Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
93b7c3c7 by security tracker role at 2023-03-14T08:10:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,291 @@
+CVE-2023-28325
+       RESERVED
+CVE-2023-28324
+       RESERVED
+CVE-2023-28323
+       RESERVED
+CVE-2023-28322
+       RESERVED
+CVE-2023-28321
+       RESERVED
+CVE-2023-28320
+       RESERVED
+CVE-2023-28319
+       RESERVED
+CVE-2023-28318
+       RESERVED
+CVE-2023-28317
+       RESERVED
+CVE-2023-28316
+       RESERVED
+CVE-2023-28315
+       RESERVED
+CVE-2023-28314
+       RESERVED
+CVE-2023-28313
+       RESERVED
+CVE-2023-28312
+       RESERVED
+CVE-2023-28311
+       RESERVED
+CVE-2023-28310
+       RESERVED
+CVE-2023-28309
+       RESERVED
+CVE-2023-28308
+       RESERVED
+CVE-2023-28307
+       RESERVED
+CVE-2023-28306
+       RESERVED
+CVE-2023-28305
+       RESERVED
+CVE-2023-28304
+       RESERVED
+CVE-2023-28303
+       RESERVED
+CVE-2023-28302
+       RESERVED
+CVE-2023-28301
+       RESERVED
+CVE-2023-28300
+       RESERVED
+CVE-2023-28299
+       RESERVED
+CVE-2023-28298
+       RESERVED
+CVE-2023-28297
+       RESERVED
+CVE-2023-28296
+       RESERVED
+CVE-2023-28295
+       RESERVED
+CVE-2023-28294
+       RESERVED
+CVE-2023-28293
+       RESERVED
+CVE-2023-28292
+       RESERVED
+CVE-2023-28291
+       RESERVED
+CVE-2023-28290
+       RESERVED
+CVE-2023-28289
+       RESERVED
+CVE-2023-28288
+       RESERVED
+CVE-2023-28287
+       RESERVED
+CVE-2023-28286
+       RESERVED
+CVE-2023-28285
+       RESERVED
+CVE-2023-28284
+       RESERVED
+CVE-2023-28283
+       RESERVED
+CVE-2023-28282
+       RESERVED
+CVE-2023-28281
+       RESERVED
+CVE-2023-28280
+       RESERVED
+CVE-2023-28279
+       RESERVED
+CVE-2023-28278
+       RESERVED
+CVE-2023-28277
+       RESERVED
+CVE-2023-28276
+       RESERVED
+CVE-2023-28275
+       RESERVED
+CVE-2023-28274
+       RESERVED
+CVE-2023-28273
+       RESERVED
+CVE-2023-28272
+       RESERVED
+CVE-2023-28271
+       RESERVED
+CVE-2023-28270
+       RESERVED
+CVE-2023-28269
+       RESERVED
+CVE-2023-28268
+       RESERVED
+CVE-2023-28267
+       RESERVED
+CVE-2023-28266
+       RESERVED
+CVE-2023-28265
+       RESERVED
+CVE-2023-28264
+       RESERVED
+CVE-2023-28263
+       RESERVED
+CVE-2023-28262
+       RESERVED
+CVE-2023-28261
+       RESERVED
+CVE-2023-28260
+       RESERVED
+CVE-2023-28259
+       RESERVED
+CVE-2023-28258
+       RESERVED
+CVE-2023-28257
+       RESERVED
+CVE-2023-28256
+       RESERVED
+CVE-2023-28255
+       RESERVED
+CVE-2023-28254
+       RESERVED
+CVE-2023-28253
+       RESERVED
+CVE-2023-28252
+       RESERVED
+CVE-2023-28251
+       RESERVED
+CVE-2023-28250
+       RESERVED
+CVE-2023-28249
+       RESERVED
+CVE-2023-28248
+       RESERVED
+CVE-2023-28247
+       RESERVED
+CVE-2023-28246
