Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cc1bff55 by security tracker role at 2023-06-14T08:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,135 @@
+CVE-2023-3238 (A vulnerability, which was classified as critical, has been 
found in O ...)
+       TODO: check
+CVE-2023-3237 (A vulnerability classified as critical was found in OTCMS up to 
6.62.  ...)
+       TODO: check
+CVE-2023-3236 (A vulnerability classified as critical has been found in mccms 
up to 2 ...)
+       TODO: check
+CVE-2023-3235 (A vulnerability was found in mccms up to 2.6.5. It has been 
rated as c ...)
+       TODO: check
+CVE-2023-3234 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It 
has been ...)
+       TODO: check
+CVE-2023-3233 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It 
has been ...)
+       TODO: check
+CVE-2023-3232 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and 
classifi ...)
+       TODO: check
+CVE-2023-3231 (A vulnerability has been found in UJCMS up to 6.0.2 and 
classified as  ...)
+       TODO: check
+CVE-2023-3230 (Missing Authorization in GitHub repository 
fossbilling/fossbilling pri ...)
+       TODO: check
+CVE-2023-3229 (Business Logic Errors in GitHub repository 
fossbilling/fossbilling pri ...)
+       TODO: check
+CVE-2023-3228 (Business Logic Errors in GitHub repository 
fossbilling/fossbilling pri ...)
+       TODO: check
+CVE-2023-3227 (Insufficient Granularity of Access Control in GitHub repository 
fossbi ...)
+       TODO: check
+CVE-2023-3203 (The MStore API plugin for WordPress is vulnerable to Cross-Site 
Reques ...)
+       TODO: check
+CVE-2023-3201 (The MStore API plugin for WordPress is vulnerable to Cross-Site 
Reques ...)
+       TODO: check
+CVE-2023-3200 (The MStore API plugin for WordPress is vulnerable to Cross-Site 
Reques ...)
+       TODO: check
+CVE-2023-3198 (The MStore API plugin for WordPress is vulnerable to Cross-Site 
Reques ...)
+       TODO: check
+CVE-2023-3189 (A vulnerability, which was classified as problematic, was found 
in Sou ...)
+       TODO: check
+CVE-2023-3001 (A CWE-502: Deserialization of Untrusted Data vulnerability 
exists in t ...)
+       TODO: check
+CVE-2023-34944 (An arbitrary file upload vulnerability in the 
/fileUpload.lib.php comp ...)
+       TODO: check
+CVE-2023-34537 (A Reflected XSS was discovered in HotelDruid version 3.0.5, an 
attacke ...)
+       TODO: check
+CVE-2023-34396 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)
+       TODO: check
+CVE-2023-34250 (Discourse is an open source discussion platform. Prior to 
version 3.0. ...)
+       TODO: check
+CVE-2023-34149 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)
+       TODO: check
+CVE-2023-34000 (Unauth. IDOR vulnerability leading to PII Disclosure 
inWooCommerce Str ...)
+       TODO: check
+CVE-2023-33933 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-33817 (hoteldruid v3.0.5 was discovered to contain a SQL injection 
vulnerabil ...)
+       TODO: check
+CVE-2023-33146 (Microsoft Office Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-33145 (Microsoft Edge (Chromium-based) Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2023-33144 (Visual Studio Code Spoofing Vulnerability)
+       TODO: check
+CVE-2023-33142 (Microsoft SharePoint Server Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2023-33140 (Microsoft OneNote Spoofing Vulnerability)
+       TODO: check
+CVE-2023-33139 (Visual Studio Information Disclosure Vulnerability)
+       TODO: check
+CVE-2023-33137 (Microsoft Excel Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-33135 (.NET and Visual Studio Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-33133 (Microsoft Excel Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-33132 (Microsoft SharePoint Server Spoofing Vulnerability)
+       TODO: check
+CVE-2023-33131 (Microsoft Outlook Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-33130 (Microsoft SharePoint Server Spoofing Vulnerability)
+       TODO: check
+CVE-2023-33129 (Microsoft SharePoint Denial of Service Vulnerability)
+       TODO: check
+CVE-2023-33128 (.NET and Visual Studio Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-33126 (.NET and Visual Studio Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-32301 (Discourse is an open source discussion platform. Prior to 
version 3.0. ...)
+       TODO: check
+CVE-2023-32061 (Discourse is an open source discussion platform. Prior to 
version 3.0. ...)
+       TODO: check
+CVE-2023-32032 (.NET and Visual Studio Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-32029 (Microsoft Excel Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-32022 (<div data-wrapper="true" style="font-family:'Segoe 
UI','Helvetica Neue ...)
