Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
c4a307bf by Moritz Muehlenhoff at 2023-07-20T10:49:06+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,11 +1,11 @@
CVE-2023-3784 (A vulnerability was found in Dooblou WiFi File Explorer 1.13.3.
It has ...)
- TODO: check
+ NOT-FOR-US: Dooblou WiFi File Explorer
CVE-2023-3783 (A vulnerability was found in Webile 1.0.1. It has been
classified as p ...)
- TODO: check
+ NOT-FOR-US: Webile
CVE-2023-3782 (DoS of the OkHttp client when using a BrotliInterceptor and
surfing to ...)
- TODO: check
+ NOT-FOR-US: BrotliInterceptor
CVE-2023-3779 (The Essential Addons For Elementor plugin for WordPress is
vulnerable ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-3300 (HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and
1.4.1 HTTP ...)
TODO: check
CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL
policies ...)
@@ -13,19 +13,19 @@ CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to
1.5.6, and 1.4.10 ACL pol
CVE-2023-3072 (HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and
1.4.10 ACL ...)
TODO: check
CVE-2023-37362 (Weintek Weincloud v0.13.6 could allow an attacker to abuse
the reg ...)
- TODO: check
+ NOT-FOR-US: Weincloud
CVE-2023-37289 (It is identified a vulnerability of Unrestricted Upload of
File with D ...)
- TODO: check
+ NOT-FOR-US: InfoDoc
CVE-2023-36853 (In Keysight Geolocation Server v2.4.2 and prior, a low
privileged atta ...)
- TODO: check
+ NOT-FOR-US: Keysight Geolocation Server
CVE-2023-35134 (Weintek Weincloud v0.13.6 could allow an attacker to reset a
passwor ...)
- TODO: check
+ NOT-FOR-US: Weincloud
CVE-2023-34429 (Weintek Weincloud v0.13.6 could allow an attacker to cause
a denia ...)
- TODO: check
+ NOT-FOR-US: Weincloud
CVE-2023-34394 (In Keysight Geolocation Server v2.4.2 and prior, an attacker
could upl ...)
- TODO: check
+ NOT-FOR-US: Keysight Geolocation Server
CVE-2023-32657 (Weintek Weincloud v0.13.6 could allow an attacker to
efficiently d ...)
- TODO: check
+ NOT-FOR-US: Weincloud
CVE-2023-38408 (The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has
an insuff ...)
- openssh 1:9.3p2-1
NOTE: https://www.openwall.com/lists/oss-security/2023/07/19/9
@@ -77,13 +77,13 @@ CVE-2023-3466 (Reflected Cross-Site Scripting (XSS))
CVE-2023-3463 (All versions of GE Digital CIMPLICITY that are not adhering to
SDG gui ...)
NOT-FOR-US: GE Digital CIMPLICITY
CVE-2023-37899 (Feathersjs is a framework for creating web APIs and real-time
applicat ...)
- TODO: check
+ NOT-FOR-US: Feathersjs
CVE-2023-37897 (Grav is a file-based Web-platform built in PHP. Grav is
subject to a s ...)
- TODO: check
+ NOT-FOR-US: Grav CMS
CVE-2023-37748 (ngiflib commit 5e7292 was discovered to contain an infinite
loop via t ...)
- TODO: check
+ NOT-FOR-US: ngiflib
CVE-2023-37733 (An arbitrary file upload vulnerability in tduck-platform v4.0
allows a ...)
- TODO: check
+ NOT-FOR-US: Grav CMStduck-platform
CVE-2023-37276 (aiohttp is an asynchronous HTTP client/server framework for
asyncio an ...)
TODO: check
CVE-2023-35900 (IBM Robotic Process Automation for Cloud Pak 21.0.0 through
21.0.7.4 a ...)
@@ -91,11 +91,11 @@ CVE-2023-35900 (IBM Robotic Process Automation for Cloud
Pak 21.0.0 through 21.0
CVE-2023-35898 (IBM InfoSphere Information Server 11.7 could allow an
authenticated us ...)
NOT-FOR-US: IBM
CVE-2023-34034 (Using "**" as a pattern in Spring Security configuration for
WebFlux ...)
- TODO: check
+ - libspring-security-2.0-java <removed>
CVE-2023-33876 (A use-after-free vulnerability exists in the way Foxit Reader
12.1.2.1 ...)
NOT-FOR-US: Foxit Reader
CVE-2023-33866 (A use-after-free vulnerability exists in the JavaScript engine
of Foxi ...)
- TODO: check
+ NOT-FOR-US: Foxit Reader
CVE-2023-33832 (IBM Spectrum Protect 8.1.0.0 through 8.1.17.0 could allow a
local user ...)
NOT-FOR-US: IBM
CVE-2023-32664 (A type confusion vulnerability exists in the Javascript
checkThisBox m ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4a307bfa9a4060194da994a261be5168f7dbdb3
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4a307bfa9a4060194da994a261be5168f7dbdb3
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits