLocation Custom WooCommerc ...)
+	TODO: check
+CVE-2024-33955 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33954 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33953 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33952 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33951 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33950 (Administrator Cross Site Scripting (XSS) in Archives Calendar Widget < ...)
+	TODO: check
+CVE-2024-33949 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33948 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33947 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33946 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33945 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33944 (Missing Authorization vulnerability in Kestrel WooCommerce AWeber News ...)
+	TODO: check
+CVE-2024-33943 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33942 (Missing Authorization vulnerability in Eric Alli Google Typography.Thi ...)
+	TODO: check
+CVE-2024-33941 (Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress ...)
+	TODO: check
+CVE-2024-33940 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33938 (Missing Authorization vulnerability in codename065 Sliding Widgets all ...)
+	TODO: check
+CVE-2024-33937 (Missing Authorization vulnerability in Nico Martin Progressive WordPre ...)
+	TODO: check
+CVE-2024-33936 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33935 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33934 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33932 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33931 (Missing Authorization vulnerability in ilGhera JW Player for WordPress ...)
+	TODO: check
+CVE-2024-33930 (URL Redirection to Untrusted Site ('Open Redirect') vulnerability in I ...)
+	TODO: check
+CVE-2024-33929 (Missing Authorization vulnerability in wpWax Directorist.This issue af ...)
+	TODO: check
+CVE-2024-33928 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33927 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33926 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33925 (Missing Authorization vulnerability in Adrian M\xf6rchen Embed Google  ...)
+	TODO: check
+CVE-2024-33924 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33923 (Missing Authorization vulnerability in Smartypants SP Project & Docume ...)
+	TODO: check
+CVE-2024-33922 (Insertion of Sensitive Information into Log File vulnerability in Jord ...)
+	TODO: check
+CVE-2024-33921 (Broken Access Control vulnerability in ReviewX.This issue affects Revi ...)
+	TODO: check
+CVE-2024-33920 (Missing Authorization vulnerability in Kama Democracy Poll.This issue  ...)
+	TODO: check
+CVE-2024-33919 (Missing Authorization vulnerability in Rometheme RomethemeKit For Elem ...)
+	TODO: check
+CVE-2024-33918 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33916 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-33915 (Missing Authorization vulnerability in Bowo Debug Log Manager.This iss ...)
+	TODO: check
+CVE-2024-33914 (Missing Authorization vulnerability in Exclusive Addons Exclusive Addo ...)
+	TODO: check
+CVE-2024-33913 (Cross-Site Request Forgery (CSRF) vulnerability leading to Arbitrary F ...)
+	TODO: check
+CVE-2024-33911 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-33844 (The 'control' in Parrot ANAFI USA firmware 1.10.4 does not check the M ...)
+	TODO: check
+CVE-2024-33793 (A cross-site scripting (XSS) vulnerability in netis-systems MEX605 v2. ...)
+	TODO: check
+CVE-2024-33792 (A cross-site scripting (XSS) vulnerability in netis-systems MEX605 v2. ...)
+	TODO: check
+CVE-2024-33791 (A cross-site scripting (XSS) vulnerability in netis-systems MEX605 v2. ...)
+	TODO: check
+CVE-2024-33789 (Linksys E5600 v1.1.0.26 was discovered to contain a command injection  ...)
+	TODO: check
+CVE-2024-33787 (Hengan Weighing Management Information Query Platform 2019-2021 53.25  ...)
+	TODO: check
+CVE-2024-33786 (An arbitrary file upload vulnerability in Zhongcheng Kexin Ticketing M ...)
+	TODO: check
+CVE-2024-33530 (In Jitsi Meet before 9391, a logic flaw in password-protected Jitsi me ...)
+	TODO: check
+CVE-2024-33398 (There is a ClusterRole in piraeus-operator v2.5.0 and earlier which ha ...)
+	TODO: check
+CVE-2024-33396 (An issue in karmada-io karmada v1.9.0 and before allows a local attack ...)
+	TODO: check
+CVE-2024-33394 (An issue in kubevirt kubevirt v1.2.0 and before allows a local attacke ...)
+	TODO: check
+CVE-2024-33305 (SourceCodester Laboratory Management System 1.0 is vulnerable to Cross ...)
+	TODO: check
+CVE-2024-33303 (SourceCodester Product Show Room 1.0 is vulnerable to Cross Site Scrip ...)
+	TODO: check
+CVE-2024-33302 (SourceCodester Product Show Room 1.0 and before is vulnerable to Cross ...)
+	TODO: check
+CVE-2024-32986 (PWAsForFirefox is a tool to install, manage and use Progressive Web Ap ...)
+	TODO: check
+CVE-2024-32831 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-32810 (Missing Authorization vulnerability in ShortPixel ShortPixel Critical  ...)
+	TODO: check
+CVE-2024-32638 (Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling' ...)
+	TODO: check
+CVE-2024-32359 (An RBAC authorization risk in Carina v0.13.0 and earlier allows local  ...)
+	TODO: check
+CVE-2024-32114 (In Apache ActiveMQ 6.x, the default configuration doesn't secure the A ...)
+	TODO: check
+CVE-2024-31967 (A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones throug ...)
+	TODO: check
+CVE-2024-31966 (A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones throug ...)
+	TODO: check
+CVE-2024-31965 (A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones throug ...)
+	TODO: check
+CVE-2024-31964 (A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones throug ...)
+	TODO: check
+CVE-2024-31963 (A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones throug ...)
+	TODO: check
+CVE-2024-31673 (Kliqqi-CMS 2.0.2 is vulnerable to SQL Injection in load_data.php via t ...)
+	TODO: check
+CVE-2024-31636 (An issue in LIEF v.0.14.1 allows a local attacker to obtain sensitive  ...)
+	TODO: check
+CVE-2024-30851 (Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v. ...)
+	TODO: check
+CVE-2024-30306 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-30305 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-30304 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-30303 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-30302 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-30301 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are aff ...)
+	TODO: check
+CVE-2024-2967 (The Guest posting / Frontend Posting wordpress plugin \u2013 WP Front  ...)
+	TODO: check
+CVE-2024-2960 (The SVS Pricing Tables plugin for WordPress is vulnerable to Cross-Sit ...)
+	TODO: check
+CVE-2024-2959 (The SVS Pricing Tables plugin for WordPress is vulnerable to Cross-Sit ...)
+	TODO: check
+CVE-2024-2958 (The SVS Pricing Tables plugin for WordPress is vulnerable to Stored Cr ...)
+	TODO: check
+CVE-2024-2876 (The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsl ...)
+	TODO: check
+CVE-2024-2867 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+	TODO: check
+CVE-2024-2840 (The Enhanced Media Library plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2024-2831 (The Calendar plugin for WordPress is vulnerable to SQL Injection via t ...)
+	TODO: check
+CVE-2024-2797 (The MailerLite \u2013 Signup forms (official) plugin for WordPress is  ...)
+	TODO: check
+CVE-2024-2790 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-2765 (The Ultimate Member \u2013 User Profile, Registration, Login, Member D ...)
+	TODO: check
+CVE-2024-2752 (The Where Did You Hear About Us Checkout Field for WooCommerce plugin  ...)
+	TODO: check
+CVE-2024-2751 (The Exclusive Addons for Elementor plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-2750 (The Exclusive Addons for Elementor plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-2667 (The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for W ...)
+	TODO: check
+CVE-2024-2661 (The Barcode Scanner and Inventory manager. POS (Point of Sale) \u2013  ...)
+	TODO: check
+CVE-2024-2542 (The Jotform Online Forms \u2013 Drag & Drop Form Builder, Securely Emb ...)
+	TODO: check
+CVE-2024-2503 (The Exclusive Addons for Elementor plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-2417 (The User Registration \u2013 Custom Registration Form, Login Form, and ...)
+	TODO: check
+CVE-2024-2410 (The JsonToBinaryStream()function is part of the protocol buffers C++ i ...)
+	TODO: check
+CVE-2024-2401 (The Admin Page Spider plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-2349 (The Fancy Elementor Flipbox plugin for WordPress is vulnerable to Stor ...)
+	TODO: check
+CVE-2024-2346 (The FileBird \u2013 WordPress Media Library Folders & File Manager plu ...)
+	TODO: check
+CVE-2024-2345 (The FileBird \u2013 WordPress Media Library Folders & File Manager plu ...)
+	TODO: check
+CVE-2024-2328 (The Real Media Library: Media Library Folder & File Manager plugin for ...)
+	TODO: check
+CVE-2024-2324 (The FileOrganizer \u2013 Manage WordPress and Website Files plugin for ...)
+	TODO: check
+CVE-2024-2273 (The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features pl ...)
+	TODO: check
+CVE-2024-2109 (The Booster Extension plugin for WordPress is vulnerable to Sensitive  ...)
+	TODO: check
+CVE-2024-2085 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-2084 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-2082 (The EleForms \u2013 All In One Form Integration including DB for Eleme ...)
+	TODO: check
+CVE-2024-2043 (The EleForms \u2013 All In One Form Integration including DB for Eleme ...)
+	TODO: check
+CVE-2024-29417 (Insecure Permissions vulnerability in e-trust Horacius 1.0, 1.1, and 1 ...)
+	TODO: check
+CVE-2024-29309 (An issue in Alfresco Content Services v.23.3.0.7 allows a remote attac ...)
+	TODO: check
+CVE-2024-28519 (A kernel handle leak issue in ProcObsrvesx.sys 4.0.0.49 in MicroWorld  ...)
+	TODO: check
+CVE-2024-28072 (A highly privileged account can overwrite arbitrary files on the syste ...)
+	TODO: check
+CVE-2024-27453 (In Extreme XOS through 22.6.1.4, a read-only user can escalate privile ...)
+	TODO: check
+CVE-2024-25290 (An issue in Casa Systems NL1901ACV R6B032 allows a remote attacker to  ...)
+	TODO: check
+CVE-2024-25047 (IBM Cognos Analytics 11.2.0 through 11.2.4 and 12.0.0 through 12.0.2 i ...)
+	TODO: check
+CVE-2024-24710 (Missing Authorization vulnerability in SlickRemix Feed Them Social.Thi ...)
+	TODO: check
+CVE-2024-23914 (Use of Externally-Controlled Format String vulnerability in Merge DICO ...)
+	TODO: check
+CVE-2024-23913 (Use of Out-of-range Pointer Offset vulnerability in Merge DICOM Toolki ...)
+	TODO: check
+CVE-2024-23912 (Out-of-bounds Read vulnerability in Merge DICOM Toolkit C/C++ on Windo ...)
+	TODO: check
+CVE-2024-23462 (An Improper Validation of Integrity Check Value vulnerability in Zscal ...)
+	TODO: check
+CVE-2024-23461 (An Improper Validation of Integrity Check Value vulnerability in Zscal ...)
+	TODO: check
+CVE-2024-23459 (An Improper Link Resolution Before File Access ('Link Following') vuln ...)
+	TODO: check
+CVE-2024-1993 (The Icon Widget plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2024-1959 (The Social Sharing Plugin \u2013 Social Warfare plugin for WordPress i ...)
+	TODO: check
+CVE-2024-1945 (The Contact Form, Survey & Popup Form Plugin for WordPress \u2013  ARF ...)
+	TODO: check
+CVE-2024-1897 (The Grid Gallery \u2013 Photo Image Grid Gallery plugin for WordPress  ...)
+	TODO: check
+CVE-2024-1896 (The Photo Gallery \u2013 Responsive Photo Gallery, Image Gallery, Port ...)
+	TODO: check
+CVE-2024-1842 (The wpbakery plugin for WordPress is vulnerable to Stored Cross-Site S ...)
+	TODO: check
+CVE-2024-1841 (The wpbakery plugin for WordPress is vulnerable to Stored Cross-Site S ...)
+	TODO: check
+CVE-2024-1840 (The wpbakery plugin for WordPress is vulnerable to Stored Cross-Site S ...)
+	TODO: check
+CVE-2024-1809 (The Analytify \u2013 Google Analytics Dashboard For WordPress (GA4 ana ...)
+	TODO: check
+CVE-2024-1805 (The wpbakery plugin for WordPress is vulnerable to Stored Cross-Site S ...)
+	TODO: check
+CVE-2024-1797 (The WP ULike \u2013 Most Advanced WordPress Marketing Toolkit plugin f ...)
+	TODO: check
+CVE-2024-1759 (The WP ULike \u2013 Most Advanced WordPress Marketing Toolkit plugin f ...)
+	TODO: check
+CVE-2024-1716 (The Admin Bar Remover plugin for WordPress is vulnerable to unauthoriz ...)
+	TODO: check
+CVE-2024-1688 (The Woo Total Sales plugin for WordPress is vulnerable to unauthorized ...)
+	TODO: check
+CVE-2024-1679 (The Print Labels with Barcodes. Create price tags, product labels, ord ...)
+	TODO: check
+CVE-2024-1678 (The Subway \u2013 Private Site Option plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2024-1677 (The Print Labels with Barcodes. Create price tags, product labels, ord ...)
+	TODO: check
+CVE-2024-1584 (The Analytify \u2013 Google Analytics Dashboard For WordPress (GA4 ana ...)
+	TODO: check
+CVE-2024-1572 (The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site S ...)
+	TODO: check
+CVE-2024-1567 (The Royal Elementor Addons and Templates plugin for WordPress is vulne ...)
+	TODO: check
+CVE-2024-1533 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2024-1416 (The Responsive Contact Form Builder & Lead Generation Plugin plugin fo ...)
+	TODO: check
+CVE-2024-1415 (The Responsive Contact Form Builder & Lead Generation Plugin plugin fo ...)
+	TODO: check
+CVE-2024-1396 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2024-1395 (Use After Free vulnerability in Arm Ltd Arm 5th Gen GPU Architecture K ...)
+	TODO: check
+CVE-2024-1386 (The MailerLite \u2013 Signup forms (official) plugin for WordPress is  ...)
+	TODO: check
+CVE-2024-1348 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2024-1173 (The WP ERP | Complete HR solution with recruitment & job listings | Wo ...)
+	TODO: check
+CVE-2024-1067 (Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm ...)
+	TODO: check
+CVE-2024-0908 (The Advanced Post Block \u2013 Display Posts, Pages, or Custom Posts o ...)
+	TODO: check
+CVE-2024-0848 (The AA Cash Calculator plugin for WordPress is vulnerable to Reflected ...)
+	TODO: check
+CVE-2024-0847 (The 5280 Bootstrap Modal Contact Form plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2024-0710 (The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modif ...)
+	TODO: check
+CVE-2024-0629 (The 2Checkout Payment Gateway for WooCommerce plugin for WordPress is  ...)
+	TODO: check
+CVE-2024-0615 (The Content Control \u2013 The Ultimate Content Restriction Plugin! Re ...)
+	TODO: check
+CVE-2024-0613 (The Delete Custom Fields plugin for WordPress is vulnerable to Cross-S ...)