+       RESERVED
+CVE-2023-28245
+       RESERVED
+CVE-2023-28244
+       RESERVED
+CVE-2023-28243
+       RESERVED
+CVE-2023-28242
+       RESERVED
+CVE-2023-28241
+       RESERVED
+CVE-2023-28240
+       RESERVED
+CVE-2023-28239
+       RESERVED
+CVE-2023-28238
+       RESERVED
+CVE-2023-28237
+       RESERVED
+CVE-2023-28236
+       RESERVED
+CVE-2023-28235
+       RESERVED
+CVE-2023-28234
+       RESERVED
+CVE-2023-28233
+       RESERVED
+CVE-2023-28232
+       RESERVED
+CVE-2023-28231
+       RESERVED
+CVE-2023-28230
+       RESERVED
+CVE-2023-28229
+       RESERVED
+CVE-2023-28228
+       RESERVED
+CVE-2023-28227
+       RESERVED
+CVE-2023-28226
+       RESERVED
+CVE-2023-28225
+       RESERVED
+CVE-2023-28224
+       RESERVED
+CVE-2023-28223
+       RESERVED
+CVE-2023-28222
+       RESERVED
+CVE-2023-28221
+       RESERVED
+CVE-2023-28220
+       RESERVED
+CVE-2023-28219
+       RESERVED
+CVE-2023-28218
+       RESERVED
+CVE-2023-28217
+       RESERVED
+CVE-2023-28216
+       RESERVED
+CVE-2023-27917
+       RESERVED
+CVE-2023-27389
+       RESERVED
+CVE-2023-23575
+       RESERVED
+CVE-2023-1381
+       RESERVED
+CVE-2022-48402
+       RESERVED
+CVE-2022-48401
+       RESERVED
+CVE-2022-48400
+       RESERVED
+CVE-2022-48399
+       RESERVED
+CVE-2022-48398
+       RESERVED
+CVE-2022-48397
+       RESERVED
+CVE-2022-48396
+       RESERVED
+CVE-2022-48395
+       RESERVED
+CVE-2022-48394
+       RESERVED
+CVE-2022-48393
+       RESERVED
+CVE-2020-36680
+       RESERVED
+CVE-2020-36679
+       RESERVED
+CVE-2020-36678
+       RESERVED
+CVE-2020-36677
+       RESERVED
+CVE-2020-36676
+       RESERVED
+CVE-2020-36675
+       RESERVED
+CVE-2020-36674
+       RESERVED
+CVE-2020-36673
+       RESERVED
+CVE-2020-36672
+       RESERVED
+CVE-2020-36671
+       RESERVED
+CVE-2019-25115
+       RESERVED
+CVE-2019-25114
+       RESERVED
+CVE-2019-25113
+       RESERVED
+CVE-2019-25112
+       RESERVED
+CVE-2019-25111
+       RESERVED
+CVE-2019-25110
+       RESERVED
+CVE-2019-25109
+       RESERVED
+CVE-2019-25108
+       RESERVED
+CVE-2019-25107
+       RESERVED
+CVE-2019-25106
+       RESERVED
 CVE-2023-28215
        RESERVED
 CVE-2023-28214
@@ -980,14 +1268,14 @@ CVE-2023-27898 (Jenkins 2.270 through 2.393 (both 
inclusive), LTS 2.277.1 throug
        - jenkins <removed>
 CVE-2023-27897
        RESERVED
-CVE-2023-27896
-       RESERVED
-CVE-2023-27895
-       RESERVED
-CVE-2023-27894
-       RESERVED
-CVE-2023-27893
-       RESERVED
+CVE-2023-27896 (In SAP BusinessObjects Business Intelligence Platform - 
version 420, 4 ...)
+       TODO: check
+CVE-2023-27895 (SAP Authenticator for Android - version 1.3.0, allows the 
screen to be ...)
+       TODO: check
+CVE-2023-27894 (SAP BusinessObjects Business Intelligence Platform (Web 
Services) - ve ...)
