Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d8a2086a by security tracker role at 2022-11-04T08:10:15+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,1107 @@
+CVE-2023-21403
+       RESERVED
+CVE-2023-21402
+       RESERVED
+CVE-2023-21401
+       RESERVED
+CVE-2023-21400
+       RESERVED
+CVE-2023-21399
+       RESERVED
+CVE-2023-21398
+       RESERVED
+CVE-2023-21397
+       RESERVED
+CVE-2023-21396
+       RESERVED
+CVE-2023-21395
+       RESERVED
+CVE-2023-21394
+       RESERVED
+CVE-2023-21393
+       RESERVED
+CVE-2023-21392
+       RESERVED
+CVE-2023-21391
+       RESERVED
+CVE-2023-21390
+       RESERVED
+CVE-2023-21389
+       RESERVED
+CVE-2023-21388
+       RESERVED
+CVE-2023-21387
+       RESERVED
+CVE-2023-21386
+       RESERVED
+CVE-2023-21385
+       RESERVED
+CVE-2023-21384
+       RESERVED
+CVE-2023-21383
+       RESERVED
+CVE-2023-21382
+       RESERVED
+CVE-2023-21381
+       RESERVED
+CVE-2023-21380
+       RESERVED
+CVE-2023-21379
+       RESERVED
+CVE-2023-21378
+       RESERVED
+CVE-2023-21377
+       RESERVED
+CVE-2023-21376
+       RESERVED
+CVE-2023-21375
+       RESERVED
+CVE-2023-21374
+       RESERVED
+CVE-2023-21373
+       RESERVED
+CVE-2023-21372
+       RESERVED
+CVE-2023-21371
+       RESERVED
+CVE-2023-21370
+       RESERVED
+CVE-2023-21369
+       RESERVED
+CVE-2023-21368
+       RESERVED
+CVE-2023-21367
+       RESERVED
+CVE-2023-21366
+       RESERVED
+CVE-2023-21365
+       RESERVED
+CVE-2023-21364
+       RESERVED
+CVE-2023-21363
+       RESERVED
+CVE-2023-21362
+       RESERVED
+CVE-2023-21361
+       RESERVED
+CVE-2023-21360
+       RESERVED
+CVE-2023-21359
+       RESERVED
+CVE-2023-21358
+       RESERVED
+CVE-2023-21357
+       RESERVED
+CVE-2023-21356
+       RESERVED
+CVE-2023-21355
+       RESERVED
+CVE-2023-21354
+       RESERVED
+CVE-2023-21353
+       RESERVED
+CVE-2023-21352
+       RESERVED
+CVE-2023-21351
+       RESERVED
+CVE-2023-21350
+       RESERVED
+CVE-2023-21349
+       RESERVED
+CVE-2023-21348
+       RESERVED
+CVE-2023-21347
+       RESERVED
+CVE-2023-21346
+       RESERVED
+CVE-2023-21345
+       RESERVED
+CVE-2023-21344
+       RESERVED
+CVE-2023-21343
+       RESERVED
+CVE-2023-21342
+       RESERVED
+CVE-2023-21341
+       RESERVED
+CVE-2023-21340
+       RESERVED
+CVE-2023-21339
+       RESERVED
+CVE-2023-21338
+       RESERVED
+CVE-2023-21337
+       RESERVED
+CVE-2023-21336
+       RESERVED
+CVE-2023-21335
+       RESERVED
+CVE-2023-21334
+       RESERVED
+CVE-2023-21333
+       RESERVED
+CVE-2023-21332
+       RESERVED
+CVE-2023-21331
+       RESERVED
+CVE-2023-21330
+       RESERVED
+CVE-2023-21329
+       RESERVED
+CVE-2023-21328
+       RESERVED
+CVE-2023-21327
+       RESERVED
+CVE-2023-21326
+       RESERVED
+CVE-2023-21325
+       RESERVED
+CVE-2023-21324
+       RESERVED
+CVE-2023-21323
+       RESERVED
+CVE-2023-21322
+       RESERVED
+CVE-2023-21321
+       RESERVED
+CVE-2023-21320
+       RESERVED
+CVE-2023-21319
+       RESERVED
+CVE-2023-21318
+       RESERVED
+CVE-2023-21317
+       RESERVED
+CVE-2023-21316
+       RESERVED
+CVE-2023-21315
+       RESERVED
+CVE-2023-21314
+       RESERVED
+CVE-2023-21313
+       RESERVED
+CVE-2023-21312
+       RESERVED
+CVE-2023-21311
+       RESERVED
+CVE-2023-21310
+       RESERVED
+CVE-2023-21309
+       RESERVED
+CVE-2023-21308
+       RESERVED
+CVE-2023-21307
+       RESERVED
+CVE-2023-21306
+       RESERVED
+CVE-2023-21305
+       RESERVED
+CVE-2023-21304
+       RESERVED
+CVE-2023-21303
+       RESERVED
+CVE-2023-21302
+       RESERVED
+CVE-2023-21301
+       RESERVED
+CVE-2023-21300
+       RESERVED
+CVE-2023-21299
+       RESERVED
+CVE-2023-21298
+       RESERVED
+CVE-2023-21297
+       RESERVED
+CVE-2023-21296
+       RESERVED
+CVE-2023-21295
+       RESERVED
+CVE-2023-21294
+       RESERVED
+CVE-2023-21293
+       RESERVED
+CVE-2023-21292
+       RESERVED
+CVE-2023-21291
+       RESERVED
+CVE-2023-21290
+       RESERVED
+CVE-2023-21289
+       RESERVED
+CVE-2023-21288
+       RESERVED
+CVE-2023-21287
+       RESERVED
+CVE-2023-21286
+       RESERVED
+CVE-2023-21285
+       RESERVED
+CVE-2023-21284
+       RESERVED
+CVE-2023-21283
+       RESERVED
+CVE-2023-21282
+       RESERVED
+CVE-2023-21281
+       RESERVED
+CVE-2023-21280
+       RESERVED
+CVE-2023-21279
+       RESERVED
+CVE-2023-21278
+       RESERVED
+CVE-2023-21277
+       RESERVED
+CVE-2023-21276
+       RESERVED
+CVE-2023-21275
+       RESERVED
+CVE-2023-21274
+       RESERVED
+CVE-2023-21273
+       RESERVED
+CVE-2023-21272
+       RESERVED
+CVE-2023-21271
+       RESERVED
+CVE-2023-21270
+       RESERVED
+CVE-2023-21269
+       RESERVED
+CVE-2023-21268
+       RESERVED
+CVE-2023-21267