+       TODO: check
+CVE-2023-32021 (Windows SMB Witness Service Security Feature Bypass 
Vulnerability)
+       TODO: check
+CVE-2023-32020 (Windows DNS Spoofing Vulnerability)
+       TODO: check
+CVE-2023-32019 (Windows Kernel Information Disclosure Vulnerability)
+       TODO: check
+CVE-2023-32018 (Windows Hello Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-32017 (Microsoft PostScript Printer Driver Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2023-32016 (Windows Installer Information Disclosure Vulnerability)
+       TODO: check
+CVE-2023-32015 (Windows Pragmatic General Multicast (PGM) Remote Code 
Execution Vulner ...)
+       TODO: check
+CVE-2023-32014 (Windows Pragmatic General Multicast (PGM) Remote Code 
Execution Vulner ...)
+       TODO: check
+CVE-2023-32013 (Windows Hyper-V Denial of Service Vulnerability)
+       TODO: check
+CVE-2023-32012 (Windows Container Manager Service Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2023-32011 (Windows iSCSI Discovery Service Denial of Service 
Vulnerability)
+       TODO: check
+CVE-2023-32010 (Windows Bus Filter Driver Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-32009 (Windows Collaborative Translation Framework Elevation of 
Privilege Vul ...)
+       TODO: check
+CVE-2023-32008 (Windows Resilient File System (ReFS) Remote Code Execution 
Vulnerabili ...)
+       TODO: check
+CVE-2023-2778 (A denial-of-service vulnerability exists in Rockwell Automation 
Factor ...)
+       TODO: check
+CVE-2023-2639 (The underlying feedback mechanism of   Rockwell 
Automation'sFactoryTal ...)
+       TODO: check
+CVE-2023-2638 (Rockwell Automation's FactoryTalk System Services does not 
verify that ...)
+       TODO: check
+CVE-2023-2637 (Rockwell Automation's FactoryTalk System Services uses a 
hard-coded cr ...)
+       TODO: check
+CVE-2023-2570 (A CWE-129: Improper Validation of Array Index vulnerability 
exists tha ...)
+       TODO: check
+CVE-2023-2569 (A CWE-787: Out-of-Bounds Write vulnerability exists that could 
cause l ...)
+       TODO: check
 CVE-2023-3224 (Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3.)
        NOT-FOR-US: Nuxt
 CVE-2023-3218 (Race Condition within a Thread in GitHub repository 
it-novum/openitcoc ...)
@@ -4215,8 +4347,8 @@ CVE-2023-31144 (Craft CMS is a content management system. 
Starting in version 3.
        NOT-FOR-US: Craft CMS
 CVE-2023-31143 (mage-ai is an open-source data pipeline tool for transforming 
and inte ...)
        NOT-FOR-US: mage-ai
-CVE-2023-31142
-       RESERVED
+CVE-2023-31142 (Discourse is an open source discussion platform. Prior to 
version 3.0. ...)
+       TODO: check
 CVE-2023-31141 (OpenSearch is open-source software suite for search, 
analytics, and ob ...)
        NOT-FOR-US: OpenSearch
 CVE-2023-31140 (OpenProject is open source project management software. 
Starting with  ...)
@@ -5805,8 +5937,8 @@ CVE-2023-30633
        RESERVED
 CVE-2023-30632
        RESERVED
-CVE-2023-30631
-       RESERVED
+CVE-2023-30631 (Improper Input Validation vulnerability in Apache Software 
Foundation  ...)
+       TODO: check
 CVE-2023-30630 (Dmidecode before 3.5 allows -dump-bin to overwrite a local 
file. This  ...)
        - dmidecode <unfixed> (bug #1034483)
        [bookworm] - dmidecode <no-dsa> (Minor issue)
@@ -9316,52 +9448,52 @@ CVE-2023-29375 (An issue was discovered in Progress 
Sitefinity 13.3 before 13.3.
        NOT-FOR-US: Progress Sitefinity
 CVE-2023-29374 (In LangChain through 0.0.131, the LLMMathChain chain allows 
prompt inj ...)
        NOT-FOR-US: LangChain
-CVE-2023-29373
-       RESERVED
-CVE-2023-29372
-       RESERVED
-CVE-2023-29371
-       RESERVED
-CVE-2023-29370
-       RESERVED
-CVE-2023-29369
-       RESERVED
-CVE-2023-29368
-       RESERVED
-CVE-2023-29367
-       RESERVED
-CVE-2023-29366
-       RESERVED
-CVE-2023-29365
-       RESERVED
-CVE-2023-29364
-       RESERVED
-CVE-2023-29363
-       RESERVED
-CVE-2023-29362
-       RESERVED
-CVE-2023-29361
-       RESERVED
-CVE-2023-29360
-       RESERVED
-CVE-2023-29359
-       RESERVED
-CVE-2023-29358
-       RESERVED
-CVE-2023-29357
-       RESERVED
+CVE-2023-29373 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-29372 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2023-29371 (Windows GDI Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-29370 (Windows Media Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-29369 (Remote Procedure Call Runtime Denial of Service Vulnerability)
+       TODO: check
+CVE-2023-29368 (Windows Filtering Platform Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2023-29367 (iSCSI Target WMI Provider Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-29366 (Windows Geolocation Service Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2023-29365 (Windows Media Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-29364 (Windows Authentication Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-29363 (Windows Pragmatic General Multicast (PGM) Remote Code 
Execution Vulner ...)