+       TODO: check
+CVE-2023-27893 (An attacker authenticated as a user with a non-administrative 
role and ...)
+       TODO: check
 CVE-2023-1258
        RESERVED
 CVE-2023-1257 (An attacker with physical access to the affected Moxa UC Series 
device ...)
@@ -1876,20 +2164,20 @@ CVE-2023-27589
        RESERVED
 CVE-2023-27588
        RESERVED
-CVE-2023-27587
-       RESERVED
+CVE-2023-27587 (ReadtoMyShoe, a web app that lets users upload articles and 
listen to  ...)
+       TODO: check
 CVE-2023-27586
        RESERVED
 CVE-2023-27585
        RESERVED
 CVE-2023-27584
        RESERVED
-CVE-2023-27583
-       RESERVED
-CVE-2023-27582
-       RESERVED
-CVE-2023-27581
-       RESERVED
+CVE-2023-27583 (PanIndex is a network disk directory index. In Panindex prior 
to versi ...)
+       TODO: check
+CVE-2023-27582 (maddy is a composable, all-in-one mail server. Starting with 
version 0 ...)
+       TODO: check
+CVE-2023-27581 (github-slug-action is a GitHub Action to expose slug value of 
GitHub e ...)
+       TODO: check
 CVE-2023-27580 (CodeIgniter Shield provides authentication and authorization 
for the C ...)
        TODO: check
 CVE-2023-27579
@@ -2124,14 +2412,14 @@ CVE-2023-27506
        RESERVED
 CVE-2023-27505
        RESERVED
-CVE-2023-27501
-       RESERVED
-CVE-2023-27500
-       RESERVED
+CVE-2023-27501 (SAP NetWeaver AS for ABAP and ABAP Platform - versions 700, 
701, 702,  ...)
+       TODO: check
+CVE-2023-27500 (An attacker with non-administrative authorizations can exploit 
a direc ...)
+       TODO: check
 CVE-2023-27499
        RESERVED
-CVE-2023-27498
-       RESERVED
+CVE-2023-27498 (SAP Host Agent (SAPOSCOL) - version 7.22, allows an 
unauthenticated at ...)
+       TODO: check
 CVE-2023-27497
        RESERVED
 CVE-2023-27393
@@ -2786,14 +3074,14 @@ CVE-2023-27273
        RESERVED
 CVE-2023-27272
        RESERVED
-CVE-2023-27271
-       RESERVED
-CVE-2023-27270
-       RESERVED
-CVE-2023-27269
-       RESERVED
-CVE-2023-27268
-       RESERVED
+CVE-2023-27271 (In SAP BusinessObjects Business Intelligence Platform (Web 
Services) - ...)
+       TODO: check
+CVE-2023-27270 (SAP NetWeaver Application Server for ABAP and ABAP Platform - 
versions ...)
+       TODO: check
+CVE-2023-27269 (SAP NetWeaver Application Server for ABAP and ABAP Platform - 
versions ...)
+       TODO: check
+CVE-2023-27268 (SAP NetWeaver AS Java (Object Analyzing Service) - version 
7.50, does  ...)
+       TODO: check
 CVE-2023-27267
        RESERVED
 CVE-2023-27266 (Mattermost fails to honor the ShowEmailAddress setting when 
constructi ...)
@@ -3328,8 +3616,8 @@ CVE-2023-27054
        RESERVED
 CVE-2023-27053
        RESERVED
-CVE-2023-27052
-       RESERVED
+CVE-2023-27052 (E-Commerce System v1.0 ws discovered to contain a SQL 
injection vulner ...)
+       TODO: check
 CVE-2023-27051
        RESERVED
 CVE-2023-27050
@@ -4735,16 +5023,16 @@ CVE-2023-26463
        NOTE: Introduced by: 
https://github.com/strongswan/strongswan/commit/63fd718915b5d246dcc5560382db0c30de309040
 (5.9.8dr1)
 CVE-2023-26462 (ThingsBoard 3.4.1 could allow a remote attacker to gain 
elevated privi ...)