+       RESERVED
+CVE-2023-21266
+       RESERVED
+CVE-2023-21265
+       RESERVED
+CVE-2023-21264
+       RESERVED
+CVE-2023-21263
+       RESERVED
+CVE-2023-21262
+       RESERVED
+CVE-2023-21261
+       RESERVED
+CVE-2023-21260
+       RESERVED
+CVE-2023-21259
+       RESERVED
+CVE-2023-21258
+       RESERVED
+CVE-2023-21257
+       RESERVED
+CVE-2023-21256
+       RESERVED
+CVE-2023-21255
+       RESERVED
+CVE-2023-21254
+       RESERVED
+CVE-2023-21253
+       RESERVED
+CVE-2023-21252
+       RESERVED
+CVE-2023-21251
+       RESERVED
+CVE-2023-21250
+       RESERVED
+CVE-2023-21249
+       RESERVED
+CVE-2023-21248
+       RESERVED
+CVE-2023-21247
+       RESERVED
+CVE-2023-21246
+       RESERVED
+CVE-2023-21245
+       RESERVED
+CVE-2023-21244
+       RESERVED
+CVE-2023-21243
+       RESERVED
+CVE-2023-21242
+       RESERVED
+CVE-2023-21241
+       RESERVED
+CVE-2023-21240
+       RESERVED
+CVE-2023-21239
+       RESERVED
+CVE-2023-21238
+       RESERVED
+CVE-2023-21237
+       RESERVED
+CVE-2023-21236
+       RESERVED
+CVE-2023-21235
+       RESERVED
+CVE-2023-21234
+       RESERVED
+CVE-2023-21233
+       RESERVED
+CVE-2023-21232
+       RESERVED
+CVE-2023-21231
+       RESERVED
+CVE-2023-21230
+       RESERVED
+CVE-2023-21229
+       RESERVED
+CVE-2023-21228
+       RESERVED
+CVE-2023-21227
+       RESERVED
+CVE-2023-21226
+       RESERVED
+CVE-2023-21225
+       RESERVED
+CVE-2023-21224
+       RESERVED
+CVE-2023-21223
+       RESERVED
+CVE-2023-21222
+       RESERVED
+CVE-2023-21221
+       RESERVED
+CVE-2023-21220
+       RESERVED
+CVE-2023-21219
+       RESERVED
+CVE-2023-21218
+       RESERVED
+CVE-2023-21217
+       RESERVED
+CVE-2023-21216
+       RESERVED
+CVE-2023-21215
+       RESERVED
+CVE-2023-21214
+       RESERVED
+CVE-2023-21213
+       RESERVED
+CVE-2023-21212
+       RESERVED
+CVE-2023-21211
+       RESERVED
+CVE-2023-21210
+       RESERVED
+CVE-2023-21209
+       RESERVED
+CVE-2023-21208
+       RESERVED
+CVE-2023-21207
+       RESERVED
+CVE-2023-21206
+       RESERVED
+CVE-2023-21205
+       RESERVED
+CVE-2023-21204
+       RESERVED
+CVE-2023-21203
+       RESERVED
+CVE-2023-21202
+       RESERVED
+CVE-2023-21201
+       RESERVED
+CVE-2023-21200
+       RESERVED
+CVE-2023-21199
+       RESERVED
+CVE-2023-21198
+       RESERVED
+CVE-2023-21197
+       RESERVED
+CVE-2023-21196
+       RESERVED
+CVE-2023-21195
+       RESERVED
+CVE-2023-21194
+       RESERVED
+CVE-2023-21193
+       RESERVED
+CVE-2023-21192
+       RESERVED
+CVE-2023-21191
+       RESERVED
+CVE-2023-21190
+       RESERVED
+CVE-2023-21189
+       RESERVED
+CVE-2023-21188
+       RESERVED
+CVE-2023-21187
+       RESERVED
+CVE-2023-21186
+       RESERVED
+CVE-2023-21185
+       RESERVED
+CVE-2023-21184
+       RESERVED
+CVE-2023-21183
+       RESERVED
+CVE-2023-21182
+       RESERVED
+CVE-2023-21181
+       RESERVED
+CVE-2023-21180
+       RESERVED
+CVE-2023-21179
+       RESERVED
+CVE-2023-21178
+       RESERVED
+CVE-2023-21177
+       RESERVED
+CVE-2023-21176
+       RESERVED
+CVE-2023-21175
+       RESERVED
+CVE-2023-21174
+       RESERVED
+CVE-2023-21173
+       RESERVED
+CVE-2023-21172
+       RESERVED
+CVE-2023-21171
+       RESERVED
+CVE-2023-21170
+       RESERVED
+CVE-2023-21169
+       RESERVED
+CVE-2023-21168
+       RESERVED
+CVE-2023-21167
+       RESERVED
+CVE-2023-21166
+       RESERVED
+CVE-2023-21165
+       RESERVED
+CVE-2023-21164
+       RESERVED
+CVE-2023-21163
+       RESERVED
+CVE-2023-21162
+       RESERVED
+CVE-2023-21161
+       RESERVED
+CVE-2023-21160
+       RESERVED
+CVE-2023-21159
+       RESERVED
+CVE-2023-21158
+       RESERVED
+CVE-2023-21157
+       RESERVED
+CVE-2023-21156
+       RESERVED
+CVE-2023-21155
+       RESERVED
+CVE-2023-21154
+       RESERVED
+CVE-2023-21153
+       RESERVED
+CVE-2023-21152
+       RESERVED
+CVE-2023-21151
+       RESERVED
+CVE-2023-21150
+       RESERVED
+CVE-2023-21149
+       RESERVED
+CVE-2023-21148
+       RESERVED
+CVE-2023-21147
+       RESERVED
+CVE-2023-21146
+       RESERVED
+CVE-2023-21145
+       RESERVED
+CVE-2023-21144
+       RESERVED
+CVE-2023-21143
+       RESERVED
+CVE-2023-21142
+       RESERVED
+CVE-2023-21141
+       RESERVED
+CVE-2023-21140
+       RESERVED
+CVE-2023-21139
+       RESERVED
+CVE-2023-21138
+       RESERVED
+CVE-2023-21137
+       RESERVED
+CVE-2023-21136
+       RESERVED
+CVE-2023-21135
+       RESERVED
+CVE-2023-21134
+       RESERVED
+CVE-2023-21133
+       RESERVED
+CVE-2023-21132
+       RESERVED
+CVE-2023-21131
+       RESERVED
+CVE-2023-21130
+       RESERVED
+CVE-2023-21129
+       RESERVED
+CVE-2023-21128
+       RESERVED
+CVE-2023-21127
+       RESERVED
+CVE-2023-21126
+       RESERVED
