
CVE-2023-38623 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38623
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38622 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38622
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38621 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38621
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38620 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38620
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38619 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38619
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38618 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38618
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-38649 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38649
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2023-38648 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-38648
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2023-35004 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-35004
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-190: Integer Overflow or Wraparound •

CVE-2023-39235 – Debian Security Advisory 5653-1
https://notcve.org/view.php?id=CVE-2023-39235
08 Jan 2024 — A specially crafted .vzt file can lead to arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2024/04/msg00007.html • CWE-129: Improper Validation of Array Index •