        NOT-FOR-US: ThingsBoard
-CVE-2023-26461
-       RESERVED
-CVE-2023-26460
-       RESERVED
-CVE-2023-26459
-       RESERVED
+CVE-2023-26461 (SAP NetWeaver allows (SAP Enterprise Portal) - version 7.50, 
allows an ...)
+       TODO: check
+CVE-2023-26460 (Cache Management Service in SAP NetWeaver Application Server 
for Java  ...)
+       TODO: check
+CVE-2023-26459 (Due to improper input controls In SAP NetWeaver AS for ABAP 
and ABAP P ...)
+       TODO: check
 CVE-2023-26458
        RESERVED
-CVE-2023-26457
-       RESERVED
+CVE-2023-26457 (SAP Content Server - version 7.53, does not sufficiently 
encode user-c ...)
+       TODO: check
 CVE-2023-26456
        RESERVED
 CVE-2023-26455
@@ -6492,10 +6780,10 @@ CVE-2023-25805 (versionn, software for changing version 
information across multi
        NOT-FOR-US: Node versionn
 CVE-2023-25804
        RESERVED
-CVE-2023-25803
-       RESERVED
-CVE-2023-25802
-       RESERVED
+CVE-2023-25803 (Roxy-WI is a Web interface for managing Haproxy, Nginx, 
Apache, and Ke ...)
+       TODO: check
+CVE-2023-25802 (Roxy-WI is a Web interface for managing Haproxy, Nginx, 
Apache, and Ke ...)
+       TODO: check
 CVE-2023-25801
        RESERVED
 CVE-2023-25800
@@ -7247,14 +7535,14 @@ CVE-2023-25620
        RESERVED
 CVE-2023-25619
        RESERVED
-CVE-2023-25618
-       RESERVED
-CVE-2023-25617
-       RESERVED
-CVE-2023-25616
-       RESERVED
-CVE-2023-25615
-       RESERVED
+CVE-2023-25618 (SAP NetWeaver Application Server for ABAP and ABAP Platform - 
versions ...)
+       TODO: check
+CVE-2023-25617 (SAP Business Object (Adaptive Job Server) - versions 420, 430, 
allows  ...)
+       TODO: check
+CVE-2023-25616 (In some scenario, SAP Business Objects Business Intelligence 
Platform  ...)
+       TODO: check
+CVE-2023-25615 (Due to insufficient input sanitization, SAP ABAP - versions 
751, 753,  ...)
+       TODO: check
 CVE-2023-25614 (SAP NetWeaver AS ABAP (BSP Framework) application - versions 
700, 701, ...)
        NOT-FOR-US: SAP
 CVE-2023-25613 (An LDAP Injection vulnerability exists in the 
LdapIdentityBackend of A ...)
@@ -8331,8 +8619,8 @@ CVE-2023-25209
        RESERVED
 CVE-2023-25208
        RESERVED
-CVE-2023-25207
-       RESERVED
+CVE-2023-25207 (PrestaShop dpdfrance &lt;6.1.3 is vulnerable to SQL Injection 
via dpdf ...)
+       TODO: check
 CVE-2023-25206
        RESERVED
 CVE-2023-25205
@@ -10310,8 +10598,8 @@ CVE-2023-24528 (SAP Fiori apps for Travel Management in 
SAP ERP (My Travel Reque
        NOT-FOR-US: SAP
 CVE-2023-24527
        RESERVED
-CVE-2023-24526
-       RESERVED
+CVE-2023-24526 (SAP NetWeaver Application Server Java for Classload Service - 
version  ...)
+       TODO: check
 CVE-2023-24525 (SAP CRM WebClient UI - versions WEBCUIF 748, 800, 801, S4FND 
102, 103, ...)
        NOT-FOR-US: SAP
 CVE-2023-24524 (SAP S/4 HANA Map Treasury Correspondence Format Data does not 
perform  ...)
@@ -10817,8 +11105,8 @@ CVE-2023-24370
        RESERVED
 CVE-2023-24369 (A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 
allows atta ...)
        NOT-FOR-US: UJCMS
-CVE-2023-24368
-       RESERVED
+CVE-2023-24368 (Incorrect access control in Temenos T24 Release 20 allows 
attackers to ...)
+       TODO: check
 CVE-2023-24367
        RESERVED
 CVE-2023-24366
@@ -11005,8 +11293,8 @@ CVE-2023-24281
        RESERVED
 CVE-2023-24280
        RESERVED
-CVE-2023-24279
-       RESERVED
+CVE-2023-24279 (A cross-site scripting (XSS) vulnerability in Open Networking 
Foundati ...)
+       TODO: check
 CVE-2023-24278
        RESERVED
 CVE-2023-24277
@@ -12044,8 +12332,8 @@ CVE-2023-23859 (SAP NetWeaver AS for ABAP and ABAP 
Platform - versions 740, 750,
        NOT-FOR-US: SAP
 CVE-2023-23858 (Due to insufficient input validation, SAP NetWeaver AS for 
ABAP and AB ...)
        NOT-FOR-US: SAP
-CVE-2023-23857
-       RESERVED
+CVE-2023-23857 (Due to missing authentication check, SAP NetWeaver AS for Java 
- versi ...)
+       TODO: check
 CVE-2023-23856 (In SAP BusinessObjects Business Intelligence (Web Intelligence 
user in ...)
        NOT-FOR-US: SAP
 CVE-2023-23855 (SAP Solution Manager - version 720, allows an authenticated 
attacker t ...)
@@ -12411,28 +12699,28 @@ CVE-2023-0357
        RESERVED
 CVE-2023-0356 (SOCOMEC MODULYS GP Netvision versions 7.20 and prior lack 
strong encry ...)
        NOT-FOR-US: SOCOMEC MODULYS GP Netvision
-CVE-2023-0355
-       RESERVED
-CVE-2023-0354
-       RESERVED
-CVE-2023-0353
-       RESERVED
-CVE-2023-0352
-       RESERVED
-CVE-2023-0351
-       RESERVED
-CVE-2023-0350
-       RESERVED
-CVE-2023-0349
-       RESERVED
-CVE-2023-0348
-       RESERVED
-CVE-2023-0347
-       RESERVED
-CVE-2023-0346
-       RESERVED
-CVE-2023-0345
-       RESERVED
+CVE-2023-0355 (Akuvox E11 uses a hard-coded cryptographic key, which could 
allow an a ...)
+       TODO: check
+CVE-2023-0354 (The Akuvox E11 web server can be accessed without any user 
authenticat ...)
+       TODO: check
+CVE-2023-0353 (Akuvox E11 uses a weak encryption algorithm for stored 
passwords and u ...)
+       TODO: check
+CVE-2023-0352 (The Akuvox E11 password recovery webpage can be accessed 
without authe ...)
+       TODO: check
+CVE-2023-0351 (The Akuvox E11 web server backend library allows command 
injection in  ...)
+       TODO: check
+CVE-2023-0350 (Akuvox E11 does not ensure that a file extension is associated 
with th ...)
+       TODO: check
+CVE-2023-0349 (The Akuvox E11 libvoice library provides unauthenticated access 
to the ...)
+       TODO: check
+CVE-2023-0348 (Akuvox E11 allows direct SIP calls. No access control is 
enforced by t ...)
+       TODO: check
+CVE-2023-0347 (The Akuvox E11 Media Access Control (MAC) address, a primary 
identifie ...)
+       TODO: check
+CVE-2023-0346 (Akuvox E11 cloud login is performed through an unencrypted HTTP 
connec ...)
+       TODO: check
+CVE-2023-0345 (The Akuvox E11 secure shell (SSH) server is enabled by default 
and can ...)