+       TODO: check
+CVE-2023-29362 (Remote Desktop Client Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-29361 (Windows Cloud Files Mini Filter Driver Elevation of Privilege 
Vulnerab ...)
+       TODO: check
+CVE-2023-29360 (Windows TPM Device Driver Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-29359 (GDI Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-29358 (Windows GDI Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2023-29357 (Microsoft SharePoint Server Elevation of Privilege 
Vulnerability)
+       TODO: check
 CVE-2023-29356
        RESERVED
-CVE-2023-29355
-       RESERVED
+CVE-2023-29355 (DHCP Server Service Information Disclosure Vulnerability)
+       TODO: check
 CVE-2023-29354 (Microsoft Edge (Chromium-based) Security Feature Bypass 
Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-29353
-       RESERVED
-CVE-2023-29352
-       RESERVED
-CVE-2023-29351
-       RESERVED
+CVE-2023-29353 (Sysinternals Process Monitor for Windows Denial of Service 
Vulnerabili ...)
+       TODO: check
+CVE-2023-29352 (Windows Remote Desktop Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2023-29351 (Windows Group Policy Elevation of Privilege Vulnerability)
+       TODO: check
 CVE-2023-29350 (Microsoft Edge (Chromium-based) Elevation of Privilege 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-29349
@@ -9370,8 +9502,8 @@ CVE-2023-29348
        RESERVED
 CVE-2023-29347
        RESERVED
-CVE-2023-29346
-       RESERVED
+CVE-2023-29346 (NTFS Elevation of Privilege Vulnerability)
+       TODO: check
 CVE-2023-29345 (Microsoft Edge (Chromium-based) Security Feature Bypass 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-29344 (Microsoft Office Remote Code Execution Vulnerability)
@@ -15732,6 +15864,7 @@ CVE-2023-27478 (libmemcached-awesome is an open source 
C/C++ client library and
 CVE-2023-27477 (wasmtime is a fast and secure runtime for WebAssembly. 
Wasmtime's code ...)
        NOT-FOR-US: wasmtime
 CVE-2023-27476 (OWSLib is a Python package for client programming with Open 
Geospatial ...)
+       {DSA-5426-1}
        [experimental] - owslib 0.28.1-1~exp1
        - owslib 0.27.2-3 (bug #1034182)
        NOTE: 
https://github.com/geopython/OWSLib/commit/d91267303a695d69e73fa71efa100a035852a063
 (0.29.0)
@@ -16401,8 +16534,8 @@ CVE-2023-1051 (Improper Neutralization of Input During 
Web Page Generation ('Cro
        NOT-FOR-US: Web Report System
 CVE-2023-1050 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
        NOT-FOR-US: Web Report System
-CVE-2023-1049
-       RESERVED
+CVE-2023-1049 (A CWE-94: Improper Control of Generation of Code ('Code 
Injection') vu ...)
+       TODO: check
 CVE-2023-XXXX [RUSTSEC-2023-0015]
        - rust-ascii 0.9.3-1
        [bullseye] - rust-ascii <no-dsa> (Minor issue)
@@ -20230,8 +20363,8 @@ CVE-2023-0839 (Improper Protection for Outbound Error 
Messages and Alert Signals
        NOT-FOR-US: ProMIS Process Co. InSCADA
 CVE-2023-0838 (An issue has been discovered in GitLab affecting versions 
starting fro ...)
        - gitlab 15.10.8+ds1-2
-CVE-2023-0837
-       RESERVED
+CVE-2023-0837 (An improper  authorization check of local device settings in 
TeamViewe ...)
+       TODO: check
 CVE-2023-25780 (It is identified a vulnerability of insufficient 
authentication in an  ...)
        NOT-FOR-US: Intel
 CVE-2023-25776 (Improper input validation in some Intel(R) Server Board BMC 
firmware b ...)