+	TODO: check
+CVE-2023-7067 (The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +1 ...)
+	TODO: check
+CVE-2023-7064 (The Shortcodes and extra features for Phlox theme plugin for WordPress ...)
+	TODO: check
+CVE-2023-7030 (The Collapse-O-Matic plugin for WordPress is vulnerable to Stored Cros ...)
+	TODO: check
+CVE-2023-6962 (The WP Meta SEO plugin for WordPress is vulnerable to Sensitive Inform ...)
+	TODO: check
+CVE-2023-6961 (The WP Meta SEO plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2023-6731 (The WP Show Posts plugin for WordPress is vulnerable to unauthorized a ...)
+	TODO: check
+CVE-2023-6363 (Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm ...)
+	TODO: check
+CVE-2023-6214 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2023-51633 (Centreon sysName Cross-Site Scripting Remote Code Execution Vulnerabil ...)
+	TODO: check
+CVE-2023-51629 (D-Link DCS-8300LHV2 ONVIF Hardcoded PIN Authentication Bypass Vulnerab ...)
+	TODO: check
+CVE-2023-51628 (D-Link DCS-8300LHV2 ONVIF SetHostName Stack-Based Buffer Overflow Remo ...)
+	TODO: check
+CVE-2023-51627 (D-Link DCS-8300LHV2 ONVIF Duration Stack-Based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-51626 (D-Link DCS-8300LHV2 RTSP ValidateAuthorizationHeader Username Stack-Ba ...)
+	TODO: check
+CVE-2023-51625 (D-Link DCS-8300LHV2 ONVIF SetSystemDateAndTime Command Injection Remot ...)
+	TODO: check
+CVE-2023-51624 (D-Link DCS-8300LHV2 RTSP ValidateAuthorizationHeader Nonce Stack-Based ...)
+	TODO: check
+CVE-2023-51623 (D-Link DIR-X3260 prog.cgi SetAPClientSettings Stack-based Buffer Overf ...)
+	TODO: check
+CVE-2023-51622 (D-Link DIR-X3260 prog.cgi SetTriggerPPPoEValidate Stack-based Buffer O ...)
+	TODO: check
+CVE-2023-51621 (D-Link DIR-X3260 prog.cgi SetDeviceSettings Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-51620 (D-Link DIR-X3260 prog.cgi SetIPv6PppoeSettings Stack-based Buffer Over ...)
+	TODO: check
+CVE-2023-51619 (D-Link DIR-X3260 prog.cgi SetMyDLinkRegistration Stack-based Buffer Ov ...)
+	TODO: check
+CVE-2023-51618 (D-Link DIR-X3260 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Over ...)
+	TODO: check
+CVE-2023-51617 (D-Link DIR-X3260 prog.cgi SetWanSettings Stack-Based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-51616 (D-Link DIR-X3260 prog.cgi SetSysEmailSettings Stack-Based Buffer Overf ...)
+	TODO: check
+CVE-2023-51615 (D-Link DIR-X3260 prog.cgi SetQuickVPNSettings PSK Stack-Based Buffer O ...)
+	TODO: check
+CVE-2023-51614 (D-Link DIR-X3260 prog.cgi SetQuickVPNSettings Password Stack-Based Buf ...)
+	TODO: check
+CVE-2023-51613 (D-Link DIR-X3260 prog.cgi SetDynamicDNSSettings Stack-Based Buffer Ove ...)
+	TODO: check
+CVE-2023-51612 (Kofax Power PDF JP2 File Parsing Use-After-Free Information Disclosure ...)
+	TODO: check
+CVE-2023-51611 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-51610 (Kofax Power PDF JP2 File Parsing Use-After-Free Information Disclosure ...)
+	TODO: check
+CVE-2023-51609 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-51608 (Kofax Power PDF J2K File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-51607 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-51606 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Remote Code Execut ...)
+	TODO: check
+CVE-2023-51605 (Honeywell Saia PG5 Controls Suite XML External Entity Processing Infor ...)
+	TODO: check
+CVE-2023-51604 (Honeywell Saia PG5 Controls Suite XML External Entity Processing Infor ...)
+	TODO: check
+CVE-2023-51603 (Honeywell Saia PG5 Controls Suite CAB File Parsing Directory Traversal ...)
+	TODO: check
+CVE-2023-51602 (Honeywell Saia PG5 Controls Suite XML External Entity Processing Infor ...)
+	TODO: check
+CVE-2023-51601 (Honeywell Saia PG5 Controls Suite XML External Entity Processing Infor ...)
+	TODO: check
+CVE-2023-51600 (Honeywell Saia PG5 Controls Suite XML External Entity Processing Infor ...)
+	TODO: check
+CVE-2023-51599 (Honeywell Saia PG5 Controls Suite Directory Traversal Remote Code Exec ...)
+	TODO: check
+CVE-2023-51598 (Hancom Office Word DOC File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-51597 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-51596 (BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code ...)
+	TODO: check
+CVE-2023-51595 (Voltronic Power ViewPower Pro selectDeviceListBy SQL Injection Remote  ...)
+	TODO: check
+CVE-2023-51594 (BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerabi ...)
+	TODO: check
+CVE-2023-51593 (Voltronic Power ViewPower Pro Expression Language Injection Remote Cod ...)
+	TODO: check
+CVE-2023-51592 (BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Inform ...)
+	TODO: check
+CVE-2023-51591 (Voltronic Power ViewPower Pro doDocument XML External Entity Processin ...)
+	TODO: check
+CVE-2023-51590 (Voltronic Power ViewPower Pro UpLoadAction Unrestricted File Upload Re ...)
+	TODO: check
+CVE-2023-51589 (BlueZ Audio Profile AVRCP parse_media_element Out-Of-Bounds Read Infor ...)
+	TODO: check
+CVE-2023-51588 (Voltronic Power ViewPower Pro MySQL Use of Hard-coded Credentials Loca ...)
+	TODO: check
+CVE-2023-51587 (Voltronic Power ViewPower getModbusPassword Missing Authentication Inf ...)
+	TODO: check
+CVE-2023-51586 (Voltronic Power ViewPower Pro selectEventConfig SQL Injection Remote C ...)
+	TODO: check
+CVE-2023-51585 (Voltronic Power ViewPower USBCommEx shutdown Command Injection Remote  ...)
+	TODO: check
+CVE-2023-51584 (Voltronic Power ViewPower USBCommEx shutdown Exposed Dangerous Method  ...)
+	TODO: check
+CVE-2023-51583 (Voltronic Power ViewPower UpsScheduler Exposed Dangerous Method Remote ...)
+	TODO: check
+CVE-2023-51582 (Voltronic Power ViewPower LinuxMonitorConsole Exposed Dangerous Method ...)
+	TODO: check
+CVE-2023-51581 (Voltronic Power ViewPower MacMonitorConsole Exposed Dangerous Method R ...)
+	TODO: check
+CVE-2023-51580 (BlueZ Audio Profile AVRCP avrcp_parse_attribute_list Out-Of-Bounds Rea ...)
+	TODO: check
+CVE-2023-51579 (Voltronic Power ViewPower Incorrect Permission Assignment Local Privil ...)
+	TODO: check
+CVE-2023-51578 (Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Deni ...)
+	TODO: check
+CVE-2023-51577 (Voltronic Power ViewPower setShutdown Exposed Dangerous Method Local P ...)
+	TODO: check
+CVE-2023-51576 (Voltronic Power ViewPower Deserialization of Untrusted Data Remote Cod ...)
+	TODO: check
+CVE-2023-51575 (Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Remo ...)
+	TODO: check
+CVE-2023-51574 (Voltronic Power ViewPower updateManagerPassword Exposed Dangerous Meth ...)
+	TODO: check
+CVE-2023-51569 (Kofax Power PDF BMP File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-51568 (Kofax Power PDF OXPS File Parsing Use-After-Free Information Disclosur ...)
+	TODO: check
+CVE-2023-51567 (Kofax Power PDF OXPS File Parsing Out-Of-Bounds Read Information Discl ...)
+	TODO: check
+CVE-2023-51566 (Kofax Power PDF OXPS File Parsing Stack-based Buffer Overflow Remote C ...)
+	TODO: check
+CVE-2023-51565 (Kofax Power PDF XPS File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-51564 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-51563 (Kofax Power PDF XPS File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-51562 (Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-51561 (Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Discl ...)
+	TODO: check
+CVE-2023-51560 (Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-51559 (Foxit PDF Reader Doc Out-Of-Bounds Read Remote Code Execution Vulnerab ...)
+	TODO: check
+CVE-2023-51558 (Foxit PDF Reader AcroForm Doc Out-Of-Bounds Read Information Disclosur ...)
+	TODO: check
+CVE-2023-51557 (Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-51556 (Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-51555 (Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnera ...)
+	TODO: check
+CVE-2023-51554 (Foxit PDF Reader Signature Use-After-Free Information Disclosure Vulne ...)
+	TODO: check
+CVE-2023-51553 (Foxit PDF Reader Bookmark Out-Of-Bounds Read Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-51552 (Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-51551 (Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-51550 (Foxit PDF Reader combobox Out-Of-Bounds Read Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-51549 (Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execut ...)
+	TODO: check
+CVE-2023-50685 (An issue in Hipcam Cameras RealServer v.1.0 allows a remote attacker t ...)
+	TODO: check
+CVE-2023-50235 (Hancom Office Show PPT File Parsing Stack-based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-50234 (Hancom Office Cell XLS File Parsing Stack-based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-50233 (Inductive Automation Ignition getJavaExecutable Directory Traversal Re ...)
+	TODO: check
+CVE-2023-50232 (Inductive Automation Ignition getParams Argument Injection Remote Code ...)
+	TODO: check
+CVE-2023-50231 (NETGEAR ProSAFE Network Management System saveNodeLabel Cross-Site Scr ...)
+	TODO: check
+CVE-2023-50230 (BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code ...)
+	TODO: check
+CVE-2023-50229 (BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code ...)
+	TODO: check
+CVE-2023-50228 (Parallels Desktop Updater Improper Verification of Cryptographic Signa ...)
+	TODO: check
+CVE-2023-50227 (Parallels Desktop virtio-gpu Out-Of-Bounds Write Remote Code Execution ...)
+	TODO: check
+CVE-2023-50226 (Parallels Desktop Updater Link Following Local Privilege Escalation Vu ...)
+	TODO: check
+CVE-2023-50225 (TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-50224 (TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disc ...)
+	TODO: check
+CVE-2023-50223 (Inductive Automation Ignition ExtendedDocumentCodec Deserialization of ...)
+	TODO: check
+CVE-2023-50222 (Inductive Automation Ignition ResponseParser Notification Deserializat ...)
+	TODO: check
+CVE-2023-50221 (Inductive Automation Ignition ResponseParser SerializedResponse Deseri ...)
+	TODO: check
+CVE-2023-50220 (Inductive Automation Ignition Base64Element Deserialization of Untrust ...)
+	TODO: check
+CVE-2023-50219 (Inductive Automation Ignition RunQuery Deserialization of Untrusted Da ...)
+	TODO: check
+CVE-2023-50218 (Inductive Automation Ignition ModuleInvoke Deserialization of Untruste ...)
+	TODO: check
+CVE-2023-50217 (D-Link G416 awsfile rm Command Injection Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-50216 (D-Link G416 awsfile tar File Handling Command Injection Remote Code Ex ...)
+	TODO: check
+CVE-2023-50215 (D-Link G416 nodered gz File Handling Command Injection Remote Code Exe ...)
+	TODO: check
+CVE-2023-50214 (D-Link G416 nodered tar File Handling Command Injection Remote Code Ex ...)
+	TODO: check
+CVE-2023-50213 (D-Link G416 nodered File Handling Command Injection Remote Code Execut ...)
+	TODO: check
+CVE-2023-50212 (D-Link G416 httpd Improper Handling of Exceptional Conditions Informat ...)
+	TODO: check
+CVE-2023-50211 (D-Link G416 httpd API-AUTH Timestamp Processing Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-50210 (D-Link G416 httpd API-AUTH Digest Processing Stack-based Buffer Overfl ...)
+	TODO: check
+CVE-2023-50209 (D-Link G416 cfgsave Stack-Based Buffer Overflow Remote Code Execution  ...)
+	TODO: check
+CVE-2023-50208 (D-Link G416 ovpncfg Stack-based Buffer Overflow Remote Code Execution  ...)
+	TODO: check
+CVE-2023-50207 (D-Link G416 flupl filename Command Injection Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-50206 (D-Link G416 flupl query_type edit Command Injection Remote Code Execut ...)
+	TODO: check
+CVE-2023-50205 (D-Link G416 awsfile chmod Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-50204 (D-Link G416 flupl pythonapp Command Injection Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-50203 (D-Link G416 nodered chmod Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-50202 (D-Link G416 flupl pythonmodules Command Injection Remote Code Executio ...)
+	TODO: check
+CVE-2023-50201 (D-Link G416 cfgsave upusb Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-50200 (D-Link G416 cfgsave backusb Command Injection Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-50199 (D-Link G416 httpd Missing Authentication for Critical Function Remote  ...)
+	TODO: check
+CVE-2023-50198 (D-Link G416 cfgsave Command Injection Remote Code Execution Vulnerabil ...)
+	TODO: check
+CVE-2023-50197 (Intel Driver & Support Assistant Link Following Local Privilege Escala ...)
+	TODO: check
+CVE-2023-50196 (Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Ex ...)
+	TODO: check
+CVE-2023-50195 (Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Read Remote Cod ...)
+	TODO: check
+CVE-2023-50194 (Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Read Remote Cod ...)
+	TODO: check
+CVE-2023-50193 (Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Ex ...)
+	TODO: check
+CVE-2023-50192 (Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Ex ...)
+	TODO: check
+CVE-2023-50191 (Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Ex ...)
+	TODO: check
+CVE-2023-50190 (Trimble SketchUp Viewer SKP File Parsing Out-Of-Bounds Write Remote Co ...)
+	TODO: check
+CVE-2023-50189 (Trimble SketchUp Viewer SKP File Parsing Use-After-Free Remote Code Ex ...)
+	TODO: check
+CVE-2023-50188 (Trimble SketchUp Viewer SKP File Parsing Uninitialized Variable Remote ...)
+	TODO: check
+CVE-2023-50187 (Trimble SketchUp Viewer SKP File Parsing Memory Corruption Remote Code ...)
+	TODO: check
+CVE-2023-47727 (IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 and IBM QRadar S ...)
+	TODO: check
+CVE-2023-47220 (An OS command injection vulnerability has been reported to affect Medi ...)
+	TODO: check
+CVE-2023-44472 (Missing Authorization vulnerability in ThemeFuse Unyson.This issue aff ...)
+	TODO: check
+CVE-2023-44452 (Linux Mint Xreader CBT File Parsing Argument Injection Remote Code Exe ...)
+	TODO: check
+CVE-2023-44451 (Linux Mint Xreader EPUB File Parsing Directory Traversal Remote Code E ...)