+       TODO: check
 CVE-2023-0344
        RESERVED
 CVE-2023-0343
@@ -18032,8 +18320,8 @@ CVE-2023-0023 (In SAP Bank Account Management (Manage 
Banks) application, when a
        NOT-FOR-US: SAP
 CVE-2023-0022 (SAP BusinessObjects Business Intelligence Analysis edition for 
OLAP al ...)
        NOT-FOR-US: SAP
-CVE-2023-0021
-       RESERVED
+CVE-2023-0021 (Due to insufficient encoding of user input, SAP NetWeaver - 
versions 7 ...)
+       TODO: check
 CVE-2022-47926 (AyaCMS 3.1.2 is vulnerable to file deletion via 
/aya/module/admin/fst_ ...)
        NOT-FOR-US: AyaCMS
 CVE-2022-4663 (The Members Import plugin for WordPress is vulnerable to Self 
Cross-Si ...)
@@ -18899,8 +19187,8 @@ CVE-2022-47597
        RESERVED
 CVE-2022-47596
        RESERVED
-CVE-2022-47595
-       RESERVED
+CVE-2022-47595 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
 CVE-2022-47594
        RESERVED
 CVE-2022-47593
@@ -21520,8 +21808,8 @@ CVE-2022-47173
        RESERVED
 CVE-2022-47172
        RESERVED
-CVE-2022-47171
-       RESERVED
+CVE-2022-47171 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
 CVE-2022-47170
        RESERVED
 CVE-2022-47169
@@ -21536,10 +21824,10 @@ CVE-2022-47165
        RESERVED
 CVE-2022-47164
        RESERVED
-CVE-2022-47163
-       RESERVED
-CVE-2022-47162
-       RESERVED
+CVE-2022-47163 (Cross-Site Request Forgery (CSRF) vulnerability in Tips and 
Tricks HQ, ...)
+       TODO: check
+CVE-2022-47162 (Cross-Site Request Forgery (CSRF) vulnerability in Dannie 
Herdyawan DH ...)
+       TODO: check
 CVE-2022-47161
        RESERVED
 CVE-2022-47160
@@ -21552,8 +21840,8 @@ CVE-2022-47157
        RESERVED
 CVE-2022-47156
        RESERVED
-CVE-2022-47155
-       RESERVED
+CVE-2022-47155 (Cross-Site Request Forgery (CSRF) vulnerability in Supsystic 
Slider by ...)
+       TODO: check
 CVE-2022-47154
        RESERVED
 CVE-2022-47153
@@ -50015,28 +50303,28 @@ CVE-2022-37953 (An HTTP response splitting 
vulnerability exists in the AM Gatewa
        NOT-FOR-US: GE Gas Power
 CVE-2022-37952 (A reflected cross-site scripting (XSS) vulnerability exists in 
the iHi ...)
        NOT-FOR-US: iHistorian Data Display of WorkstationST
-CVE-2022-37951
-       RESERVED
-CVE-2022-37950
-       RESERVED
-CVE-2022-37949
-       RESERVED
-CVE-2022-37948
-       RESERVED
-CVE-2022-37947
-       RESERVED
-CVE-2022-37946
-       RESERVED
-CVE-2022-37945
-       RESERVED
-CVE-2022-37944
-       RESERVED
-CVE-2022-37943
-       RESERVED
-CVE-2022-37942
-       RESERVED
-CVE-2022-37941
-       RESERVED
+CVE-2022-37951 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37950 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37949 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37948 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37947 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37946 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37945 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37944 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37943 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37942 (Not used in 2022 ...)
+       TODO: check
+CVE-2022-37941 (Not used in 2022 ...)
+       TODO: check
 CVE-2022-37940
        RESERVED
 CVE-2022-37939 (A potential security vulnerability has been identified in HPE 
Superdom ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93b7c3c7d69be846320e54e5889961ebcf595dec

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93b7c3c7d69be846320e54e5889961ebcf595dec
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to