+CVE-2023-21125
+       RESERVED
+CVE-2023-21124
+       RESERVED
+CVE-2023-21123
+       RESERVED
+CVE-2023-21122
+       RESERVED
+CVE-2023-21121
+       RESERVED
+CVE-2023-21120
+       RESERVED
+CVE-2023-21119
+       RESERVED
+CVE-2023-21118
+       RESERVED
+CVE-2023-21117
+       RESERVED
+CVE-2023-21116
+       RESERVED
+CVE-2023-21115
+       RESERVED
+CVE-2023-21114
+       RESERVED
+CVE-2023-21113
+       RESERVED
+CVE-2023-21112
+       RESERVED
+CVE-2023-21111
+       RESERVED
+CVE-2023-21110
+       RESERVED
+CVE-2023-21109
+       RESERVED
+CVE-2023-21108
+       RESERVED
+CVE-2023-21107
+       RESERVED
+CVE-2023-21106
+       RESERVED
+CVE-2023-21105
+       RESERVED
+CVE-2023-21104
+       RESERVED
+CVE-2023-21103
+       RESERVED
+CVE-2023-21102
+       RESERVED
+CVE-2023-21101
+       RESERVED
+CVE-2023-21100
+       RESERVED
+CVE-2023-21099
+       RESERVED
+CVE-2023-21098
+       RESERVED
+CVE-2023-21097
+       RESERVED
+CVE-2023-21096
+       RESERVED
+CVE-2023-21095
+       RESERVED
+CVE-2023-21094
+       RESERVED
+CVE-2023-21093
+       RESERVED
+CVE-2023-21092
+       RESERVED
+CVE-2023-21091
+       RESERVED
+CVE-2023-21090
+       RESERVED
+CVE-2023-21089
+       RESERVED
+CVE-2023-21088
+       RESERVED
+CVE-2023-21087
+       RESERVED
+CVE-2023-21086
+       RESERVED
+CVE-2023-21085
+       RESERVED
+CVE-2023-21084
+       RESERVED
+CVE-2023-21083
+       RESERVED
+CVE-2023-21082
+       RESERVED
+CVE-2023-21081
+       RESERVED
+CVE-2023-21080
+       RESERVED
+CVE-2023-21079
+       RESERVED
+CVE-2023-21078
+       RESERVED
+CVE-2023-21077
+       RESERVED
+CVE-2023-21076
+       RESERVED
+CVE-2023-21075
+       RESERVED
+CVE-2023-21074
+       RESERVED
+CVE-2023-21073
+       RESERVED
+CVE-2023-21072
+       RESERVED
+CVE-2023-21071
+       RESERVED
+CVE-2023-21070
+       RESERVED
+CVE-2023-21069
+       RESERVED
+CVE-2023-21068
+       RESERVED
+CVE-2023-21067
+       RESERVED
+CVE-2023-21066
+       RESERVED
+CVE-2023-21065
+       RESERVED
+CVE-2023-21064
+       RESERVED
+CVE-2023-21063
+       RESERVED
+CVE-2023-21062
+       RESERVED
+CVE-2023-21061
+       RESERVED
+CVE-2023-21060
+       RESERVED
+CVE-2023-21059
+       RESERVED
+CVE-2023-21058
+       RESERVED
+CVE-2023-21057
+       RESERVED
+CVE-2023-21056
+       RESERVED
+CVE-2023-21055
+       RESERVED
+CVE-2023-21054
+       RESERVED
+CVE-2023-21053
+       RESERVED
+CVE-2023-21052
+       RESERVED
+CVE-2023-21051
+       RESERVED
+CVE-2023-21050
+       RESERVED
+CVE-2023-21049
+       RESERVED
+CVE-2023-21048
+       RESERVED
+CVE-2023-21047
+       RESERVED
+CVE-2023-21046
+       RESERVED
+CVE-2023-21045
+       RESERVED
+CVE-2023-21044
+       RESERVED
+CVE-2023-21043
+       RESERVED
+CVE-2023-21042
+       RESERVED
+CVE-2023-21041
+       RESERVED
+CVE-2023-21040
+       RESERVED
+CVE-2023-21039
+       RESERVED
+CVE-2023-21038
+       RESERVED
+CVE-2023-21037
+       RESERVED
+CVE-2023-21036
+       RESERVED
+CVE-2023-21035
+       RESERVED
+CVE-2023-21034
+       RESERVED
+CVE-2023-21033
+       RESERVED
+CVE-2023-21032
+       RESERVED
+CVE-2023-21031
+       RESERVED
+CVE-2023-21030
+       RESERVED
+CVE-2023-21029
+       RESERVED
+CVE-2023-21028
+       RESERVED
+CVE-2023-21027
+       RESERVED
+CVE-2023-21026
+       RESERVED
+CVE-2023-21025
+       RESERVED
+CVE-2023-21024
+       RESERVED
+CVE-2023-21023
+       RESERVED
+CVE-2023-21022
+       RESERVED
+CVE-2023-21021
+       RESERVED
+CVE-2023-21020
+       RESERVED
+CVE-2023-21019
+       RESERVED
+CVE-2023-21018
+       RESERVED
+CVE-2023-21017
+       RESERVED
+CVE-2023-21016
+       RESERVED
+CVE-2023-21015
+       RESERVED
+CVE-2023-21014
+       RESERVED
+CVE-2023-21013
+       RESERVED
+CVE-2023-21012
+       RESERVED
+CVE-2023-21011
+       RESERVED
+CVE-2023-21010
+       RESERVED
+CVE-2023-21009
+       RESERVED
+CVE-2023-21008
+       RESERVED
+CVE-2023-21007
+       RESERVED
+CVE-2023-21006
+       RESERVED
+CVE-2023-21005
+       RESERVED
+CVE-2023-21004
+       RESERVED
+CVE-2023-21003
+       RESERVED
+CVE-2023-21002
+       RESERVED
+CVE-2023-21001
+       RESERVED
+CVE-2023-21000
+       RESERVED
+CVE-2023-20999
+       RESERVED
+CVE-2023-20998
+       RESERVED
+CVE-2023-20997
+       RESERVED
+CVE-2023-20996
+       RESERVED
+CVE-2023-20995
+       RESERVED
+CVE-2023-20994
+       RESERVED
+CVE-2023-20993
+       RESERVED
+CVE-2023-20992
+       RESERVED
+CVE-2023-20991
+       RESERVED
+CVE-2023-20990
+       RESERVED
+CVE-2023-20989
+       RESERVED
+CVE-2023-20988
+       RESERVED
+CVE-2023-20987
+       RESERVED
+CVE-2023-20986
+       RESERVED
+CVE-2023-20985
+       RESERVED
+CVE-2023-20984
+       RESERVED
+CVE-2023-20983
+       RESERVED
+CVE-2023-20982
+       RESERVED
+CVE-2023-20981
+       RESERVED
+CVE-2023-20980
+       RESERVED
+CVE-2023-20979
+       RESERVED
+CVE-2023-20978
+       RESERVED
+CVE-2023-20977
+       RESERVED
+CVE-2023-20976
+       RESERVED
+CVE-2023-20975
+       RESERVED
+CVE-2023-20974
+       RESERVED
+CVE-2023-20973
+       RESERVED
+CVE-2023-20972
+       RESERVED
+CVE-2023-20971
+       RESERVED
+CVE-2023-20970
+       RESERVED
+CVE-2023-20969
+       RESERVED
+CVE-2023-20968
+       RESERVED
+CVE-2023-20967
+       RESERVED
+CVE-2023-20966
+       RESERVED
+CVE-2023-20965
+       RESERVED
+CVE-2023-20964
+       RESERVED
+CVE-2023-20963
+       RESERVED
+CVE-2023-20962
+       RESERVED
+CVE-2023-20961
+       RESERVED
+CVE-2023-20960
+       RESERVED
+CVE-2023-20959
+       RESERVED
+CVE-2023-20958
+       RESERVED
+CVE-2023-20957
+       RESERVED
+CVE-2023-20956
+       RESERVED
+CVE-2023-20955
+       RESERVED
+CVE-2023-20954
+       RESERVED
+CVE-2023-20953
+       RESERVED
+CVE-2023-20952
+       RESERVED
+CVE-2023-20951
+       RESERVED
+CVE-2023-20950
+       RESERVED
+CVE-2023-20949
+       RESERVED
+CVE-2023-20948
+       RESERVED
+CVE-2023-20947
+       RESERVED
+CVE-2023-20946
+       RESERVED
+CVE-2023-20945
+       RESERVED
+CVE-2023-20944
+       RESERVED
+CVE-2023-20943
+       RESERVED
+CVE-2023-20942
+       RESERVED
+CVE-2023-20941
+       RESERVED
+CVE-2023-20940
+       RESERVED
+CVE-2023-20939
+       RESERVED
+CVE-2023-20938
+       RESERVED
+CVE-2023-20937
+       RESERVED
+CVE-2023-20936
+       RESERVED
+CVE-2023-20935
+       RESERVED
+CVE-2023-20934
+       RESERVED
+CVE-2023-20933
+       RESERVED
+CVE-2023-20932
+       RESERVED
+CVE-2023-20931
+       RESERVED
+CVE-2023-20930
+       RESERVED
+CVE-2023-20929
+       RESERVED
+CVE-2023-20928
+       RESERVED
+CVE-2023-20927
+       RESERVED
+CVE-2023-20926
+       RESERVED
+CVE-2023-20925
+       RESERVED
+CVE-2023-20924
+       RESERVED
+CVE-2023-20923
+       RESERVED
+CVE-2023-20922
+       RESERVED
+CVE-2023-20921
+       RESERVED
+CVE-2023-20920
+       RESERVED
+CVE-2023-20919
+       RESERVED
+CVE-2023-20918
+       RESERVED
+CVE-2023-20917
+       RESERVED
+CVE-2023-20916
+       RESERVED
+CVE-2023-20915
+       RESERVED
+CVE-2023-20914
+       RESERVED
+CVE-2023-20913
+       RESERVED
+CVE-2023-20912
+       RESERVED
+CVE-2023-20911
+       RESERVED
+CVE-2023-20910
+       RESERVED
+CVE-2023-20909
+       RESERVED
+CVE-2023-20908
+       RESERVED
+CVE-2023-20907
+       RESERVED
+CVE-2023-20906
+       RESERVED
+CVE-2023-20905
+       RESERVED
+CVE-2023-20904
+       RESERVED
+CVE-2022-44714
+       RESERVED
+CVE-2022-44713
+       RESERVED
+CVE-2022-44712
+       RESERVED
+CVE-2022-44711
+       RESERVED
+CVE-2022-44710
+       RESERVED
+CVE-2022-44709
+       RESERVED
+CVE-2022-44708
+       RESERVED
+CVE-2022-44707
+       RESERVED
+CVE-2022-44706
+       RESERVED
+CVE-2022-44705
+       RESERVED
+CVE-2022-44704
+       RESERVED
+CVE-2022-44703
+       RESERVED
+CVE-2022-44702
+       RESERVED
+CVE-2022-44701
+       RESERVED
+CVE-2022-44700
+       RESERVED
+CVE-2022-44699
+       RESERVED
+CVE-2022-44698
+       RESERVED
+CVE-2022-44697
+       RESERVED
+CVE-2022-44696
+       RESERVED
+CVE-2022-44695
+       RESERVED
+CVE-2022-44694
+       RESERVED
+CVE-2022-44693
+       RESERVED
+CVE-2022-44692
+       RESERVED
+CVE-2022-44691
+       RESERVED
+CVE-2022-44690
+       RESERVED
+CVE-2022-44689
+       RESERVED
+CVE-2022-44688
+       RESERVED
+CVE-2022-44687
+       RESERVED
+CVE-2022-44686
+       RESERVED
+CVE-2022-44685
+       RESERVED
+CVE-2022-44684
+       RESERVED
+CVE-2022-44683
+       RESERVED
+CVE-2022-44682
+       RESERVED
+CVE-2022-44681
+       RESERVED
+CVE-2022-44680
+       RESERVED
+CVE-2022-44679
+       RESERVED
+CVE-2022-44678
+       RESERVED
+CVE-2022-44677
+       RESERVED
+CVE-2022-44676
+       RESERVED
+CVE-2022-44675
+       RESERVED
+CVE-2022-44674
+       RESERVED
+CVE-2022-44673
+       RESERVED
+CVE-2022-44672
+       RESERVED
+CVE-2022-44671
+       RESERVED
+CVE-2022-44670
+       RESERVED
+CVE-2022-44669
+       RESERVED
+CVE-2022-44668
+       RESERVED
+CVE-2022-44667
+       RESERVED
+CVE-2022-44666
+       RESERVED
+CVE-2022-44665
+       RESERVED
+CVE-2022-3855
+       RESERVED
+CVE-2022-3854
+       RESERVED
 CVE-2022-44664
        RESERVED
 CVE-2022-44663
@@ -99,10 +1203,10 @@ CVE-2022-44630
        RESERVED
 CVE-2022-44629
        RESERVED
-CVE-2022-44628
-       RESERVED
-CVE-2022-44627
-       RESERVED
+CVE-2022-44628 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability 
in Jump ...)
+       TODO: check
+CVE-2022-44627 (Cross-Site Request Forgery (CSRF) vulnerability in David Cole 
Simple S ...)
+       TODO: check
 CVE-2022-44626
        RESERVED
 CVE-2022-44625
@@ -418,7 +1522,8 @@ CVE-2022-3798 (A vulnerability classified as critical has 
been found in IBAX go-
        NOT-FOR-US: IBAX go-ibax
 CVE-2022-3797 (A vulnerability was found in eolinker apinto-dashboard. It has 
been ra ...)
        NOT-FOR-US: eolinker apinto-dashboard
-CVE-2022-3796 (A vulnerability was found in Events Calendar Plugin. It has 
been decla ...)
+CVE-2022-3796
+       REJECTED
        NOT-FOR-US: Events Calendar Plugin
 CVE-2022-3795
        RESERVED
@@ -677,16 +1782,16 @@ CVE-2022-44457
        RESERVED
 CVE-2022-43506
        RESERVED
-CVE-2022-43495
-       RESERVED
+CVE-2022-43495 (OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability 
in distr ...)
+       TODO: check
 CVE-2022-43457
        RESERVED
 CVE-2022-43452
        RESERVED
-CVE-2022-43451
-       RESERVED
-CVE-2022-43449
-       RESERVED
+CVE-2022-43451 (OpenHarmony-v3.1.2 and prior versions had an Multiple path 
traversal v ...)
+       TODO: check
+CVE-2022-43449 (OpenHarmony-v3.1.2 and prior versions had an Arbitrary file 
read vulne ...)
+       TODO: check
 CVE-2022-43447
        RESERVED
 CVE-2022-41775
@@ -705,7 +1810,8 @@ CVE-2022-3775
        RESERVED
 CVE-2022-3774 (A vulnerability was found in SourceCodester Train Scheduler App 
1.0 an ...)
        NOT-FOR-US: SourceCodester Train Scheduler App
-CVE-2022-3773 (A vulnerability has been found in EmbedPress Plugin and 
classified as  ...)
+CVE-2022-3773
+       REJECTED
        NOT-FOR-US: EmbedPress Plugin
 CVE-2022-3772 (A vulnerability, which was classified as problematic, was found 
in eas ...)
        NOT-FOR-US: easyii CMS
@@ -4520,14 +5626,14 @@ CVE-2022-43576
        RESERVED
 CVE-2022-43575
        RESERVED
-CVE-2022-43574
-       RESERVED
+CVE-2022-43574 ("IBM Robotic Process Automation 21.0.1, 21.0.2, 21.0.3, 
21.0.4, and 21 ...)
+       TODO: check
 CVE-2022-43573
        RESERVED
 CVE-2022-43572
        RESERVED
-CVE-2022-43571
-       RESERVED
+CVE-2022-43571 (In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, 
an authe ...)
+       TODO: check
 CVE-2022-43570
        RESERVED
 CVE-2022-43569
@@ -4546,8 +5652,8 @@ CVE-2022-43563
        RESERVED
 CVE-2022-43562
        RESERVED
-CVE-2022-43561
-       RESERVED
+CVE-2022-43561 (In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, 
a remote ...)
+       TODO: check
 CVE-2022-43560
        RESERVED
 CVE-2022-43559
@@ -5831,12 +6937,12 @@ CVE-2022-43065
        RESERVED
 CVE-2022-43064
        RESERVED
-CVE-2022-43063
-       RESERVED
-CVE-2022-43062
-       RESERVED
-CVE-2022-43061
-       RESERVED
+CVE-2022-43063 (Online Diagnostic Lab Management System v1.0 was discovered to 
contain ...)
+       TODO: check
+CVE-2022-43062 (Online Diagnostic Lab Management System v1.0 was discovered to 
contain ...)
+       TODO: check
+CVE-2022-43061 (Online Tours & Travels Management System v1.0 was 
discovered to co ...)
+       TODO: check
 CVE-2022-43060
        RESERVED
 CVE-2022-43059
@@ -6854,20 +7960,20 @@ CVE-2022-42751 (CandidATS version 3.0.0 allows an 
external attacker to elevate p
        NOT-FOR-US: CandidATS
 CVE-2022-42750 (CandidATS version 3.0.0 allows an external attacker to steal 
the cooki ...)
        NOT-FOR-US: CandidATS
-CVE-2022-42749
-       RESERVED
-CVE-2022-42748
-       RESERVED
-CVE-2022-42747
-       RESERVED
-CVE-2022-42746
-       RESERVED
-CVE-2022-42745
-       RESERVED
-CVE-2022-42744
-       RESERVED
-CVE-2022-42743
-       RESERVED
+CVE-2022-42749 (CandidATS version 3.0.0 on 'page' of the 'ajax.php' resource, 
allows a ...)
+       TODO: check
+CVE-2022-42748 (CandidATS version 3.0.0 on 'sortDirection' of the 'ajax.php' 
resource, ...)
+       TODO: check
+CVE-2022-42747 (CandidATS version 3.0.0 on 'sortBy' of the 'ajax.php' 
resource, allows ...)
+       TODO: check
+CVE-2022-42746 (CandidATS version 3.0.0 on 'indexFile' of the 'ajax.php' 
resource, all ...)
+       TODO: check
+CVE-2022-42745 (CandidATS version 3.0.0 allows an external attacker to read 
arbitrary  ...)
+       TODO: check
+CVE-2022-42744 (CandidATS version 3.0.0 allows an external attacker to perform 
CRUD op ...)
+       TODO: check
+CVE-2022-42743 (deep-parse-json version 1.0.2 allows an external attacker to 
edit or a ...)