+	TODO: check
+CVE-2023-44450 (NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch  ...)
+	TODO: check
+CVE-2023-44449 (NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injectio ...)
+	TODO: check
+CVE-2023-44448 (TP-Link Archer A54 libcmm.so dm_fillObjByStr Stack-based Buffer Overfl ...)
+	TODO: check
+CVE-2023-44447 (TP-Link TL-WR902AC loginFs Improper Authentication Information Disclos ...)
+	TODO: check
+CVE-2023-44445 (NETGEAR CAX30 SSO Stack-based Buffer Overflow Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-44440 (Ashlar-Vellum Lithium Uncontrolled Search Path Element Remote Code Exe ...)
+	TODO: check
+CVE-2023-44439 (Ashlar-Vellum Xenon Uncontrolled Search Path Element Remote Code Execu ...)
+	TODO: check
+CVE-2023-44438 (Ashlar-Vellum Argon Uncontrolled Search Path Element Remote Code Execu ...)
+	TODO: check
+CVE-2023-44437 (Ashlar-Vellum Cobalt Uncontrolled Search Path Element Remote Code Exec ...)
+	TODO: check
+CVE-2023-44436 (Kofax Power PDF File Parsing Use-After-Free Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-44435 (Kofax Power PDF File Parsing Use-After-Free Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-44434 (Kofax Power PDF File Parsing Out-Of-Bounds Read Information Disclosure ...)
+	TODO: check
+CVE-2023-44433 (Kofax Power PDF AcroForm Annotation Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-44432 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-44431 (BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Exec ...)
+	TODO: check
+CVE-2023-44430 (Bentley View SKP File Parsing Use-After-Free Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-44428 (MuseScore CAP File Parsing Heap-based Buffer Overflow Remote Code Exec ...)
+	TODO: check
+CVE-2023-44427 (D-Link DIR-X3260 SetSysEmailSettings SMTPServerAddress Command Injecti ...)
+	TODO: check
+CVE-2023-44426 (D-Link DIR-X3260 SetSysEmailSettings AccountPassword Command Injection ...)
+	TODO: check
+CVE-2023-44425 (D-Link DIR-X3260 SetSysEmailSettings AccountName Command Injection Rem ...)
+	TODO: check
+CVE-2023-44424 (D-Link DIR-X3260 SetSysEmailSettings EmailTo Command Injection Remote  ...)
+	TODO: check
+CVE-2023-44423 (D-Link DIR-X3260 SetTriggerPPPoEValidate Password Command Injection Re ...)
+	TODO: check
+CVE-2023-44422 (D-Link DIR-X3260 SetSysEmailSettings EmailFrom Command Injection Remot ...)
+	TODO: check
+CVE-2023-44421 (D-Link DIR-X3260 SetTriggerPPPoEValidate Username Command Injection Re ...)
+	TODO: check
+CVE-2023-44420 (D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication A ...)
+	TODO: check
+CVE-2023-44419 (D-Link DIR-X3260 Prog.cgi Stack-based Buffer Overflow Remote Code Exec ...)
+	TODO: check
+CVE-2023-44418 (D-Link DIR-X3260 Prog.cgi Heap-based Buffer Overflow Remote Code Execu ...)
+	TODO: check
+CVE-2023-44417 (D-Link DAP-2622 DDP Set IPv4 Address Auth Password Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-44416 (D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-44415 (D-Link Multiple Routers cli Command Injection Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-44414 (D-Link D-View coreservice_action_script Exposed Dangerous Function Rem ...)
+	TODO: check
+CVE-2023-44413 (D-Link D-View shutdown_coreserver Missing Authentication Denial-of-Ser ...)
+	TODO: check
+CVE-2023-44412 (D-Link D-View addDv7Probe XML External Entity Processing Information D ...)
+	TODO: check
+CVE-2023-44411 (D-Link D-View InstallApplication Use of Hard-coded Credentials Authent ...)
+	TODO: check
+CVE-2023-44410 (D-Link D-View showUsers Improper Authorization Privilege Escalation Vu ...)
+	TODO: check
+CVE-2023-44409 (D-Link DAP-1325 SetSetupWizardStatus Enabled Stack-based Buffer Overfl ...)
+	TODO: check
+CVE-2023-44408 (D-Link DAP-1325 SetAPLanSettings IPAddr Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-44407 (D-Link DAP-1325 SetAPLanSettings Gateway Stack-based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-44406 (D-Link DAP-1325 SetAPLanSettings DeviceName Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-44405 (D-Link DAP-1325 get_value_of_key Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-44404 (D-Link DAP-1325 get_value_from_app Stack-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-44403 (D-Link DAP-1325 HNAP SetWLanRadioSettings Channel Command Injection Re ...)
+	TODO: check
+CVE-2023-42131 (Ansys SpaceClaim X_B File Parsing Out-Of-Bounds Write Remote Code Exec ...)
+	TODO: check
+CVE-2023-42130 (A10 Thunder ADC FileMgmtExport Directory Traversal Arbitrary File Read ...)
+	TODO: check
+CVE-2023-42129 (A10 Thunder ADC ShowTechDownloadView Directory Traversal Information D ...)
+	TODO: check
+CVE-2023-42128 (Magnet Forensics AXIOM Command Injection Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-42127 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-42126 (G DATA Total Security GDBackupSvc Service Link Following Local Privile ...)
+	TODO: check
+CVE-2023-42125 (Avast Premium Security Sandbox Protection Link Following Privilege Esc ...)
+	TODO: check
+CVE-2023-42124 (Avast Premium Security Sandbox Protection Incorrect Authorization Priv ...)
+	TODO: check
+CVE-2023-42123 (Control Web Panel mysql_manager Command Injection Remote Code Executio ...)
+	TODO: check
+CVE-2023-42122 (Control Web Panel wloggui Command Injection Local Privilege Escalation ...)
+	TODO: check
+CVE-2023-42121 (Control Web Panel Missing Authentication Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-42120 (Control Web Panel dns_zone_editor Command Injection Remote Code Execut ...)
+	TODO: check
+CVE-2023-42113 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42112 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42111 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42110 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42109 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42108 (PDF-XChange Editor EMF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42107 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42106 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42105 (Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execut ...)
+	TODO: check
+CVE-2023-42104 (Ashlar-Vellum Cobalt AR File Parsing Use-After-Free Remote Code Execut ...)
+	TODO: check
+CVE-2023-42103 (Ashlar-Vellum Cobalt AR File Parsing Use-After-Free Remote Code Execut ...)
+	TODO: check
+CVE-2023-42102 (Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execut ...)
+	TODO: check
+CVE-2023-42101 (Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Read Remote Code Ex ...)
+	TODO: check
+CVE-2023-42100 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-42099 (Intel Driver & Support Assistant Link Following Local Privilege Escala ...)
+	TODO: check
+CVE-2023-42098 (Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vuln ...)
+	TODO: check
+CVE-2023-42097 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-42096 (Foxit PDF Reader PDF File Parsing Use-After-Free Remote Code Execution ...)
+	TODO: check
+CVE-2023-42095 (Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-42094 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-42093 (Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vuln ...)
+	TODO: check
+CVE-2023-42092 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-42091 (Foxit PDF Reader XFA Doc Object Use-After-Free Remote Code Execution V ...)
+	TODO: check
+CVE-2023-42090 (Foxit PDF Reader XFA Doc Object Out-Of-Bounds Read Information Disclos ...)
+	TODO: check
+CVE-2023-42089 (Foxit PDF Reader templates Use-After-Free Information Disclosure Vulne ...)
+	TODO: check
+CVE-2023-42088 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42087 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42086 (PDF-XChange Editor EMF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42085 (PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-42084 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42083 (PDF-XChange Editor JPG File Parsing Heap-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-42082 (PDF-XChange Editor JPG File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42081 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42080 (PDF-XChange Editor EMF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42079 (PDF-XChange Editor J2K File Parsing Uninitialized Variable Information ...)
+	TODO: check
+CVE-2023-42078 (PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Exec ...)
+	TODO: check
+CVE-2023-42077 (PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-42076 (PDF-XChange Editor PDF File Parsing Heap-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-42075 (PDF-XChange Editor JPG File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42074 (PDF-XChange Editor addScript Type Confusion Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-42073 (PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosur ...)
+	TODO: check
+CVE-2023-42072 (PDF-XChange Editor JPC File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42071 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-42070 (PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosur ...)
+	TODO: check
+CVE-2023-42069 (PDF-XChange Editor PDF File Parsing Stack-based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-42068 (PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42067 (PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42066 (PDF-XChange Editor J2K File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42065 (PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42064 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42063 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42062 (PDF-XChange Editor U3D File Parsing Uninitialized Variable Remote Code ...)
+	TODO: check
+CVE-2023-42061 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42060 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42059 (PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-42058 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42057 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42056 (PDF-XChange Editor U3D File Parsing Uninitialized Variable Information ...)
+	TODO: check
+CVE-2023-42055 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42054 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42053 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42052 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42051 (PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-42050 (PDF-XChange Editor EMF File Parsing Use-After-Free Information Disclos ...)
+	TODO: check
+CVE-2023-42049 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-42048 (PDF-XChange Editor J2K File Parsing Uninitialized Variable Information ...)
+	TODO: check
+CVE-2023-42047 (PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Exec ...)
+	TODO: check
+CVE-2023-42046 (PDF-XChange Editor J2K File Parsing Uninitialized Variable Information ...)
+	TODO: check
+CVE-2023-42045 (PDF-XChange Editor J2K File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42044 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-42043 (PDF-XChange Editor PDF File Parsing Memory Corruption Remote Code Exec ...)
+	TODO: check
+CVE-2023-42042 (PDF-XChange Editor App Object Out-Of-Bounds Read Remote Code Execution ...)
+	TODO: check
+CVE-2023-42041 (PDF-XChange Editor Annotation Use-After-Free Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-42040 (PDF-XChange Editor mailForm Use-After-Free Code Execution Vulnerabilit ...)
+	TODO: check
+CVE-2023-42039 (Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-42038 (Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-42037 (Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-42036 (Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-42035 (Visualware MyConnection Server doIForward XML External Entity Processi ...)
+	TODO: check
+CVE-2023-42034 (Visualware MyConnection Server doRTAAccessCTConfig Cross-Site Scriptin ...)
+	TODO: check
+CVE-2023-42033 (Visualware MyConnection Server doPostUploadfiles Directory Traversal R ...)
+	TODO: check
+CVE-2023-42032 (Visualware MyConnection Server doRTAAccessUPass Exposed Dangerous Meth ...)
+	TODO: check
+CVE-2023-41971 (An Improper Link Resolution Before File Access ('Link Following') vuln ...)
+	TODO: check
+CVE-2023-41970 (An Improper Validation of Integrity Check Value vulnerability in Zscal ...)
+	TODO: check
+CVE-2023-41830 (An improper absolute path traversal vulnerability was reported for the ...)
+	TODO: check
+CVE-2023-41828 (An implicit intent export vulnerability was reported in the Motorola P ...)
+	TODO: check
+CVE-2023-41826 (A PendingIntent hijacking vulnerability in Motorola Device Help (Genie ...)
+	TODO: check
+CVE-2023-41825 (A path traversal vulnerability was reported in the Motorola Ready For  ...)
+	TODO: check
+CVE-2023-41824 (An implicit intent vulnerability was reported in the Motorola Phone Ca ...)
+	TODO: check
+CVE-2023-41823 (An improper export vulnerability was reported in the Motorola Phone Ex ...)
+	TODO: check
+CVE-2023-41822 (An improper export vulnerability was reported in the Motorola Interfac ...)
+	TODO: check
+CVE-2023-41821 (A an improper export vulnerability was reported in the Motorola Setup  ...)
+	TODO: check
+CVE-2023-41820 (An implicit intent vulnerability was reported in the Motorola Ready Fo ...)
+	TODO: check
+CVE-2023-41819 (A PendingIntent hijacking vulnerability was reported in the Motorola F ...)
+	TODO: check
+CVE-2023-41818 (An improper use of the SD card for sensitive data vulnerability was re ...)
+	TODO: check
+CVE-2023-41817 (An improper export vulnerability was reported in the Motorola Phone Ca ...)
+	TODO: check
+CVE-2023-41816 (An improper export vulnerability was reported in the Motorola Services ...)
+	TODO: check
+CVE-2023-41230 (D-Link DIR-3040 HTTP Request Processing Referer Stack-Based Buffer Ove ...)
+	TODO: check
+CVE-2023-41229 (D-Link DIR-3040 HTTP Request Processing Referer Heap-Based Buffer Over ...)
+	TODO: check
+CVE-2023-41228 (D-Link DIR-3040 prog.cgi SetUsersSettings Stack-Based Buffer Overflow  ...)
+	TODO: check
+CVE-2023-41227 (D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Stack-Based Buffer Ov ...)
+	TODO: check
+CVE-2023-41226 (D-Link DIR-3040 prog.cgi SetMyDLinkRegistration Stack-Based Buffer Ove ...)
+	TODO: check
+CVE-2023-41225 (D-Link DIR-3040 prog.cgi SetIPv6PppoeSettings Stack-Based Buffer Overf ...)
+	TODO: check
+CVE-2023-41224 (D-Link DIR-3040 prog.cgi SetDeviceSettings Stack-Based Buffer Overflow ...)
+	TODO: check
+CVE-2023-41223 (D-Link DIR-3040 prog.cgi SetQuickVPNSettings PSK Stack-Based Buffer Ov ...)
+	TODO: check
+CVE-2023-41222 (D-Link DIR-3040 prog.cgi SetWan2Settings Stack-Based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-41221 (D-Link DIR-3040 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Overf ...)
+	TODO: check
+CVE-2023-41220 (D-Link DIR-3040 prog.cgi SetSysEmailSettings Stack-Based Buffer Overfl ...)
+	TODO: check
+CVE-2023-41219 (D-Link DIR-3040 prog.cgi SetWanSettings Stack-Based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-41218 (D-Link DIR-3040 prog.cgi SetWan3Settings Stack-Based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-41217 (D-Link DIR-3040 prog.cgi SetQuickVPNSettings Password Stack-Based Buff ...)
+	TODO: check
+CVE-2023-41216 (D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Stack-Based Buffer Over ...)
+	TODO: check
+CVE-2023-41215 (D-Link DAP-2622 DDP Set Date-Time Stack-based Buffer Overflow Remote C ...)
+	TODO: check
+CVE-2023-41214 (D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer ...)
+	TODO: check
+CVE-2023-41213 (D-Link DAP-1325 setDhcpAssignRangeUpdate lan_ipaddr Stack-based Buffer ...)
+	TODO: check
+CVE-2023-41212 (D-Link DAP-1325 SetTriggerAPValidate Key Stack-based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-41211 (D-Link DAP-1325 SetHostIPv6StaticSettings StaticPrefixLength Stack-bas ...)
+	TODO: check
+CVE-2023-41210 (D-Link DAP-1325 SetHostIPv6StaticSettings StaticDNS2 Stack-based Buffe ...)
+	TODO: check
+CVE-2023-41209 (D-Link DAP-1325 SetHostIPv6StaticSettings StaticDNS1 Stack-based Buffe ...)
+	TODO: check
+CVE-2023-41208 (D-Link DAP-1325 SetHostIPv6StaticSettings StaticDefaultGateway Stack-b ...)
+	TODO: check
+CVE-2023-41207 (D-Link DAP-1325 SetHostIPv6StaticSettings StaticAddress Stack-based Bu ...)
+	TODO: check
+CVE-2023-41206 (D-Link DAP-1325 SetHostIPv6Settings IPv6Mode Stack-based Buffer Overfl ...)
+	TODO: check
+CVE-2023-41205 (D-Link DAP-1325 SetAPLanSettings SubnetMask Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-41204 (D-Link DAP-1325 SetAPLanSettings SecondaryDNS Stack-based Buffer Overf ...)
+	TODO: check
+CVE-2023-41203 (D-Link DAP-1325 SetAPLanSettings PrimaryDNS Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-41202 (D-Link DAP-1325 SetAPLanSettings Mode Stack-based Buffer Overflow Remo ...)
+	TODO: check
+CVE-2023-41201 (D-Link DAP-1325 HNAP SetSetupWizardStatus Enabled Command Injection Re ...)
+	TODO: check
+CVE-2023-41200 (D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticPrefixLength Comm ...)
+	TODO: check
+CVE-2023-41199 (D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticDNS2 Command Inje ...)
+	TODO: check
+CVE-2023-41198 (D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticDNS1 Command Inje ...)
+	TODO: check
+CVE-2023-41197 (D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticDefaultGateway Co ...)
+	TODO: check
+CVE-2023-41196 (D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticAddress Command I ...)
+	TODO: check
+CVE-2023-41195 (D-Link DAP-1325 HNAP SetHostIPv6Settings IPv6Mode Command Injection Re ...)
+	TODO: check
+CVE-2023-41194 (D-Link DAP-1325 HNAP SetAPLanSettings SubnetMask Command Injection Rem ...)
+	TODO: check
+CVE-2023-41193 (D-Link DAP-1325 HNAP SetAPLanSettings SecondaryDNS Command Injection R ...)
+	TODO: check
+CVE-2023-41192 (D-Link DAP-1325 HNAP SetAPLanSettings PrimaryDNS Command Injection Rem ...)
+	TODO: check
+CVE-2023-41191 (D-Link DAP-1325 HNAP SetAPLanSettings Mode Command Injection Remote Co ...)
+	TODO: check
+CVE-2023-41190 (D-Link DAP-1325 HNAP SetAPLanSettings IPAddr Command Injection Remote  ...)
+	TODO: check
+CVE-2023-41189 (D-Link DAP-1325 HNAP SetAPLanSettings Gateway Command Injection Remote ...)
+	TODO: check
+CVE-2023-41188 (D-Link DAP-1325 HNAP SetAPLanSettings DeviceName Command Injection Rem ...)
+	TODO: check
+CVE-2023-41187 (D-Link DAP-1325 HNAP Missing Authentication Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-41186 (D-Link DAP-1325 CGI Missing Authentication Information Disclosure Vuln ...)
+	TODO: check
+CVE-2023-41185 (Unified Automation UaGateway Certificate Parsing Integer Overflow Deni ...)
+	TODO: check
+CVE-2023-41184 (TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code  ...)
+	TODO: check
+CVE-2023-41183 (NETGEAR Orbi 760 SOAP API Authentication Bypass Vulnerability. This vu ...)
+	TODO: check
+CVE-2023-41182 (NETGEAR ProSAFE Network Management System ZipUtils Directory Traversal ...)
+	TODO: check
+CVE-2023-41181 (LG SuperSign Media Editor getSubFolderList Directory Traversal Informa ...)
+	TODO: check
+CVE-2023-40696 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 uses weaker than expe ...)
+	TODO: check
+CVE-2023-40695 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 does not invalidate s ...)
+	TODO: check
+CVE-2023-40517 (LG SuperSign Media Editor ContentRestController getObject Directory Tr ...)
+	TODO: check
+CVE-2023-40516 (LG Simple Editor Incorrect Permission Assignment Local Privilege Escal ...)
+	TODO: check
+CVE-2023-40515 (LG Simple Editor joinAddUser Improper Input Validation Denial-of-Servi ...)
+	TODO: check
+CVE-2023-40514 (LG Simple Editor FileManagerController getImageByFilename Directory Tr ...)
+	TODO: check
+CVE-2023-40513 (LG Simple Editor UserManageController getImageByFilename Directory Tra ...)
+	TODO: check
+CVE-2023-40512 (LG Simple Editor PlayerController getImageByFilename Directory Travers ...)
+	TODO: check
+CVE-2023-40511 (LG Simple Editor checkServer Authentication Bypass Vulnerability. This ...)
+	TODO: check
+CVE-2023-40510 (LG Simple Editor getServerSetting Authentication Bypass Vulnerability. ...)
+	TODO: check
+CVE-2023-40509 (LG Simple Editor deleteCanvas Directory Traversal Arbitrary File Delet ...)
+	TODO: check
+CVE-2023-40508 (LG Simple Editor putCanvasDB Directory Traversal Arbitrary File Deleti ...)
+	TODO: check
+CVE-2023-40507 (LG Simple Editor copyContent XML External Entity Processing Informatio ...)
+	TODO: check
+CVE-2023-40506 (LG Simple Editor copyContent XML External Entity Processing Informatio ...)
+	TODO: check
+CVE-2023-40505 (LG Simple Editor createThumbnailByMovie Command Injection Remote Code  ...)
+	TODO: check
+CVE-2023-40504 (LG Simple Editor readVideoInfo Command Injection Remote Code Execution ...)
+	TODO: check
+CVE-2023-40503 (LG Simple Editor saveXmlFile XML External Entity Processing Informatio ...)
+	TODO: check
+CVE-2023-40502 (LG Simple Editor cropImage Directory Traversal Arbitrary File Deletion ...)
+	TODO: check
+CVE-2023-40501 (LG Simple Editor copyContent Exposed Dangerous Function Remote Code Ex ...)
+	TODO: check
+CVE-2023-40500 (LG Simple Editor copyContent Exposed Dangerous Function Remote Code Ex ...)
+	TODO: check
+CVE-2023-40499 (LG Simple Editor mkdir Directory Traversal Arbitrary File Deletion Vul ...)
+	TODO: check
+CVE-2023-40498 (LG Simple Editor cp Command Directory Traversal Remote Code Execution  ...)
+	TODO: check
+CVE-2023-40497 (LG Simple Editor saveXml Directory Traversal Remote Code Execution Vul ...)
+	TODO: check
+CVE-2023-40496 (LG Simple Editor copyStickerContent Directory Traversal Information Di ...)
+	TODO: check
+CVE-2023-40495 (LG Simple Editor copyTemplateAll Directory Traversal Information Discl ...)
+	TODO: check
+CVE-2023-40494 (LG Simple Editor deleteFolder Directory Traversal Arbitrary File Delet ...)
+	TODO: check
+CVE-2023-40493 (LG Simple Editor copySessionFolder Directory Traversal Remote Code Exe ...)
+	TODO: check
+CVE-2023-40492 (LG Simple Editor deleteCheckSession Directory Traversal Arbitrary File ...)
+	TODO: check
+CVE-2023-40491 (Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-40489 (Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-40488 (Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-40487 (Maxon Cinema 4D SKP File Parsing Use-After-Free Remote Code Execution  ...)
+	TODO: check
+CVE-2023-40486 (Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-40485 (Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-40484 (Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-40483 (Maxon Cinema 4D SKP File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-40482 (Maxon Cinema 4D SKP File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-40480 (NETGEAR RAX30 DHCP Server Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-40479 (NETGEAR RAX30 UPnP Command Injection Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2023-40478 (NETGEAR RAX30 Telnet CLI passwd Stack-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-40473 (PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosur ...)
+	TODO: check
+CVE-2023-40472 (PDF-XChange Editor JavaScript String Untrusted Pointer Dereference Rem ...)
+	TODO: check
+CVE-2023-40471 (PDF-XChange Editor App Untrusted Pointer Dereference Remote Code Execu ...)
+	TODO: check
+CVE-2023-40470 (PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-40469 (PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-40468 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-39506 (PDF-XChange Editor createDataObject Directory Traversal Remote Code Ex ...)
+	TODO: check
+CVE-2023-39505 (PDF-XChange Editor Net.HTTP.requests Exposed Dangerous Function Inform ...)
+	TODO: check
+CVE-2023-39504 (PDF-XChange Editor OXPS File Parsing Out-Of-Bounds Read Information Di ...)
+	TODO: check
+CVE-2023-39503 (PDF-XChange Editor OXPS File Parsing Out-Of-Bounds Read Information Di ...)
+	TODO: check
+CVE-2023-39502 (PDF-XChange Editor OXPS File Parsing Out-Of-Bounds Write Remote Code E ...)
+	TODO: check
+CVE-2023-39501 (PDF-XChange Editor OXPS File Parsing Untrusted Pointer Dereference Rem ...)
+	TODO: check
+CVE-2023-39500 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39499 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39498 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39497 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39496 (PDF-XChange Editor TIF File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-39495 (PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Infor ...)
+	TODO: check
+CVE-2023-39494 (PDF-XChange Editor OXPS File Parsing Heap-based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-39493 (PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code E ...)
+	TODO: check
+CVE-2023-39492 (PDF-XChange Editor PDF File Parsing Heap-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-39491 (PDF-XChange Editor TIF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-39490 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39489 (PDF-XChange Editor TIF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39488 (PDF-XChange Editor TIF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-39487 (PDF-XChange Editor util Out-Of-Bounds Read Information Disclosure Vuln ...)
+	TODO: check
+CVE-2023-39486 (PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Exec ...)
+	TODO: check
+CVE-2023-39485 (PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-39484 (PDF-XChange Editor PDF File Parsing Uninitialized Variable Information ...)
+	TODO: check
+CVE-2023-39483 (PDF-XChange Editor J2K File Parsing Out-Of-Bounds Read Information Dis ...)
+	TODO: check
+CVE-2023-39482 (Softing Secure Integration Server Hardcoded Cryptographic Key Informat ...)
+	TODO: check
+CVE-2023-39481 (Softing Secure Integration Server Interpretation Conflict Remote Code  ...)
+	TODO: check
+CVE-2023-39480 (Softing Secure Integration Server FileDirectory OPC UA Object Arbitrar ...)
+	TODO: check
+CVE-2023-39479 (Softing Secure Integration Server OPC UA Gateway Directory Creation Vu ...)
+	TODO: check
+CVE-2023-39478 (Softing Secure Integration Server Exposure of Resource to Wrong Sphere ...)
+	TODO: check
+CVE-2023-39477 (Inductive Automation Ignition ConditionRefresh Resource Exhaustion Den ...)
+	TODO: check
+CVE-2023-39476 (Inductive Automation Ignition JavaSerializationCodec Deserialization o ...)
+	TODO: check
+CVE-2023-39475 (Inductive Automation Ignition ParameterVersionJavaSerializationCodec D ...)
+	TODO: check
+CVE-2023-39474 (Inductive Automation Ignition downloadLaunchClientJar Remote Code Exec ...)
+	TODO: check
+CVE-2023-39473 (Inductive Automation Ignition AbstractGatewayFunction Deserialization  ...)
+	TODO: check
+CVE-2023-39472 (Inductive Automation Ignition SimpleXMLReader XML External Entity Proc ...)
+	TODO: check
+CVE-2023-39471 (TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-39469 (PaperCut NG External User Lookup Code Injection Remote Code Execution  ...)
+	TODO: check
+CVE-2023-39468 (Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset  ...)
+	TODO: check
+CVE-2023-39467 (Triangle MicroWorks SCADA Data Gateway certificate Information Disclos ...)
+	TODO: check
+CVE-2023-39466 (Triangle MicroWorks SCADA Data Gateway get_config Missing Authenticati ...)
+	TODO: check
+CVE-2023-39465 (Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Cryptograhic  ...)
+	TODO: check
+CVE-2023-39464 (Triangle MicroWorks SCADA Data Gateway GTWWebMonitorService Unquoted S ...)
+	TODO: check
+CVE-2023-39463 (Triangle MicroWorks SCADA Data Gateway Trusted Certification Unrestric ...)
+	TODO: check
+CVE-2023-39462 (Triangle MicroWorks SCADA Data Gateway Workspace Unrestricted Upload V ...)
+	TODO: check
+CVE-2023-39461 (Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutr ...)
+	TODO: check
+CVE-2023-39460 (Triangle MicroWorks SCADA Data Gateway Event Log Directory Traversal A ...)
+	TODO: check
+CVE-2023-39459 (Triangle MicroWorks SCADA Data Gateway Directory Traversal Arbitrary F ...)
+	TODO: check
+CVE-2023-39458 (Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials A ...)
+	TODO: check
+CVE-2023-39457 (Triangle MicroWorks SCADA Data Gateway Missing Authentication Vulnerab ...)
+	TODO: check
+CVE-2023-38724 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to SQL  ...)
+	TODO: check
+CVE-2023-38125 (Softing edgeAggregator Permissive Cross-domain Policy with Untrusted D ...)
+	TODO: check
+CVE-2023-38124 (Inductive Automation Ignition OPC UA Quick Client Task Scheduling Expo ...)
+	TODO: check
+CVE-2023-38123 (Inductive Automation Ignition OPC UA Quick Client Missing Authenticati ...)
+	TODO: check
+CVE-2023-38122 (Inductive Automation Ignition OPC UA Quick Client Permissive Cross-dom ...)
+	TODO: check
+CVE-2023-38121 (Inductive Automation Ignition OPC UA Quick Client Cross-Site Scripting ...)
+	TODO: check
+CVE-2023-38120 (Adtran SR400ac ping Command Injection Remote Code Execution Vulnerabil ...)
+	TODO: check
+CVE-2023-38119 (Foxit PDF Reader AcroForm signature Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-38118 (Foxit PDF Reader AcroForm Doc Object Out-Of-Bounds Write Remote Code E ...)
+	TODO: check
+CVE-2023-38117 (Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execut ...)
+	TODO: check
+CVE-2023-38116 (Foxit PDF Reader Doc Object Out-Of-Bounds Read Information Disclosure  ...)
+	TODO: check
+CVE-2023-38115 (Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-38114 (Foxit PDF Reader AcroForm Doc Object Use-After-Free Remote Code Execut ...)
+	TODO: check
+CVE-2023-38113 (Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vuln ...)
+	TODO: check
+CVE-2023-38112 (Foxit PDF Reader XFA Annotation Use-After-Free Remote Code Execution V ...)
+	TODO: check
+CVE-2023-38111 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-38110 (Foxit PDF Reader AcroForm Doc Object Out-Of-Bounds Read Information Di ...)
+	TODO: check
+CVE-2023-38109 (Foxit PDF Reader Doc Object Out-Of-Bounds Read Information Disclosure  ...)
+	TODO: check
+CVE-2023-38108 (Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Discl ...)
+	TODO: check
+CVE-2023-38107 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-38106 (Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Discl ...)
+	TODO: check
+CVE-2023-38105 (Foxit PDF Reader PDF File Parsing Out-Of-Bounds Read Information Discl ...)
+	TODO: check
+CVE-2023-38102 (NETGEAR ProSAFE Network Management System createUser Missing Authoriza ...)
+	TODO: check
+CVE-2023-38101 (NETGEAR ProSAFE Network Management System SettingConfigController Expo ...)
+	TODO: check
+CVE-2023-38100 (NETGEAR ProSAFE Network Management System clearAlertByIds SQL Injectio ...)
+	TODO: check
+CVE-2023-38099 (NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch  ...)
+	TODO: check
+CVE-2023-38098 (NETGEAR ProSAFE Network Management System UpLoadServlet Unrestricted F ...)
+	TODO: check
+CVE-2023-38097 (NETGEAR ProSAFE Network Management System BkreProcessThread Exposed Da ...)
+	TODO: check
+CVE-2023-38096 (NETGEAR ProSAFE Network Management System MyHandlerInterceptor Authent ...)
+	TODO: check
+CVE-2023-38095 (NETGEAR ProSAFE Network Management System MFileUploadController Unrest ...)
+	TODO: check
+CVE-2023-38094 (Kofax Power PDF replacePages Stack-based Buffer Overflow Remote Code E ...)
+	TODO: check
+CVE-2023-38093 (Kofax Power PDF saveAs Stack-based Buffer Overflow Remote Code Executi ...)
+	TODO: check
+CVE-2023-38092 (Kofax Power PDF importDataObject Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-38091 (Kofax Power PDF response Type Confusion Remote Code Execution Vulnerab ...)
+	TODO: check
+CVE-2023-38090 (Kofax Power PDF popUpMenu Heap-based Buffer Overflow Remote Code Execu ...)
+	TODO: check
+CVE-2023-38089 (Kofax Power PDF clearInterval Out-Of-Bounds Write Remote Code Executio ...)
+	TODO: check
+CVE-2023-38088 (Kofax Power PDF printf Uninitialized Variable Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-38087 (Kofax Power PDF clearTimeOut Out-Of-Bounds Write Remote Code Execution ...)
+	TODO: check
+CVE-2023-38086 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-38085 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-38084 (Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-38083 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-38082 (Kofax Power PDF GIF File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-38081 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-38080 (Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-38079 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-38078 (Kofax Power PDF U3D File Parsing Use-After-Free Information Disclosure ...)
+	TODO: check
+CVE-2023-38077 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37407 (IBM Aspera Orchestrator 4.0.1 could allow a remote authenticated attac ...)
+	TODO: check
+CVE-2023-37359 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37358 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37357 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37356 (Kofax Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37355 (Kofax Power PDF JPG File Parsing Use-After-Free Information Disclosure ...)
+	TODO: check
+CVE-2023-37354 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Remote Code Execut ...)
+	TODO: check
+CVE-2023-37353 (Kofax Power PDF JPG File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37352 (Kofax Power PDF JPG File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37351 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2023-37350 (Kofax Power PDF TIF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37349 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37348 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37347 (Kofax Power PDF U3D File Parsing Out-Of-Bounds Read Remote Code Execut ...)
+	TODO: check
+CVE-2023-37346 (Kofax Power PDF TIF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37345 (Kofax Power PDF J2K File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37344 (Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-37343 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37342 (Kofax Power PDF PNG File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-37341 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37340 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37339 (Kofax Power PDF PCX File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37338 (Kofax Power PDF GIF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37337 (Kofax Power PDF JP2 File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37336 (Kofax Power PDF TIF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37335 (Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-37334 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2023-37333 (Kofax Power PDF PCX File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-37332 (Kofax Power PDF PNG File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2023-37331 (Kofax Power PDF GIF File Parsing Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-37330 (Kofax Power PDF exportAsText Exposed Dangerous Method Remote Code Exec ...)
+	TODO: check
+CVE-2023-37326 (D-Link DAP-2622 DDP Set Wireless Info Auth Password Stack-based Buffer ...)
+	TODO: check
+CVE-2023-37324 (D-Link DAP-2622 DDP Set Wireless Info Auth Username Stack-based Buffer ...)
+	TODO: check
+CVE-2023-37323 (D-Link DAP-2622 DDP Set SSID List PSK Stack-based Buffer Overflow Remo ...)
+	TODO: check
+CVE-2023-37322 (D-Link DAP-2622 DDP Set SSID List RADIUS Server Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-37321 (D-Link DAP-2622 DDP Set SSID List RADIUS Secret Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-37320 (D-Link DAP-2622 DDP Set SSID List SSID Name Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-37319 (D-Link DAP-2622 DDP Set IPv6 Address Stack-based Buffer Overflow Remot ...)
+	TODO: check
+CVE-2023-37318 (D-Link DAP-2622 DDP Set IPv6 Address Secondary DNS Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-37317 (D-Link DAP-2622 DDP Set IPv6 Address Primary DNS Stack-based Buffer Ov ...)
+	TODO: check
+CVE-2023-37316 (D-Link DAP-2622 DDP Set IPv6 Address Default Gateway Stack-based Buffe ...)
+	TODO: check
+CVE-2023-37315 (D-Link DAP-2622 DDP Set IPv6 Address Auth Password Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-37314 (D-Link DAP-2622 DDP Set IPv6 Address Auth Username Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-37313 (D-Link DAP-2622 DDP Set IPv4 Address Auth Username Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-37312 (D-Link DAP-2622 DDP Set Device Info Device Name Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-37311 (D-Link DAP-2622 DDP Set Device Info Auth Password Stack-based Buffer O ...)
+	TODO: check
+CVE-2023-37310 (D-Link DAP-2622 DDP Set Device Info Auth Username Stack-based Buffer O ...)
+	TODO: check
+CVE-2023-37244 (The affected AutomationManager.AgentService.exe application contains a ...)
+	TODO: check
+CVE-2023-35756 (D-Link DAP-2622 DDP Set Date-Time Auth Password Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-35755 (D-Link DAP-2622 DDP Set Date-Time Auth Username Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-35754 (D-Link DAP-2622 DDP Set AG Profile NMS URL Stack-based Buffer Overflow ...)
+	TODO: check
+CVE-2023-35753 (D-Link DAP-2622 DDP Set AG Profile UUID Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-35752 (D-Link DAP-2622 DDP Set AG Profile Auth Password Stack-based Buffer Ov ...)
+	TODO: check
+CVE-2023-35751 (D-Link DAP-2622 DDP Set AG Profile Auth Username Stack-based Buffer Ov ...)
+	TODO: check
+CVE-2023-35750 (D-Link DAP-2622 DDP Get SSID List WPA PSK Information Disclosure Vulne ...)
+	TODO: check
+CVE-2023-35747 (D-Link DAP-2622 DDP Firmware Upgrade Auth Password Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-35746 (D-Link DAP-2622 DDP Firmware Upgrade Auth Username Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-35745 (D-Link DAP-2622 DDP Configuration Restore Filename Stack-based Buffer  ...)
+	TODO: check
+CVE-2023-35744 (D-Link DAP-2622 DDP Configuration Restore Server IPv6 Address Stack-ba ...)
+	TODO: check
+CVE-2023-35743 (D-Link DAP-2622 DDP Configuration Restore Auth Password Stack-based Bu ...)
+	TODO: check
+CVE-2023-35742 (D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Bu ...)
+	TODO: check
+CVE-2023-35741 (D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer O ...)
+	TODO: check
+CVE-2023-35740 (D-Link DAP-2622 DDP Configuration Backup Server Address Stack-based Bu ...)
+	TODO: check
+CVE-2023-35739 (D-Link DAP-2622 DDP Configuration Backup Server IPv6 Address Stack-bas ...)
+	TODO: check
+CVE-2023-35738 (D-Link DAP-2622 DDP Configuration Backup Auth Password Stack-based Buf ...)
+	TODO: check
+CVE-2023-35737 (D-Link DAP-2622 DDP Configuration Backup Auth Username Stack-based Buf ...)
+	TODO: check
+CVE-2023-35736 (D-Link DAP-2622 DDP Change ID Password New Password Stack-based Buffer ...)
+	TODO: check
+CVE-2023-35735 (D-Link DAP-2622 DDP Change ID Password New Username Stack-based Buffer ...)
+	TODO: check
+CVE-2023-35734 (Sante DICOM Viewer Pro DCM File Parsing Use-After-Free Information Dis ...)
+	TODO: check
+CVE-2023-35733 (D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffe ...)
+	TODO: check
+CVE-2023-35732 (D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-35731 (D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Ove ...)
+	TODO: check
+CVE-2023-35730 (D-Link DAP-2622 DDP Reset Auth Password Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-35729 (D-Link DAP-2622 DDP Reset Auth Username Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-35728 (D-Link DAP-2622 DDP Reboot Auth Password Stack-based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-35727 (D-Link DAP-2622 DDP Reboot Auth Username Stack-based Buffer Overflow R ...)
+	TODO: check
+CVE-2023-35726 (D-Link DAP-2622 DDP User Verification Auth Password Stack-based Buffer ...)
+	TODO: check
+CVE-2023-35725 (D-Link DAP-2622 DDP User Verification Auth Username Stack-based Buffer ...)
+	TODO: check
+CVE-2023-35724 (D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication ...)
+	TODO: check
+CVE-2023-35723 (D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Exe ...)
+	TODO: check
+CVE-2023-35722 (NETGEAR RAX30 UPnP Command Injection Remote Code Execution Vulnerabili ...)
+	TODO: check
+CVE-2023-35721 (NETGEAR Multiple Routers curl_post Improper Certificate Validation Rem ...)
+	TODO: check
+CVE-2023-35720 (ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclos ...)
+	TODO: check
+CVE-2023-35718 (D-Link DAP-2622 DDP Change ID Password Auth Password Stack-based Buffe ...)
+	TODO: check
+CVE-2023-35717 (TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerabilit ...)
+	TODO: check
+CVE-2023-35716 (Ashlar-Vellum Cobalt AR File Parsing Out-Of-Bounds Read Remote Code Ex ...)
+	TODO: check
+CVE-2023-35715 (Ashlar-Vellum Cobalt AR File Parsing Uninitialized Memory Remote Code  ...)
+	TODO: check
+CVE-2023-35714 (Ashlar-Vellum Cobalt IGS File Parsing Out-Of-Bounds Read Remote Code E ...)
+	TODO: check
+CVE-2023-35713 (Ashlar-Vellum Cobalt XE File Parsing Uninitialized Memory Remote Code  ...)
+	TODO: check
+CVE-2023-35712 (Ashlar-Vellum Cobalt XE File Parsing Uninitialized Memory Remote Code  ...)
+	TODO: check
+CVE-2023-35711 (Ashlar-Vellum Cobalt XE File Parsing Untrusted Pointer Dereference Rem ...)
+	TODO: check
+CVE-2023-35710 (Ashlar-Vellum Cobalt Stack-based Buffer Overflow Remote Code Execution ...)
+	TODO: check
+CVE-2023-35709 (Ashlar-Vellum Cobalt Heap-based Buffer Overflow Remote Code Execution  ...)
+	TODO: check
+CVE-2023-35701 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2023-34311 (Ashlar-Vellum Cobalt Untrusted Pointer Dereference Remote Code Executi ...)
+	TODO: check
+CVE-2023-34310 (Ashlar-Vellum Cobalt Uninitialized Memory Remote Code Execution Vulner ...)
+	TODO: check
+CVE-2023-34309 (Ashlar-Vellum Cobalt Untrusted Pointer Dereference Remote Code Executi ...)
+	TODO: check
+CVE-2023-34308 (Ashlar-Vellum Graphite VC6 File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-34307 (Ashlar-Vellum Graphite VC6 File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-34306 (Ashlar-Vellum Graphite VC6 File Parsing Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-34305 (Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-34304 (Ashlar-Vellum Cobalt Out-Of-Bounds Access Remote Code Execution Vulner ...)
+	TODO: check
+CVE-2023-34303 (Ashlar-Vellum Cobalt Out-Of-Bounds Read Remote Code Execution Vulnerab ...)
+	TODO: check
+CVE-2023-34302 (Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remot ...)
+	TODO: check
+CVE-2023-34301 (Ashlar-Vellum Cobalt CO File Parsing Untrusted Pointer Dereference Rem ...)
+	TODO: check
+CVE-2023-34300 (Ashlar-Vellum Cobalt XE File Parsing Untrusted Pointer Dereference Rem ...)
+	TODO: check
+CVE-2023-34299 (Ashlar-Vellum Cobalt CO File Parsing Heap-based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-34298 (Pulse Secure Client SetupService Directory Traversal Local Privilege E ...)
+	TODO: check
+CVE-2023-34297 (Sante DICOM Viewer Pro JP2 File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-34296 (Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-34295 (Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-34294 (Sante DICOM Viewer Pro DCM File Parsing Use-After-Free Information Dis ...)
+	TODO: check
+CVE-2023-34293 (Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-34292 (Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-34291 (Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-34290 (Ashlar-Vellum Cobalt Out-Of-Bounds Write Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-34289 (Ashlar-Vellum Cobalt Heap-based Buffer Overflow Remote Code Execution  ...)
+	TODO: check
+CVE-2023-34288 (Ashlar-Vellum Cobalt XE File Parsing Uninitialized Pointer Remote Code ...)
+	TODO: check
+CVE-2023-34287 (Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remot ...)
+	TODO: check
+CVE-2023-34286 (Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code E ...)
+	TODO: check
+CVE-2023-34285 (NETGEAR RAX30 cmsCli_authenticate Stack-based Buffer Overflow Remote C ...)
+	TODO: check
+CVE-2023-34284 (NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vuln ...)
+	TODO: check
+CVE-2023-34283 (NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerab ...)
+	TODO: check
+CVE-2023-34282 (D-Link DIR-2150 HNAP Incorrect Implementation of Authentication Algori ...)
+	TODO: check
+CVE-2023-34281 (D-Link DIR-2150 GetFirmwareStatus Target Command Injection Remote Code ...)
+	TODO: check
+CVE-2023-34280 (D-Link DIR-2150 SetSysEmailSettings EmailTo Command Injection Remote C ...)
+	TODO: check
+CVE-2023-34279 (D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code ...)
+	TODO: check
+CVE-2023-34278 (D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote ...)
+	TODO: check
+CVE-2023-34277 (D-Link DIR-2150 SetSysEmailSettings AccountName Command Injection Remo ...)
+	TODO: check
+CVE-2023-34276 (D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Rem ...)
+	TODO: check
+CVE-2023-34275 (D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Exe ...)
+	TODO: check
+CVE-2023-34274 (D-Link DIR-2150 LoginPassword Incorrect Implementation of Authenticati ...)
+	TODO: check
+CVE-2023-34273 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34272 (Fatek Automation FvDesigner FPJ File Parsing Uninitialized Pointer Rem ...)
+	TODO: check
+CVE-2023-34271 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34270 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34269 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34268 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34267 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34266 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34265 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34264 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-34263 (Fatek Automation FvDesigner FPJ File Parsing Uninitialized Pointer Rem ...)
+	TODO: check
+CVE-2023-34262 (Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remot ...)
+	TODO: check
+CVE-2023-32179 (VIPRE Antivirus Plus FPQuarTransfer Link Following Local Privilege Esc ...)
+	TODO: check
+CVE-2023-32178 (VIPRE Antivirus Plus TelFileTransfer Link Following Local Privilege Es ...)
+	TODO: check
+CVE-2023-32177 (VIPRE Antivirus Plus DeleteHistoryFile Directory Traversal Local Privi ...)
+	TODO: check
+CVE-2023-32176 (VIPRE Antivirus Plus SetPrivateConfig Directory Traversal  Local Privi ...)
+	TODO: check
+CVE-2023-32175 (VIPRE Antivirus Plus Link Following Local Privilege Escalation Vulnera ...)
+	TODO: check
+CVE-2023-32174 (Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Co ...)
+	TODO: check
+CVE-2023-32173 (Unified Automation UaGateway AddServer XML Injection Denial-of-Service ...)
+	TODO: check
+CVE-2023-32172 (Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Se ...)
+	TODO: check
+CVE-2023-32171 (Unified Automation UaGateway OPC UA Server Null Pointer Dereference De ...)
+	TODO: check
+CVE-2023-32170 (Unified Automation UaGateway OPC UA Server Improper Input Validation D ...)
+	TODO: check
+CVE-2023-32169 (D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypas ...)
+	TODO: check
+CVE-2023-32168 (D-Link D-View showUser Improper Authorization Privilege Escalation Vul ...)
+	TODO: check
+CVE-2023-32167 (D-Link D-View uploadMib Directory Traversal Arbitrary File Creation or ...)
+	TODO: check
+CVE-2023-32166 (D-Link D-View uploadFile Directory Traversal Arbitrary File Creation V ...)
+	TODO: check
+CVE-2023-32165 (D-Link D-View TftpReceiveFileHandler Directory Traversal Remote Code E ...)
+	TODO: check
+CVE-2023-32164 (D-Link D-View TftpSendFileThread Directory Traversal Information Discl ...)
+	TODO: check
+CVE-2023-32161 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-32160 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-32159 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-32158 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-32157 (Tesla Model 3 bsa_server BIP Heap-based Buffer Overflow Arbitrary Code ...)
+	TODO: check
+CVE-2023-32156 (Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerabili ...)
+	TODO: check
+CVE-2023-32155 (Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vu ...)
+	TODO: check
+CVE-2023-32154 (Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-32153 (D-Link DIR-2640 EmailFrom Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-32152 (D-Link DIR-2640 HNAP LoginPassword Authentication Bypass Vulnerability ...)
+	TODO: check
+CVE-2023-32151 (D-Link DIR-2640 DestNetwork Command Injection Remote Code Execution Vu ...)
+	TODO: check
+CVE-2023-32150 (D-Link DIR-2640 PrefixLen Command Injection Remote Code Execution Vuln ...)
+	TODO: check
+CVE-2023-32149 (D-Link DIR-2640 prog.cgi Request Handling Stack-based Buffer Overflow  ...)
+	TODO: check
+CVE-2023-32148 (D-Link DIR-2640 HNAP PrivateLogin Authentication Bypass Vulnerability. ...)
+	TODO: check
+CVE-2023-32147 (D-Link DIR-2640 LocalIPAddress Command Injection Remote Code Execution ...)
+	TODO: check
+CVE-2023-32146 (D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote ...)
+	TODO: check
+CVE-2023-32145 (D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerabil ...)
+	TODO: check
+CVE-2023-32144 (D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow ...)
+	TODO: check
+CVE-2023-32143 (D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code ...)
+	TODO: check
+CVE-2023-32142 (D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-32141 (D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Re ...)
+	TODO: check
+CVE-2023-32140 (D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remot ...)
+	TODO: check
+CVE-2023-32139 (D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execut ...)
+	TODO: check
+CVE-2023-32138 (D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Executi ...)
+	TODO: check
+CVE-2023-32137 (D-Link DAP-1360 webproc WEB_DisplayPage Directory Traversal Informatio ...)
+	TODO: check
+CVE-2023-32136 (D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2023-32135 (Sante DICOM Viewer Pro DCM File Parsing Use-After-Free Information Dis ...)
+	TODO: check
+CVE-2023-32134 (Sante DICOM Viewer Pro DCM File Parsing Use-After-Free Remote Code Exe ...)
+	TODO: check
+CVE-2023-32133 (Sante DICOM Viewer Pro J2K File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-32132 (Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2023-32131 (Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Cod ...)
+	TODO: check
+CVE-2022-48705 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fa3fbe64037839f448dc569212bafc5a495d8219 (6.0-rc5)
-CVE-2022-48704 [drm/radeon: add a force flush to delay work when radeon]
+CVE-2022-48704 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/f461950fdc374a3ada5a63c669d997de4600dffe (6.0-rc3)
-CVE-2022-48703 [thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR]
+CVE-2022-48703 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/7931e28098a4c1a2a6802510b0cbe57546d2049d (6.0-rc3)
-CVE-2022-48702 [ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()]
+CVE-2022-48702 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/d29f59051d3a07b81281b2df2b8c9dfe4716067f (6.0-rc5)
-CVE-2022-48701 [ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()]
+CVE-2022-48701 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/e53f47f6c1a56d2af728909f1cb894da6b43d9bf (6.0-rc5)
-CVE-2022-48700 [vfio/type1: Unpin zero pages]
+CVE-2022-48700 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	NOTE: https://git.kernel.org/linus/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4 (6.0-rc5)
-CVE-2022-48699 [sched/debug: fix dentry leak in update_sched_domain_debugfs]
+CVE-2022-48699 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/c2e406596571659451f4b95e37ddfd5a8ef1d0dc (6.0-rc5)
-CVE-2022-48698 [drm/amd/display: fix memory leak when using debugfs_lookup()]
+CVE-2022-48698 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/cbfac7fa491651c57926c99edeb7495c6c1aeac2 (6.0-rc5)
-CVE-2022-48697 [nvmet: fix a use-after-free]
+CVE-2022-48697 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/6a02a61e81c231cc5c680c5dbf8665275147ac52 (6.0-rc5)
-CVE-2022-48696 [regmap: spi: Reserve space for register address/padding]
+CVE-2022-48696 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f5723cfc01932c7a8d5c78dbf7e067e537c91439 (6.0-rc5)
-CVE-2022-48695 [scsi: mpt3sas: Fix use-after-free warning]
+CVE-2022-48695 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34 (6.0-rc5)
-CVE-2022-48694 [RDMA/irdma: Fix drain SQ hang with no completion]
+CVE-2022-48694 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ead54ced6321099978d30d62dc49c282a6e70574 (6.0-rc5)
-CVE-2022-48693 [soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs]
+CVE-2022-48693 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/1085f5080647f0c9f357c270a537869191f7f2a1 (6.0-rc5)
-CVE-2022-48692 [RDMA/srp: Set scmnd->result only when scmnd is not NULL]
+CVE-2022-48692 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/12f35199a2c0551187edbf8eb01379f0598659fa (6.0-rc5)
-CVE-2022-48691 [netfilter: nf_tables: clean up hook list when offload flags check fails]
+CVE-2022-48691 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/77972a36ecc4db7fc7c68f0e80714263c5f03f65 (6.0-rc5)
-CVE-2022-48690 [ice: Fix DMA mappings leak]
+CVE-2022-48690 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7e753eb675f0523207b184558638ee2eed6c9ac2 (6.0-rc5)
-CVE-2022-48689 [tcp: TX zerocopy should not sense pfmemalloc status]
+CVE-2022-48689 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.19.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3261400639463a853ba2b3be8bd009c2a8089775 (6.0-rc5)
-CVE-2022-48688 [i40e: Fix kernel crash during module removal]
+CVE-2022-48688 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/fb8396aeda5872369a8ed6d2301e2c86e303c520 (6.0-rc5)
-CVE-2022-48687 [ipv6: sr: fix out-of-bounds read when setting HMAC data.]
+CVE-2022-48687 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/84a53580c5d2138c7361c7c3eea5b31827e63b35 (6.0-rc5)
-CVE-2022-48686 [nvme-tcp: fix UAF when detecting digest errors]
+CVE-2022-48686 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/160f3549a907a50e51a8518678ba2dcf2541abea (6.0-rc5)
-CVE-2022-48675 [IB/core: Fix a nested dead lock as part of ODP flow]
+CVE-2022-48675 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/85eaeb5058f0f04dffb124c97c86b4f18db0b833 (6.0-rc5)
-CVE-2022-48674 [erofs: fix pcluster use-after-free on UP platforms]
+CVE-2022-48674 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/2f44013e39984c127c6efedf70e6b5f4e9dcf315 (6.0-rc5)
-CVE-2022-48673 [net/smc: Fix possible access to freed memory in link clear]
+CVE-2022-48673 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/e9b1a4f867ae9c1dbd1d71cd09cbdb3239fb4968 (6.0-rc5)
-CVE-2022-48672 [of: fdt: fix off-by-one error in unflatten_dt_nodes()]
+CVE-2022-48672 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.260-1
 	NOTE: https://git.kernel.org/linus/2f945a792f67815abca26fa8a5e863ccf3fa1181 (6.0-rc6)
-CVE-2022-48671 [cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()]
+CVE-2022-48671 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.148-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/43626dade36fa74d3329046f4ae2d7fdefe401c6 (6.0-rc3)
-CVE-2022-48670 [peci: cpu: Fix use-after-free in adev_release()]
+CVE-2022-48670 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.19.11-1
 	NOTE: https://git.kernel.org/linus/1c11289b34ab67ed080bbe0f1855c4938362d9cf (6.0-rc4)
 CVE-2024-4418 [stack use-after-free in virNetClientIOEventLoop()]
 	- libvirt <unfixed> (bug #1070330)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2278616
 	NOTE: Fixed by: https://gitlab.com/libvirt/libvirt/-/commit/8074d64dc2eca846d6a61efe1a9b7428a0ce1dd1
-CVE-2024-4140
+CVE-2024-4140 (An excessive memory use issue (CWE-770) exists in Email-MIME, before v ...)
 	- libemail-mime-perl 1.954-1 (bug #960062)
 	[bookworm] - libemail-mime-perl <no-dsa> (Minor issue)
 	[bullseye] - libemail-mime-perl <no-dsa> (Minor issue)
@@ -128,24 +2060,24 @@ CVE-2024-4140
 	NOTE: https://github.com/rjbs/Email-MIME/pull/80
 	NOTE: https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63 (1.954)
 	NOTE: https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1 (1.954)
-CVE-2024-4029
+CVE-2024-4029 (A vulnerability was found in Wildfly\u2019s management interface. Due  ...)
 	- wildfly <itp> (bug #752018)
-CVE-2024-30251 [DoS when trying to parse malformed POST requests]
+CVE-2024-30251 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...)
 	- python-aiohttp <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2024/05/02/4
 	NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5m98-qgg9-wh84
 	NOTE: Fixed by: https://github.com/aio-libs/aiohttp/commit/cebe526b9c34dc3a3da9140409db63014bc4cf19 (v3.9.4)
 	NOTE: Followup: https://github.com/aio-libs/aiohttp/commit/7eecdff163ccf029fbb1ddc9de4169d4aaeb6597 (v3.9.5)
 	NOTE: Followup: https://github.com/aio-libs/aiohttp/commit/f21c6f2ca512a026ce7f0f6c6311f62d6a638866 (v3.9.5)
-CVE-2024-34148
+CVE-2024-34148 (Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier pr ...)
 	NOT-FOR-US: Jenkins plugin
-CVE-2024-34147
+CVE-2024-34147 (Jenkins Telegram Bot Plugin 1.4.0 and earlier stores the Telegram Bot  ...)
 	NOT-FOR-US: Jenkins plugin
-CVE-2024-34146
+CVE-2024-34146 (Jenkins Git server Plugin 114.v068a_c7cc2574 and earlier does not perf ...)
 	NOT-FOR-US: Jenkins plugin
-CVE-2024-34145
+CVE-2024-34145 (A sandbox bypass vulnerability involving sandbox-defined classes that  ...)
 	NOT-FOR-US: Jenkins plugin
-CVE-2024-34144
+CVE-2024-34144 (A sandbox bypass vulnerability involving crafted constructor bodies in ...)
 	NOT-FOR-US: Jenkins plugin
 CVE-2024-4142 (An Improper input validation vulnerability that could potentially lead ...)
 	NOT-FOR-US: JFrog Artifactory
@@ -2157,6 +4089,7 @@ CVE-2022-48682 (In deletefiles in FDUPES before 2.2.0, a TOCTOU race condition a
 	NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1200381
 	NOTE: https://github.com/adrianlopezroche/fdupes/commit/85680897148f1ac33b55418e00334116e419717f (v2.2.0)
 CVE-2024-27282 [Arbitrary memory address read vulnerability with Regex search]
+	{DSA-5677-1}
 	- ruby3.2 <unfixed> (bug #1069968)
 	- ruby3.1 <unfixed> (bug #1069969)
 	- ruby2.7 <removed>
@@ -2164,18 +4097,21 @@ CVE-2024-27282 [Arbitrary memory address read vulnerability with Regex search]
 	NOTE: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
 	NOTE: https://github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a
 CVE-2024-33602 [nscd: netgroup cache assumes NSS callback uses in-buffer strings]
+	{DSA-5678-1}
 	- glibc 2.37-19
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31680
 	NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
 	NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
 	NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=c04a21e050d64a1193a6daab872bca2528bda44b
 CVE-2024-33601 [nscd: netgroup cache may terminate daemon on memory allocation failure]
+	{DSA-5678-1}
 	- glibc 2.37-19
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31679
 	NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
 	NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
 	NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=c04a21e050d64a1193a6daab872bca2528bda44b
 CVE-2024-33600 [nscd: Null pointer dereferences after failed netgroup cache insertion]
+	{DSA-5678-1}
 	- glibc 2.37-19
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31678
 	NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
@@ -2183,6 +4119,7 @@ CVE-2024-33600 [nscd: Null pointer dereferences after failed netgroup cache inse
 	NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=b048a482f088e53144d26a61c390bed0210f49f2
 	NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=7835b00dbce53c3c87bbbb1754a95fb5e58187aa
 CVE-2024-33599 [nscd: netgroup cache: invalid memcpy under low memory/storage conditions]
+	{DSA-5678-1}
 	- glibc 2.37-19
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31677
 	NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
@@ -12585,6 +14522,7 @@ CVE-2020-36826 (A vulnerability was found in AwesomestCode LiveBot. It has been
 CVE-2020-36825 (A vulnerability has been found in cyberaz0r WebRAT up to 20191222 and  ...)
 	NOT-FOR-US: cyberaz0r WebRAT
 CVE-2024-27281 [RCE vulnerability with .rdoc_options in RDoc]
+	{DSA-5677-1}
 	- ruby3.2 <unfixed> (bug #1067802)
 	- ruby3.1 <unfixed> (bug #1067803)
 	- ruby2.7 <removed>
@@ -12592,6 +14530,7 @@ CVE-2024-27281 [RCE vulnerability with .rdoc_options in RDoc]
 	NOTE: https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
 	NOTE: https://github.com/ruby/rdoc/commit/da7a0c7553ef7250ca665a3fecdc01dbaacbb43d (v6.6.3)
 CVE-2024-27280 [Buffer overread vulnerability in StringIO]
+	{DSA-5677-1}
 	- ruby3.2 <not-affected> (Fixed before initial upload to Debian)
 	- ruby3.1 <unfixed> (bug #1069966)
 	- ruby2.7 <removed>
@@ -19846,7 +21785,7 @@ CVE-2024-25166 (Cross Site Scripting vulnerability in 71CMS v.1.0.0 allows a rem
 	NOT-FOR-US: 71CMS
 CVE-2024-24721 (An issue was discovered on Innovaphone PBX before 14r1 devices. The pa ...)
 	NOT-FOR-US: Innovaphone PBX
-CVE-2024-24720 (An issue was discovered on Innovaphone PBX before 14r1 devices. It pro ...)
+CVE-2024-24720 (An issue was discovered in the Forgot password function in Innovaphone ...)
 	NOT-FOR-US: Innovaphone PBX
 CVE-2024-24564 (Vyper is a pythonic Smart Contract Language for the ethereum virtual m ...)
 	NOT-FOR-US: Vyper
@@ -40011,7 +41950,7 @@ CVE-2023-35080 (A vulnerability has been identified in the Ivanti Secure Access
 	NOT-FOR-US: Ivanti
 CVE-2023-34060 (VMware Cloud Director Appliance contains an authentication bypass vuln ...)
 	NOT-FOR-US: VMware
-CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability]
+CVE-2023-44444 (GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability.  ...)
 	{DSA-5564-1 DLA-3659-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
@@ -40019,7 +41958,7 @@ CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerabi
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/e1bfd87195e4fe60a92df70cde65464d032dd3c1
 	NOTE: Backport to gimp-2.10: https://gitlab.gnome.org/GNOME/gimp/-/commit/ef12c0a90752a06d4c465a768d052b07f5e8a8a0 (GIMP_2_10_36)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10071 (restricted)
-CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability]
+CVE-2023-44443 (GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerabi ...)
 	{DSA-5564-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	[buster] - gimp <not-affected> (Vulnerable code introduced in 2.10.22)
@@ -40029,14 +41968,14 @@ CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vul
 	NOTE: Backport to gimp-2.10: https://gitlab.gnome.org/GNOME/gimp/-/commit/ef12c0a90752a06d4c465a768d052b07f5e8a8a0 (GIMP_2_10_36)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10072 (restricted)
 	NOTE: Introduced by: https://gitlab.gnome.org/GNOME/gimp/-/commit/bf66a07d207bc09f222e56c398760478a3a057fa (GIMP_2_10_22)
-CVE-2023-44442 [GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
+CVE-2023-44442 (GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution ...)
 	{DSA-5564-1 DLA-3659-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
 	NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/985c0a20e18b5b3b8a48ee9cb12287b1d5732d3d (GIMP_2_10_36)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10101 (restricted)
-CVE-2023-44441 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
+CVE-2023-44441 (GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution ...)
 	{DSA-5564-1 DLA-3677-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	[buster] - gimp <not-affected> (DDS plugin added in 2.10.10)
@@ -48347,7 +50286,7 @@ CVE-2023-38871 (The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Econom
 	NOT-FOR-US: gugoan's Economizzer
 CVE-2023-38870 (A SQL injection vulnerability exists in gugoan Economizzer commit 3730 ...)
 	NOT-FOR-US: gugoan's Economizzer
-CVE-2023-42119 [Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability]
+CVE-2023-42119 (Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. Th ...)
 	- exim4 4.97~RC2-2
 	[bookworm] - exim4 4.96-15+deb12u3
 	[bullseye] - exim4 <no-dsa> (Minor issue; use Exim4 with a trustworthy DNS resolver able to validate the data according to the DNS record types)
@@ -48357,7 +50296,7 @@ CVE-2023-42119 [Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerabili
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: https://exim.org/static/doc/security/CVE-2023-zdi.txt
-CVE-2023-42118 [Exim libspf2 Integer Underflow Remote Code Execution Vulnerability]
+CVE-2023-42118 (Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. Th ...)
 	- libspf2 <unfixed> (bug #1053870)
 	[bookworm] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
 	[bullseye] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
@@ -48374,7 +50313,7 @@ CVE-2023-42118 [Exim libspf2 Integer Underflow Remote Code Execution Vulnerabili
 	NOTE: is fixed with libspf2/1.2.10-8. There have been 1. no proofs it is exploitable, and the
 	NOTE: finder clarifies as "ut I haven't been able to get it to do anything after that because
 	NOTE: another buffer fills up." and 2. that this is the same issue as CVE-2023-42118 .
-CVE-2023-42117 [Exim Improper Neutralization of Special Elements Remote Code Execution Vulnerability]
+CVE-2023-42117 (Exim Improper Neutralization of Special Elements Remote Code Execution ...)
 	- exim4 4.97~RC2-2
 	[bookworm] - exim4 4.96-15+deb12u3
 	[bullseye] - exim4 <no-dsa> (Only an issue if Exim4 run behind an untrusted proxy-protocol proxy)
@@ -48384,7 +50323,7 @@ CVE-2023-42117 [Exim Improper Neutralization of Special Elements Remote Code Exe
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: https://exim.org/static/doc/security/CVE-2023-zdi.txt
-CVE-2023-42116 [Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability]
+CVE-2023-42116 (Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Execution  ...)
 	{DSA-5512-1 DLA-3599-1}
 	- exim4 4.97~RC1-2
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1470/
@@ -48393,7 +50332,7 @@ CVE-2023-42116 [Exim SMTP Challenge Stack-based Buffer Overflow Remote Code Exec
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: https://exim.org/static/doc/security/CVE-2023-zdi.txt
-CVE-2023-42115 [Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability]
+CVE-2023-42115 (Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability. Thi ...)
 	{DSA-5512-1}
 	- exim4 4.97~RC1-2
 	[buster] - exim4 <not-affected> (External authenticator support was introduced later)
@@ -48403,7 +50342,7 @@ CVE-2023-42115 [Exim AUTH Out-Of-Bounds Write Remote Code Execution Vulnerabilit
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: https://exim.org/static/doc/security/CVE-2023-zdi.txt
-CVE-2023-42114 [Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability]
+CVE-2023-42114 (Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerab ...)
 	{DSA-5512-1 DLA-3599-1}
 	- exim4 4.97~RC1-2
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1468/
@@ -48412,7 +50351,7 @@ CVE-2023-42114 [Exim NTLM Challenge Out-Of-Bounds Read Information Disclosure Vu
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/29/5
 	NOTE: https://www.openwall.com/lists/oss-security/2023/10/01/4
 	NOTE: https://exim.org/static/doc/security/CVE-2023-zdi.txt
-CVE-2023-50186 [AV1 codec parser buffer overflow]
+CVE-2023-50186 (GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Ex ...)
 	{DSA-5583-1}
 	- gst-plugins-bad1.0 1.22.8-1
 	[bullseye] - gst-plugins-bad1.0 <not-affected> (Vulnerable code not present)
@@ -48422,7 +50361,7 @@ CVE-2023-50186 [AV1 codec parser buffer overflow]
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5823
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/890d59e97e291fe848147ebf4d5884bcec1101c9
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/a46737a73155fe1c19fa5115df40da35426f9fb5 (1.22.8)
-CVE-2023-44446 [MXF demuxer use-after-free]
+CVE-2023-44446 (GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulner ...)
 	{DSA-5565-1 DLA-3673-1}
 	- gst-plugins-bad1.0 1.22.7-1 (bug #1056101)
 	- gst-plugins-bad0.10 <removed>
@@ -48430,7 +50369,7 @@ CVE-2023-44446 [MXF demuxer use-after-free]
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5635
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/274551d450e443a8c71baa95e3f8d5dad212737f
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/7dfaa57b6f9b55f17ffe824bd8988bb71ae11353 (1.22.7)
-CVE-2023-44429 [AV1 codec parser buffer overflow]
+CVE-2023-44429 (GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Exe ...)
 	{DSA-5565-1}
 	- gst-plugins-bad1.0 1.22.7-1 (bug #1056102)
 	[buster] - gst-plugins-bad1.0 <not-affected> (Vulnerable code was introduced later)
@@ -48439,7 +50378,7 @@ CVE-2023-44429 [AV1 codec parser buffer overflow]
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5634
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/1db83d3f745332cbda6adf954b2c53a10caa205e
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/b76a801f57353b893c344025cac56413140fca6d (1.22.7)
-CVE-2023-40476 [Integer overflow in H.265 video parser leading to stack overwrite]
+CVE-2023-40476 (GStreamer H265 Parsing Stack-based Buffer Overflow Remote Code Executi ...)
 	{DSA-5533-1 DLA-3633-1}
 	- gst-plugins-bad1.0 1.22.7-1 (bug #1053259)
 	- gst-plugins-bad0.10 <removed>
@@ -48447,7 +50386,7 @@ CVE-2023-40476 [Integer overflow in H.265 video parser leading to stack overwrit
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5364
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/ff91a3d8d6f7e2412c44663bf30fad5c7fdbc9d9
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/fddda166222a067d0e511950a0a8cfb9f5a521b7 (1.22.6)
-CVE-2023-40475 [Integer overflow leading to heap overwrite in MXF file handling with AES3 audio]
+CVE-2023-40475 (GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vuln ...)
 	{DSA-5533-1 DLA-3633-1}
 	- gst-plugins-bad1.0 1.22.7-1 (bug #1053260)
 	- gst-plugins-bad0.10 <removed>
@@ -48455,7 +50394,7 @@ CVE-2023-40475 [Integer overflow leading to heap overwrite in MXF file handling
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5362
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/72742dee30cce7bf909639f82de119871566ce39
 	NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/1edd1c38dcc5d27e7c5649d999ee8278872a16d4 (1.22.6)
-CVE-2023-40474 [Integer overflow leading to heap overwrite in MXF file handling with uncompressed video]
+CVE-2023-40474 (GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vuln ...)
 	{DSA-5533-1 DLA-3633-1}
 	- gst-plugins-bad1.0 1.22.7-1 (bug #1053261)
 	- gst-plugins-bad0.10 <removed>
@@ -53665,7 +55604,7 @@ CVE-2023-39583
 	REJECTED
 CVE-2023-39441 (Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provide ...)
 	NOT-FOR-US: Apache Airflow SMTP Provider
-CVE-2023-40477
+CVE-2023-40477 (RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remot ...)
 	{DLA-3653-1 DLA-3543-1 DLA-3542-1}
 	- rar 2:6.23-1
 	[bookworm] - rar 2:6.23-1~deb12u1
@@ -55065,7 +57004,7 @@ CVE-2023-29151 (Uncontrolled search path element in some Intel(R) PSR SDK before
 	NOT-FOR-US: Intel
 CVE-2023-27887 (Improper initialization in BIOS firmware for some Intel(R) NUCs may al ...)
 	NOT-FOR-US: Intel
-CVE-2023-38104 [ZDI-CAN-21444: Integer overflow leading to heap overwrite in RealMedia file handling]
+CVE-2023-38104 (GStreamer RealMedia File Parsing Integer Overflow Remote Code Executio ...)
 	{DSA-5476-1 DLA-3552-1}
 	- gst-plugins-ugly1.0 1.22.5-1 (bug #1043501)
 	- gst-plugins-ugly0.10 <removed>
@@ -55074,7 +57013,7 @@ CVE-2023-38104 [ZDI-CAN-21444: Integer overflow leading to heap overwrite in Rea
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/67e38cf47b7683586c24de18d8253029042dc72f
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/eb89e0a13eeb59fc5bab787ded50faf6a50087e3 (1.22.5)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1008/
-CVE-2023-38103 [ZDI-CAN-21443: Integer overflow leading to heap overwrite in RealMedia file handling]
+CVE-2023-38103 (GStreamer RealMedia File Parsing Integer Overflow Remote Code Executio ...)
 	{DSA-5476-1 DLA-3552-1}
 	- gst-plugins-ugly1.0 1.22.5-1 (bug #1043501)
 	- gst-plugins-ugly0.10 <removed>
@@ -61062,7 +63001,7 @@ CVE-2023-33277 (The web interface of Gira Giersiepen Gira KNX/IP-Router 3.1.3683
 	NOT-FOR-US: Gira Giersiepen Gira KNX/IP-Router
 CVE-2023-33190 (Sealos is an open source cloud operating system distribution based on  ...)
 	NOT-FOR-US: Sealos
-CVE-2023-37329 [Heap overwrite in PGS subtitle overlay decoder]
+CVE-2023-37329 (GStreamer SRT File Parsing Heap-based Buffer Overflow Remote Code Exec ...)
 	{DSA-5444-1 DLA-3503-1}
 	- gst-plugins-bad1.0 1.22.4-1
 	- gst-plugins-bad0.10 <removed>
@@ -61070,7 +63009,7 @@ CVE-2023-37329 [Heap overwrite in PGS subtitle overlay decoder]
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/4896.patch
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/5f3cf0a7d7ae7ab883d0611e85c06354f1e94907
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/60226124ec367c2549e4bf1e6174dfb8eca5a63d
-CVE-2023-37327 [Integer overflow leading to heap overwrite in FLAC image tag handling]
+CVE-2023-37327 (GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vul ...)
 	{DSA-5445-1 DLA-3505-1}
 	- gst-plugins-good1.0 1.22.4-1
 	- gst-plugins-good0.10 <removed>
@@ -61078,7 +63017,7 @@ CVE-2023-37327 [Integer overflow leading to heap overwrite in FLAC image tag han
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/4894.patch
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/bdc8021c73c16c49d594579c606a4f4771a2670e
 	NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/7bcd791fabe03b9ab1c72f494fc86cd0c06c3556
-CVE-2023-37328 [Heap overwrite in subtitle parsing]
+CVE-2023-37328 (GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Exec ...)
 	{DSA-5443-1 DLA-3504-1}
 	- gst-plugins-base1.0 1.22.4-1
 	- gst-plugins-base0.10 <removed>
@@ -67451,7 +69390,7 @@ CVE-2022-48476 (In JetBrains Ktor before 2.3.0 path traversal in the `resolveRes
 	NOT-FOR-US: JetBrains Ktor
 CVE-2023-31103 (Exposure of Resource to Wrong Sphere Vulnerability in Apache Software  ...)