@@ -22855,10 +22988,10 @@ CVE-2023-24940 (Windows Pragmatic General Multicast 
(PGM) Denial of Service Vuln
        NOT-FOR-US: Microsoft
 CVE-2023-24939 (Server for NFS Denial of Service Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-24938
-       RESERVED
-CVE-2023-24937
-       RESERVED
+CVE-2023-24938 (Windows CryptoAPI  Denial of Service Vulnerability)
+       TODO: check
+CVE-2023-24937 (Windows CryptoAPI  Denial of Service Vulnerability)
+       TODO: check
 CVE-2023-24936
        RESERVED
 CVE-2023-24935 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
@@ -24014,8 +24147,8 @@ CVE-2023-24548
        RESERVED
 CVE-2023-24547
        RESERVED
-CVE-2023-24546
-       RESERVED
+CVE-2023-24546 (On affected versions of the CloudVision Portal improper access 
control ...)
+       TODO: check
 CVE-2023-24545 (On affected platforms running Arista CloudEOS an issue in the 
Software ...)
        NOT-FOR-US: Arista
 CVE-2023-0517
@@ -24443,10 +24576,10 @@ CVE-2022-4896
        RESERVED
 CVE-2020-36656 (The Spectra WordPress plugin before 1.15.0 does not sanitize 
user inpu ...)
        NOT-FOR-US: WordPress plugin
-CVE-2023-24470
-       RESERVED
-CVE-2023-24469
-       RESERVED
+CVE-2023-24470 (Potential XML External Entity Injection in ArcSight Logger 
versions pr ...)
+       TODO: check
+CVE-2023-24469 (Potential Cross-Site Scripting in ArcSight Logger versions 
prior to 7. ...)
+       TODO: check
 CVE-2023-24468 (Broken access control in Advanced Authentication versions 
prior to 6.4 ...)
        NOT-FOR-US: NetIQ
 CVE-2023-24467
@@ -30290,7 +30423,7 @@ CVE-2023-22612 (An issue was discovered in IhisiSmm in 
Insyde InsydeH2O with ker
        NOT-FOR-US: Insyde
 CVE-2023-22611 (A CWE-200: Exposure of Sensitive Information to an 
Unauthorized Actor  ...)
        NOT-FOR-US: EcoStruxure Geo SCADA Expert
-CVE-2023-22610 (A CWE-285: Improper Authorization vulnerability exists that 
could caus ...)
+CVE-2023-22610 (A CWE-863: Incorrect Authorization vulnerability exists that 
could cau ...)
        NOT-FOR-US: EcoStruxure Geo SCADA Expert
 CVE-2023-22609
        REJECTED
@@ -35745,8 +35878,8 @@ CVE-2022-47186
        RESERVED
 CVE-2022-47185
        RESERVED
-CVE-2022-47184
-       RESERVED
+CVE-2022-47184 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
 CVE-2022-47183 (Cross-Site Request Forgery (CSRF) vulnerability in StylistWP 
Extra Blo ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-47182
@@ -38190,16 +38323,16 @@ CVE-2023-21571 (Microsoft Dynamics 365 (on-premises) 
Cross-site Scripting Vulner
        NOT-FOR-US: Microsoft
 CVE-2023-21570 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
        NOT-FOR-US: Microsoft
-CVE-2023-21569
-       RESERVED
+CVE-2023-21569 (Azure DevOps Server Spoofing Vulnerability)
+       TODO: check
 CVE-2023-21568 (Microsoft SQL Server Integration Service (VS extension) Remote 
Code Ex ...)
        NOT-FOR-US: Microsoft
 CVE-2023-21567 (Visual Studio Denial of Service Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-21566 (Visual Studio Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-21565
-       RESERVED
+CVE-2023-21565 (Azure DevOps Server Spoofing Vulnerability)
+       TODO: check
 CVE-2023-21564 (Azure DevOps Server Cross-Site Scripting Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-21563 (BitLocker Security Feature Bypass Vulnerability)
@@ -55951,7 +56084,7 @@ CVE-2022-41121 (Windows Graphics Component Elevation of 
Privilege Vulnerability.
        NOT-FOR-US: Microsoft
 CVE-2022-41120 (Microsoft Windows System Monitor (Sysmon) Elevation of 
Privilege Vulne ...)
        NOT-FOR-US: Microsoft
-CVE-2022-41119 (Visual Studio Remote Code Execution Vulnerability.)
+CVE-2022-41119 (Visual Studio Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2022-41118 (Windows Scripting Languages Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -56019,7 +56152,7 @@ CVE-2022-41087
        RESERVED
 CVE-2022-41086 (Windows Group Policy Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2022-41085 (Azure CycleCloud Elevation of Privilege Vulnerability.)
+CVE-2022-41085 (Azure CycleCloud Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2022-41084
        RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc1bff55e16a5167e787c5fdc2050b7bd4d924c2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc1bff55e16a5167e787c5fdc2050b7bd4d924c2
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to