+       TODO: check
 CVE-2022-42742
        RESERVED
 CVE-2022-42741
@@ -7625,8 +8731,8 @@ CVE-2022-42444
        RESERVED
 CVE-2022-42443
        RESERVED
-CVE-2022-42442
-       RESERVED
+CVE-2022-42442 ("IBM Robotic Process Automation for Cloud Pak 21.0.1, 21.0.2, 
21.0.3,  ...)
+       TODO: check
 CVE-2022-42441
        RESERVED
 CVE-2022-42440
@@ -9311,16 +10417,16 @@ CVE-2022-41715 (Programs which compile regular 
expressions from untrusted source
        NOTE: https://go.dev/issue/55949
        NOTE: 
https://github.com/golang/go/commit/645abfe529dc325e16daa17210640c2907d1c17a 
(go1.19.2)
        NOTE: 
https://github.com/golang/go/commit/e9017c2416ad0ef642f5e0c2eab2dbf3cba4d997 
(go1.18.7)
-CVE-2022-41714
-       RESERVED
-CVE-2022-41713
-       RESERVED
+CVE-2022-41714 (fastest-json-copy version 1.0.1 allows an external attacker to 
edit or ...)
+       TODO: check
+CVE-2022-41713 (deep-object-diff version 1.1.0 allows an external attacker to 
edit or  ...)
+       TODO: check
 CVE-2022-41712
        RESERVED
 CVE-2022-41711 (Badaso version 2.6.0 allows an unauthenticated remote attacker 
to exec ...)
        NOT-FOR-US: Badaso
-CVE-2022-41710
-       RESERVED
+CVE-2022-41710 (Markdownify version 1.4.1 allows an external attacker to 
remotely obta ...)
+       TODO: check
 CVE-2022-41709 (Markdownify version 1.4.1 allows an external attacker to 
execute arbit ...)
        NOT-FOR-US: Markdownify
 CVE-2022-41708 (Relatedcode's Messenger version 7bcd20b allows an 
authenticated extern ...)
@@ -11669,8 +12775,8 @@ CVE-2022-40749
        RESERVED
 CVE-2022-40748 (IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site scr ...)
        NOT-FOR-US: IBM
-CVE-2022-40747
-       RESERVED
+CVE-2022-40747 ("IBM InfoSphere Information Server 11.7 is vulnerable to an 
XML Extern ...)
+       TODO: check
 CVE-2022-40746
        RESERVED
 CVE-2022-40745
@@ -11850,8 +12956,8 @@ CVE-2022-40205
        RESERVED
 CVE-2022-40193 (Unauthenticated Stored Cross-Site Scripting (XSS) 
vulnerability in Awe ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-40131
-       RESERVED
+CVE-2022-40131 (Cross-Site Request Forgery (CSRF) vulnerability in a3rev 
Software Page ...)
+       TODO: check
 CVE-2022-38974
        RESERVED
 CVE-2022-38468
@@ -11872,8 +12978,8 @@ CVE-2022-36424
        RESERVED
 CVE-2022-36417 (Multiple Stored Cross-Site Scripting (XSS) via Cross-Site 
Request Forg ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-36404
-       RESERVED
+CVE-2022-36404 (Auth. (subscriber+) Broken Access Control vulnerability in 
David Cole  ...)
+       TODO: check
 CVE-2022-35238 (Unauthenticated Plugin Settings Change vulnerability in 
Awesome Filter ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-33978 (Reflected Cross-Site Scripting (XSS) vulnerability FontMeister 
plugin  ...)
@@ -12852,8 +13958,8 @@ CVE-2022-40278 (An issue was discovered in Samsung 
TizenRT through 3.0_GBM (and
        NOT-FOR-US: Samsung TizenRT
 CVE-2022-40277 (Joplin version 2.8.8 allows an external attacker to execute 
arbitrary  ...)
        NOT-FOR-US: Joplin
-CVE-2022-40276
-       RESERVED
+CVE-2022-40276 (Zettlr version 2.3.0 allows an external attacker to remotely 
obtain ar ...)
+       TODO: check
 CVE-2022-40275
        RESERVED
 CVE-2022-40274 (Gridea version 0.9.3 allows an external attacker to execute 
arbitrary  ...)
@@ -12953,8 +14059,8 @@ CVE-2022-40237
        RESERVED
 CVE-2022-40236
        RESERVED
-CVE-2022-40235
-       RESERVED
+CVE-2022-40235 ("IBM InfoSphere Information Server 11.7 could allow a user to 
cause a  ...)
+       TODO: check
 CVE-2022-40234 (Versions of IBM Spectrum Protect Plus prior to 10.1.12 
(excluding 10.1 ...)
        NOT-FOR-US: IBM
 CVE-2022-40233
@@ -12963,8 +14069,8 @@ CVE-2022-40232
        RESERVED
 CVE-2022-40231
        RESERVED
-CVE-2022-40230
-       RESERVED
+CVE-2022-40230 ("IBM MQ Appliance 9.2 CD, 9.2 LTS, 9.3 CD, and LTS 9.3 does 
not invali ...)
+       TODO: check
 CVE-2022-40229
        RESERVED
 CVE-2022-40228
@@ -16846,12 +17952,12 @@ CVE-2022-38714
        RESERVED
 CVE-2022-38713
        RESERVED
-CVE-2022-38712
-       RESERVED
+CVE-2022-38712 ("IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Web 
services  ...)
+       TODO: check
 CVE-2022-38711
        RESERVED
-CVE-2022-38710
-       RESERVED
+CVE-2022-38710 ("IBM Robotic Process Automation 21.0.1 and 21.0.2 could 
disclose sensi ...)
+       TODO: check
 CVE-2022-38709 (IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 for 
Cloud Pa ...)
        NOT-FOR-US: IBM
 CVE-2022-38708
@@ -18656,8 +19762,8 @@ CVE-2022-2760 (In affected versions of Octopus Deploy 
it is possible to reveal t
        NOT-FOR-US: Octopus Deploy
 CVE-2022-38169
        RESERVED
-CVE-2022-38168
-       RESERVED
+CVE-2022-38168 (Broken Access Control in User Authentication in Avaya Scopia 
Pathfinde ...)
+       TODO: check
 CVE-2022-38167
        RESERVED
 CVE-2022-38166
@@ -18887,8 +19993,8 @@ CVE-2022-36793 (Unauthenticated Plugin Settings Change 
& Data Deletion vulne
        NOT-FOR-US: WordPress plugin
 CVE-2022-36791 (Authenticated (contributor+) Stored Cross-Site Scripting (XSS) 
vulnera ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-36428
-       RESERVED
+CVE-2022-36428 (Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in 
Stage Rock  ...)