 	NOT-FOR-US: Apache InLong
-CVE-2023-40481
+CVE-2023-40481 (7-Zip SquashFS File Parsing Out-Of-Bounds Write Remote Code Execution  ...)
 	- 7zip 23.01+dfsg-1
 	[bookworm] - 7zip <no-dsa> (Minor issue; will be fixed via point release)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1164/
@@ -73961,8 +75900,8 @@ CVE-2023-28954
 	RESERVED
 CVE-2023-28953 (IBM Cognos Analytics on Cloud Pak for Data 4.0 could allow an attacker ...)
 	NOT-FOR-US: IBM
-CVE-2023-28952
-	RESERVED
+CVE-2023-28952 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to inje ...)
+	TODO: check
 CVE-2023-28951
 	RESERVED
 CVE-2023-28950 (IBM MQ 8.0, 9.0, 9.1, 9.2, and 9.3 could disclose sensitive user infor ...)
@@ -74576,8 +76515,8 @@ CVE-2023-28800 (When using local accounts for administration, the redirect url p
 	NOT-FOR-US: Zscaler
 CVE-2023-28799 (A URL parameter during login flow was vulnerable to injection. An atta ...)
 	NOT-FOR-US: Zscaler
-CVE-2023-28798
-	RESERVED
+CVE-2023-28798 (An out-of-bounds write to heap in the pacparser library on Zscaler Cli ...)
+	TODO: check
 CVE-2023-28797 (Zscaler Client Connector for Windows before 4.1 writes/deletes a confi ...)
 	NOT-FOR-US: Zscaler Client Connector
 CVE-2023-28796 (Improper Verification of Cryptographic Signature vulnerability in Zsca ...)
@@ -79493,36 +81432,36 @@ CVE-2023-27371 (GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Ser
 	[bullseye] - libmicrohttpd <no-dsa> (Minor issue)
 	NOTE: https://git.gnunet.org/libmicrohttpd.git/commit/?id=e0754d1638c602382384f1eface30854b1defeec (v0.9.76)
 	NOTE: https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg00000.html
-CVE-2023-27370
-	RESERVED
-CVE-2023-27369
-	RESERVED
-CVE-2023-27368
-	RESERVED
-CVE-2023-27367
-	RESERVED
-CVE-2023-27366
-	RESERVED
-CVE-2023-27365
-	RESERVED
-CVE-2023-27364
-	RESERVED
-CVE-2023-27363
-	RESERVED
-CVE-2023-27362
-	RESERVED
-CVE-2023-27361
-	RESERVED
-CVE-2023-27360
-	RESERVED
-CVE-2023-27359
-	RESERVED
-CVE-2023-27358
-	RESERVED
-CVE-2023-27357
-	RESERVED
-CVE-2023-27356
-	RESERVED
+CVE-2023-27370 (NETGEAR RAX30 Device Configuration Cleartext Storage Information Discl ...)
+	TODO: check
+CVE-2023-27369 (NETGEAR RAX30 soap_serverd  Stack-based Buffer Overflow Authentication ...)
+	TODO: check
+CVE-2023-27368 (NETGEAR RAX30 soap_serverd Stack-based Buffer Overflow Authentication  ...)
+	TODO: check
+CVE-2023-27367 (NETGEAR RAX30 libcms_cli Command Injection Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-27366 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-27365 (Foxit PDF Editor DOC File Parsing Exposed Dangerous Method Remote Code ...)
+	TODO: check
+CVE-2023-27364 (Foxit PDF Editor XLS File Parsing Exposed Dangerous Method Remote Code ...)
+	TODO: check
+CVE-2023-27363 (Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Ex ...)
+	TODO: check
+CVE-2023-27362 (3CX Uncontrolled Search Path Local Privilege Escalation Vulnerability. ...)
+	TODO: check
+CVE-2023-27361 (NETGEAR RAX30 rex_cgi JSON Parsing Stack-based Buffer Overflow Remote  ...)
+	TODO: check
+CVE-2023-27360 (NETGEAR RAX30 lighttpd Misconfiguration Remote Code Execution Vulnerab ...)
+	TODO: check
+CVE-2023-27359 (TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. Th ...)
+	TODO: check
+CVE-2023-27358 (NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2023-27357 (NETGEAR RAX30 GetInfo Missing Authentication Information Disclosure Vu ...)
+	TODO: check
+CVE-2023-27356 (NETGEAR RAX30 logCtrl Command Injection Remote Code Execution Vulnerab ...)
+	TODO: check
 CVE-2023-27355 (This vulnerability allows network-adjacent attackers to execute arbitr ...)
 	NOT-FOR-US: Sonos One Speaker
 CVE-2023-27354 (This vulnerability allows network-adjacent attackers to disclose sensi ...)
@@ -79535,62 +81474,62 @@ CVE-2023-27351 (This vulnerability allows remote attackers to bypass authenticat
 	NOT-FOR-US: PaperCut
 CVE-2023-27350 (This vulnerability allows remote attackers to bypass authentication on ...)
 	NOT-FOR-US: PaperCut
-CVE-2023-27349
-	RESERVED
-CVE-2023-27348
-	RESERVED
-CVE-2023-27347
-	RESERVED
-CVE-2023-27346
-	RESERVED
-CVE-2023-27345
-	RESERVED
-CVE-2023-27344
-	RESERVED
-CVE-2023-27343
-	RESERVED
-CVE-2023-27342
-	RESERVED
-CVE-2023-27341
-	RESERVED
-CVE-2023-27340
-	RESERVED
-CVE-2023-27339
-	RESERVED
-CVE-2023-27338
-	RESERVED
-CVE-2023-27337
-	RESERVED
-CVE-2023-27336
-	RESERVED
-CVE-2023-27335
-	RESERVED
-CVE-2023-27334
-	RESERVED
-CVE-2023-27333
-	RESERVED
-CVE-2023-27332
-	RESERVED
-CVE-2023-27331
-	RESERVED
-CVE-2023-27330
-	RESERVED
-CVE-2023-27329
-	RESERVED
-CVE-2023-27328
-	RESERVED
-CVE-2023-27327
-	RESERVED
-CVE-2023-27326
-	RESERVED
-CVE-2023-27325
-	RESERVED
-CVE-2023-27324
-	RESERVED
-CVE-2023-27323
-	RESERVED
-CVE-2023-27322
-	RESERVED
+CVE-2023-27349 (BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Co ...)
+	TODO: check
+CVE-2023-27348 (PDF-XChange Editor TIF File Parsing Use-After-Free Remote Code Executi ...)
+	TODO: check
+CVE-2023-27347 (G DATA Total Security Link Following Local Privilege Escalation Vulner ...)
+	TODO: check
+CVE-2023-27346 (TP-Link AX1800 Firmware Parsing Stack-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2023-27345 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27344 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27343 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27342 (PDF-XChange Editor EMF File Parsing Untrusted Pointer Dereference Remo ...)
+	TODO: check
+CVE-2023-27341 (PDF-XChange Editor TIF File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27340 (PDF-XChange Editor PNG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27339 (PDF-XChange Editor PNG File Parsing Out-Of-Bounds Write Remote Code Ex ...)
+	TODO: check
+CVE-2023-27338 (PDF-XChange Editor TIF File Parsing Use-After-Free Information Disclos ...)
+	TODO: check
+CVE-2023-27337 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Remote Code Exe ...)
+	TODO: check
+CVE-2023-27336 (Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference D ...)
+	TODO: check
+CVE-2023-27335 (Softing edgeAggregator Client Cross-Site Scripting Remote Code Executi ...)
+	TODO: check
+CVE-2023-27334 (Softing edgeConnector Siemens ConditionRefresh Resource Exhaustion Den ...)
+	TODO: check
+CVE-2023-27333 (TP-Link Archer AX21 tmpServer Command 0x422 Stack-based Buffer Overflo ...)
+	TODO: check
+CVE-2023-27332 (TP-Link Archer AX21 tdpServer Logging Stack-based Buffer Overflow Remo ...)
+	TODO: check
+CVE-2023-27331 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-27330 (Foxit PDF Reader XFA Annotation Use-After-Free Remote Code Execution V ...)
+	TODO: check
+CVE-2023-27329 (Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2023-27328 (Parallels Desktop Toolgate XML Injection Local Privilege Escalation Vu ...)
+	TODO: check
+CVE-2023-27327 (Parallels Desktop Toolgate Time-Of-Check Time-Of-Use Local Privilege E ...)
+	TODO: check
+CVE-2023-27326 (Parallels Desktop Toolgate Directory Traversal Local Privilege Escalat ...)
+	TODO: check
+CVE-2023-27325 (Parallels Desktop Updater Improper Initialization Local Privilege Esca ...)
+	TODO: check
+CVE-2023-27324 (Parallels Desktop Updater Improper Initialization Local Privilege Esca ...)
+	TODO: check
+CVE-2023-27323 (Parallels Desktop Updater Time-Of-Check Time-Of-Use Local Privilege Es ...)
+	TODO: check
+CVE-2023-27322 (Parallels Desktop Service Improper Initialization Local Privilege Esca ...)
+	TODO: check
 CVE-2023-27321
 	RESERVED
 CVE-2023-27320 (Sudo before 1.9.13p2 has a double free in the per-command chroot featu ...)
@@ -85183,8 +87122,8 @@ CVE-2023-25459 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability i
 	NOT-FOR-US: WordPress plugin
 CVE-2023-25458 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GMO  ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2023-25457
-	RESERVED
+CVE-2023-25457 (Missing Authorization vulnerability in Richteam Slider Carousel \u2013 ...)
+	TODO: check
 CVE-2023-25456 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Klav ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2023-25455
@@ -91078,8 +93017,8 @@ CVE-2023-23476 (IBM Robotic Process Automation 21.0.0 through 21.0.7.latest is v
 	NOT-FOR-US: IBM
 CVE-2023-23475 (IBM Infosphere Information Server 11.7 is vulnerable to cross-site scr ...)
 	NOT-FOR-US: IBM
-CVE-2023-23474
-	RESERVED
+CVE-2023-23474 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 could allow a remote  ...)
+	TODO: check
 CVE-2023-23473 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site req ...)
 	NOT-FOR-US: IBM
 CVE-2023-23472
@@ -142021,7 +143960,7 @@ CVE-2022-33012 (Microweber v1.2.15 was discovered to allow attackers to perform
 CVE-2022-33011 (Known v1.3.1+2020120201 was discovered to allow attackers to perform a ...)
 	NOT-FOR-US: Known
 CVE-2022-33010
-	RESERVED
+	REJECTED
 CVE-2022-33009 (A stored cross-site scripting (XSS) vulnerability in LightCMS v1.3.11  ...)
 	NOT-FOR-US: LightCMS
 CVE-2022-33008
@@ -175371,8 +177310,8 @@ CVE-2022-22366 (IBM UrbanCode Deploy (UCD) 6.2.7.15, 7.0.5.10, 7.1.2.6, and 7.2.
 	NOT-FOR-US: IBM
 CVE-2022-22365 (IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0, with the Ajax ...)
 	NOT-FOR-US: IBM
-CVE-2022-22364
-	RESERVED
+CVE-2022-22364 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to exte ...)
+	TODO: check
 CVE-2022-22363
 	RESERVED
 CVE-2022-22362
@@ -191447,7 +193386,8 @@ CVE-2021-42250 (Improper output neutralization for Logs. A specific Apache Super
 	NOT-FOR-US: Apache Superset
 CVE-2021-42249
 	RESERVED
-CVE-2021-42248 (GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON inpu ...)
+CVE-2021-42248
+	REJECTED
 	[experimental] - golang-github-tidwall-gjson 1.14.4-1
 	- golang-github-tidwall-gjson 1.14.4-2 (bug #1011616)
 	[bookworm] - golang-github-tidwall-gjson <no-dsa> (Minor issue)
@@ -205959,9 +207899,11 @@ CVE-2021-36596
 	RESERVED
 CVE-2021-36595
 	RESERVED
-CVE-2021-36594 (SSRF in Oxwall 1.8.7 (11111) allows an attacker to execute arbitrary c ...)
+CVE-2021-36594
+	REJECTED
 	TODO: check
-CVE-2021-36593 (Oxwall 1.8.7 (11111) is vulnerable to Incorrect Access Control. Unauth ...)
+CVE-2021-36593
+	REJECTED
 	TODO: check
 CVE-2021-36592
 	RESERVED
@@ -244131,7 +246073,8 @@ CVE-2020-36125 (Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affec
 	NOT-FOR-US: Pax Technology PAXSTORE
 CVE-2020-36124 (Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by ...)
 	NOT-FOR-US: Pax Technology PAXSTORE
-CVE-2020-36123 (saitoha libsixel v1.8.6 was discovered to contain a double free via th ...)
+CVE-2020-36123
+	REJECTED
 	NOTE: Bogus report for libsixel
 CVE-2020-36122
 	RESERVED
@@ -247890,8 +249833,8 @@ CVE-2021-20558
 	RESERVED
 CVE-2021-20557 (IBM Security Guardium 11.2 could allow a remote authenticated attacker ...)
 	NOT-FOR-US: IBM
-CVE-2021-20556
-	RESERVED
+CVE-2021-20556 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 could allow a remote  ...)
+	TODO: check
 CVE-2021-20555
 	RESERVED
 CVE-2021-20554 (IBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cros ...)
@@ -248100,10 +250043,10 @@ CVE-2021-20453 (IBM WebSphere Application Server 8.0, 8.5, and 9.0 is vulnerable
 	NOT-FOR-US: IBM
 CVE-2021-20452
 	RESERVED
-CVE-2021-20451
-	RESERVED
-CVE-2021-20450
-	RESERVED
+CVE-2021-20451 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 is vulnerable to SQL  ...)
+	TODO: check
+CVE-2021-20450 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 does not set the secu ...)
+	TODO: check
 CVE-2021-20449
 	RESERVED
 CVE-2021-20448 (IBM Content Navigator 3.0.CD is vulnerable to cross-site scripting. Th ...)
@@ -318355,8 +320298,8 @@ CVE-2020-4876 (IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to
 	NOT-FOR-US: IBM
 CVE-2020-4875 (IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an X ...)
 	NOT-FOR-US: IBM
-CVE-2020-4874
-	RESERVED
+CVE-2020-4874 (IBM Cognos Controller 10.4.1, 10.4.2, and 11.0.0 uses weaker than expe ...)
+	TODO: check
 CVE-2020-4873 (IBM Planning Analytics 2.0 could allow an attacker to obtain sensitive ...)
 	NOT-FOR-US: IBM
 CVE-2020-4872



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7a548e1b246155aa999cf1b259918eaa1269803

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7a548e1b246155aa999cf1b259918eaa1269803
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240503/3a8a7fdb/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list