+       TODO: check
 CVE-2022-36427 (Missing Access Control vulnerability in About Rentals. Inc. 
About Rent ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-36425 (Broken Access Control vulnerability in Beaver Builder plugin 
<= 2.5 ...)
@@ -19260,28 +20366,28 @@ CVE-2022-37914 (Vulnerabilities in the web-based 
management interface of Aruba E
        NOT-FOR-US: Aruba
 CVE-2022-37913 (Vulnerabilities in the web-based management interface of Aruba 
EdgeCon ...)
        NOT-FOR-US: Aruba
-CVE-2022-37912
-       RESERVED
-CVE-2022-37911
-       RESERVED
-CVE-2022-37910
-       RESERVED
-CVE-2022-37909
-       RESERVED
-CVE-2022-37908
-       RESERVED
-CVE-2022-37907
-       RESERVED
-CVE-2022-37906
-       RESERVED
-CVE-2022-37905
-       RESERVED
-CVE-2022-37904
-       RESERVED
-CVE-2022-37903
-       RESERVED
-CVE-2022-37902
-       RESERVED
+CVE-2022-37912 (Authenticated command injection vulnerabilities exist in the 
ArubaOS c ...)
+       TODO: check
+CVE-2022-37911 (Due to improper restrictions on XML entities multiple 
vulnerabilities  ...)
+       TODO: check
+CVE-2022-37910 (A buffer overflow vulnerability exists in the ArubaOS command 
line int ...)
+       TODO: check
+CVE-2022-37909 (Aruba has identified certain configurations of ArubaOS that 
can lead t ...)
+       TODO: check
+CVE-2022-37908 (An authenticated attacker can impact the integrity of the 
ArubaOS boot ...)
+       TODO: check
+CVE-2022-37907 (A vulnerability exists in the ArubaOS bootloader on 7xxx 
series contro ...)
+       TODO: check
+CVE-2022-37906 (An authenticated path traversal vulnerability exists in the 
ArubaOS co ...)
+       TODO: check
+CVE-2022-37905 (Vulnerabilities in ArubaOS running on 7xxx series controllers 
exist th ...)
+       TODO: check
+CVE-2022-37904 (Vulnerabilities in ArubaOS running on 7xxx series controllers 
exist th ...)
+       TODO: check
+CVE-2022-37903 (A vulnerability exists that allows an authenticated attacker 
to overwr ...)
+       TODO: check
+CVE-2022-37902 (Authenticated command injection vulnerabilities exist in the 
ArubaOS c ...)
+       TODO: check
 CVE-2022-37901 (Authenticated command injection vulnerabilities exist in the 
ArubaOS c ...)
        TODO: check
 CVE-2022-37900 (Authenticated command injection vulnerabilities exist in the 
ArubaOS c ...)
@@ -24891,8 +25997,8 @@ CVE-2022-35719
        RESERVED
 CVE-2022-35718
        RESERVED
-CVE-2022-35717
-       RESERVED
+CVE-2022-35717 ("IBM InfoSphere Information Server 11.7 could allow a locally 
authenti ...)
+       TODO: check
 CVE-2022-35716 (IBM UrbanCode Deploy (UCD) 6.2.0.0 through 6.2.7.16, 7.0.0.0 
through 7 ...)
        NOT-FOR-US: IBM
 CVE-2022-35715 (IBM InfoSphere Information Server 11.7 could allow a remote 
attacker t ...)
@@ -25090,8 +26196,8 @@ CVE-2022-35644
        RESERVED
 CVE-2022-35643 (IBM PowerVM VIOS 3.1 could allow a remote attacker to tamper 
with syst ...)
        NOT-FOR-US: IBM
-CVE-2022-35642
-       RESERVED
+CVE-2022-35642 ("IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site sc ...)
+       TODO: check
 CVE-2022-35641
        RESERVED
 CVE-2022-35640
@@ -26067,8 +27173,8 @@ CVE-2022-35281
        RESERVED
 CVE-2022-35280 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 does 
not req ...)
        NOT-FOR-US: IBM
-CVE-2022-35279
-       RESERVED
+CVE-2022-35279 ("IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 
18.0.0.2, 19.0.0 ...)
+       TODO: check
 CVE-2022-35278 (In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could 
show mal ...)
        NOT-FOR-US: Apache ActiveMQ Artemis
 CVE-2022-34850 (An OS command injection vulnerability exists in the web_server 
/action ...)
@@ -27391,8 +28497,8 @@ CVE-2022-27235 (Multiple Broken Access Control 
vulnerabilities in Social Share B
        NOT-FOR-US: WordPress plugin
 CVE-2022-26366
        RESERVED
-CVE-2022-25952
-       RESERVED
+CVE-2022-25952 (Cross-Site Request Forgery (CSRF) vulnerability in Keywordrush 
Content ...)
+       TODO: check
 CVE-2022-2276 (The WP Edit Menu WordPress plugin before 1.5.0 does not have 
authorisa ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-2275 (The WP Edit Menu WordPress plugin before 1.5.0 does not have 
CSRF in a ...)
@@ -28832,8 +29938,8 @@ CVE-2022-34341
        RESERVED
 CVE-2022-34340
        RESERVED
-CVE-2022-34339
-       RESERVED
+CVE-2022-34339 ("IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user 
credentials i ...)
+       TODO: check
 CVE-2022-34338 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 
could disclo ...)
        NOT-FOR-US: IBM
 CVE-2022-34337
@@ -39084,8 +40190,8 @@ CVE-2022-1700 (Improper Restriction of XML External 
Entity Reference ('XXE') vul
        NOT-FOR-US: Forcepoint
 CVE-2022-30616 (IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 
could allow  ...)
        NOT-FOR-US: IBM
-CVE-2022-30615
-       RESERVED
+CVE-2022-30615 ("IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site sc ...)
+       TODO: check
 CVE-2022-30614 (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable 
to a den ...)
        NOT-FOR-US: IBM
 CVE-2022-30613 (IBM QRadar SIEM 7.4 and 7.5 could disclose sensitive 
information via a ...)
@@ -39098,8 +40204,8 @@ CVE-2022-30610 (IBM Spectrum Copy Data Management 
2.2.0.0 through 2.2.15.0 is vu
        NOT-FOR-US: IBM
 CVE-2022-30609
        RESERVED
-CVE-2022-30608
-       RESERVED
+CVE-2022-30608 ("IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site re ...)
+       TODO: check
 CVE-2022-30607 (IBM Robotic Process Automation 20.10.0, 20.12.5, 21.0.0, 
21.0.1, and 2 ...)
        NOT-FOR-US: IBM
 CVE-2022-30546 (Out-of-bounds read vulnerability exists in the simulator 
module contai ...)
@@ -52776,7 +53882,7 @@ CVE-2022-25894
        RESERVED
 CVE-2022-25893
        RESERVED
-CVE-2022-25892 (The package muhammara before 2.6.1, from 3.1.0 and before 
3.1.1; all v ...)
+CVE-2022-25892 (The package muhammara before 2.6.1, from 3.0.0 and before 
3.1.1; all v ...)
        TODO: check
 CVE-2022-25891 (The package github.com/containrrr/shoutrrr/pkg/util before 
0.6.0 are v ...)
        NOT-FOR-US: github.com/containrrr/shoutrrr/pkg/util
@@ -64937,8 +66043,8 @@ CVE-2022-22444 (IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 
could allow a local user to
        NOT-FOR-US: IBM
 CVE-2022-22443 (IBM InfoSphere Information Server 11.7 is vulnerable to 
cross-site scr ...)
        NOT-FOR-US: IBM
-CVE-2022-22442
-       RESERVED
+CVE-2022-22442 ("IBM InfoSphere Information Server 11.7 could allow an 
authenticated u ...)
+       TODO: check
 CVE-2022-22441 (IBM InfoSphere Information Server 11.7 could allow an 
authenticated us ...)
        NOT-FOR-US: IBM
 CVE-2022-22440
@@ -64971,8 +66077,8 @@ CVE-2022-22427 (IBM InfoSphere Information Server 11.7 
is vulnerable to cross-si
        NOT-FOR-US: IBM
 CVE-2022-22426 (IBM Spectrum Copy Data Management Admin 2.2.0.0 through 
2.2.15.0 could ...)
        NOT-FOR-US: IBM
-CVE-2022-22425
-       RESERVED
+CVE-2022-22425 ("IBM InfoSphere Information Server 11.7 is potentially 
vulnerable to C ...)
+       TODO: check
 CVE-2022-22424 (IBM QRadar SIEM 7.3, 7.4, and 7.5 could allow a local user to 
obtain s ...)
        NOT-FOR-US: IBM
 CVE-2022-22423 (IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 
and CCA 7. ...)
@@ -69905,8 +71011,8 @@ CVE-2021-44864 (TP-Link WR886N 3.0 1.0.1 Build 150127 
Rel.34123n is vulnerable t
        NOT-FOR-US: TP-Link
 CVE-2021-44863
        RESERVED
-CVE-2021-44862
-       RESERVED
+CVE-2021-44862 (Netskope client is impacted by a vulnerability where an 
authenticated, ...)
+       TODO: check
 CVE-2021-44861
        RESERVED
 CVE-2021-44860 (An out-of-bounds read vulnerability exists when reading a TIF 
file usi ...)
@@ -76028,6 +77134,7 @@ CVE-2021-43307 (An exponential ReDoS (Regular 
Expression Denial of Service) can
 CVE-2021-43306 (An exponential ReDoS (Regular Expression Denial of Service) 
can be tri ...)
        NOT-FOR-US: Node jquery-validation
 CVE-2021-43305 (Heap buffer overflow in Clickhouse's LZ4 compression codec 
when parsin ...)
+       {DLA-3176-1}
        - clickhouse <unfixed> (bug #1008216)
        [bullseye] - clickhouse <no-dsa> (Minor issue)
        NOTE: 
https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9
 (v21.9.1.7685)
@@ -76035,6 +77142,7 @@ CVE-2021-43305 (Heap buffer overflow in Clickhouse's 
LZ4 compression codec when
        NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
        NOTE: 
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-43304 (Heap buffer overflow in Clickhouse's LZ4 compression codec 
when parsin ...)
+       {DLA-3176-1}
        - clickhouse <unfixed> (bug #1008216)
        [bullseye] - clickhouse <no-dsa> (Minor issue)
        NOTE: 
https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9
 (v21.9.1.7685)
@@ -80439,6 +81547,7 @@ CVE-2021-42389 (Divide-by-zero in Clickhouse's Delta 
compression codec when pars
        - clickhouse <not-affected> (Vulnerable code introduced later)
        NOTE: 
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec 
when par ...)
+       {DLA-3176-1}
        - clickhouse <unfixed> (bug #1008216)
        [bullseye] - clickhouse <no-dsa> (Minor issue)
        NOTE: 
https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9
 (v21.9.1.7685)
@@ -80446,6 +81555,7 @@ CVE-2021-42388 (Heap out-of-bounds read in Clickhouse's 
LZ4 compression codec wh
        NOTE: https://github.com/ClickHouse/ClickHouse/pull/27136
        NOTE: 
https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms/
 CVE-2021-42387 (Heap out-of-bounds read in Clickhouse's LZ4 compression codec 
when par ...)
+       {DLA-3176-1}
        - clickhouse <unfixed> (bug #1008216)
        [bullseye] - clickhouse <no-dsa> (Minor issue)
        NOTE: 
https://github.com/ClickHouse/ClickHouse/commit/2aea1c8d4a5be320365472052d8a48bf69fd9fe9
 (v21.9.1.7685)
@@ -89178,8 +90288,8 @@ CVE-2021-39079 (IBM Cognos Analytics Mobile for Android 
applications prior to ve
        NOT-FOR-US: IBM
 CVE-2021-39078 (IBM Security Guardium 10.5 stores user credentials in plain 
clear text ...)
        NOT-FOR-US: IBM
-CVE-2021-39077
-       RESERVED
+CVE-2021-39077 ("IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 
11.4 st ...)
+       TODO: check
 CVE-2021-39076 (IBM Security Guardium 10.5 and 11.3 uses weaker than expected 
cryptogr ...)
        NOT-FOR-US: IBM
 CVE-2021-39075
@@ -94648,8 +95758,8 @@ CVE-2021-36908 (Cross-Site Request Forgery (CSRF) 
vulnerability leading to Datab
        NOT-FOR-US: WordPress plugin
 CVE-2021-36907
        RESERVED
-CVE-2021-36906
-       RESERVED
+CVE-2021-36906 (Multiple Insecure Direct Object References (IDOR) 
vulnerabilities in E ...)
+       TODO: check
 CVE-2021-36905
        RESERVED
 CVE-2021-36904



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8a2086ac20228aa048f96d5e6765e490b036d0b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to