Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
7d7a17de by security tracker role at 2023-09-27T08:12:28+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,249 @@
+CVE-2023-5183 (Unsafe deserialization of untrusted JSON allows execution of
arbitrary ...)
+ TODO: check
+CVE-2023-4934 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2023-4737 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2023-4423 (The WP Event Manager \u2013 Events Calendar, Registrations,
Sell Ticke ...)
+ TODO: check
+CVE-2023-44216 (PVRIC (PowerVR Image Compression) on Imagination 2018 and
later GPU de ...)
+ TODO: check
+CVE-2023-44044 (Super Store Finder v3.6 and below was discovered to contain a
SQL inje ...)
+ TODO: check
+CVE-2023-44043 (A stored cross-site scripting (XSS) vulnerability in
/settings/index.p ...)
+ TODO: check
+CVE-2023-44042 (A stored cross-site scripting (XSS) vulnerability in
/settings/index.p ...)
+ TODO: check
+CVE-2023-43825 (Relative path traversal vulnerability in Shihonkanri Plus
Ver9.0.3 and ...)
+ TODO: check
+CVE-2023-43645 (OpenFGA is an authorization/permission engine built for
developers and ...)
+ TODO: check
+CVE-2023-43381 (SQL Injection vulnerability in Tianchoy Blog v.1.8.8 allows a
remote a ...)
+ TODO: check
+CVE-2023-43331 (A cross-site scripting (XSS) vulnerability in the Add User
function of ...)
+ TODO: check
+CVE-2023-43291 (Deserialization of Untrusted Data in emlog pro v.2.1.15 and
earlier al ...)
+ TODO: check
+CVE-2023-43263 (A Cross-site scripting (XSS) vulnerability in Froala Editor
v.4.1.1 al ...)
+ TODO: check
+CVE-2023-43232 (A stored cross-site scripting (XSS) vulnerability in the
Website colum ...)
+ TODO: check
+CVE-2023-43187 (A remote code execution (RCE) vulnerability in the xmlrpc.php
endpoint ...)
+ TODO: check
+CVE-2023-43154 (In Macrob7 Macs Framework Content Management System (CMS)
1.1.4f, loos ...)
+ TODO: check
+CVE-2023-42820 (JumpServer is an open source bastion host. This vulnerability
is due t ...)
+ TODO: check
+CVE-2023-42819 (JumpServer is an open source bastion host. Logged-in users can
access ...)
+ TODO: check
+CVE-2023-42462 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-42461 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-42453 (Synapse is an open-source Matrix homeserver written and
maintained by ...)
+ TODO: check
+CVE-2023-41996 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2023-41995 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2023-41986 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2023-41984 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-41981 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-41980 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-41979 (A race condition was addressed with improved locking. This
issue is fi ...)
+ TODO: check
+CVE-2023-41968 (This issue was addressed with improved validation of symlinks.
This is ...)
+ TODO: check
+CVE-2023-41888 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41878 (MeterSphere is a one-stop open source continuous testing
platform, cov ...)
+ TODO: check
+CVE-2023-41335 (Synapse is an open-source Matrix homeserver written and
maintained by ...)
+ TODO: check
+CVE-2023-41333 (Cilium is a networking, observability, and security solution
with an e ...)
+ TODO: check
+CVE-2023-41332 (Cilium is a networking, observability, and security solution
with an e ...)
+ TODO: check
+CVE-2023-41326 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41324 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41323 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41322 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41321 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41320 (GLPI stands for Gestionnaire Libre de Parc Informatique is a
Free Asse ...)
+ TODO: check
+CVE-2023-41232 (An out-of-bounds read was addressed with improved bounds
checking. Thi ...)
+ TODO: check
+CVE-2023-41174 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-41079 (The issue was addressed with improved permissions logic. This
issue is ...)
+ TODO: check
+CVE-2023-41078 (An authorization issue was addressed with improved state
management. T ...)
+ TODO: check
+CVE-2023-41074 (The issue was addressed with improved checks. This issue is
fixed in t ...)
+ TODO: check
+CVE-2023-41073 (An authorization issue was addressed with improved state
management. T ...)
+ TODO: check
+CVE-2023-41071 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2023-41070 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2023-41068 (An access issue was addressed with improved access
restrictions. This ...)
+ TODO: check
+CVE-2023-41067 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2023-41066 (An authentication issue was addressed with improved state
management. ...)
+ TODO: check
+CVE-2023-41065 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2023-41063 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40677 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Gopi ...)
+ TODO: check
+CVE-2023-40676 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Jaso ...)
+ TODO: check
+CVE-2023-40675 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Plug ...)
+ TODO: check
+CVE-2023-40669 (Auth. (contributor+) Stored Cross-Site Scripting (XSS)
vulnerability i ...)
+ TODO: check
+CVE-2023-40668 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Pdfc ...)
+ TODO: check
+CVE-2023-40667 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Lasso Si ...)
+ TODO: check
+CVE-2023-40665 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Pdfc ...)
+ TODO: check
+CVE-2023-40664 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
RedNao D ...)
+ TODO: check
+CVE-2023-40663 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Rextheme ...)
+ TODO: check
+CVE-2023-40605 (Auth. (contributor) Cross-Site Scripting (XSS) vulnerability
in 93digi ...)
+ TODO: check
+CVE-2023-40604 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Jes ...)
+ TODO: check
+CVE-2023-40541 (This issue was addressed by adding an additional prompt for
user conse ...)
+ TODO: check
+CVE-2023-40520 (The issue was addressed with improved checks. This issue is
fixed in t ...)
+ TODO: check
+CVE-2023-40456 (The issue was addressed with improved checks. This issue is
fixed in t ...)
+ TODO: check
+CVE-2023-40455 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-40454 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-40452 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2023-40451 (This issue was addressed with improved iframe sandbox
enforcement. Thi ...)
+ TODO: check
+CVE-2023-40450 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2023-40448 (The issue was addressed with improved handling of protocols.
This issu ...)
+ TODO: check
+CVE-2023-40443 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2023-40441 (A resource exhaustion issue was addressed with improved input
validati ...)
+ TODO: check
+CVE-2023-40436 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2023-40435 (This issue was addressed by enabling hardened runtime. This
issue is f ...)
+ TODO: check
+CVE-2023-40434 (A configuration issue was addressed with additional
restrictions. This ...)
+ TODO: check
+CVE-2023-40432 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40431 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40429 (A permissions issue was addressed with improved validation.
This issue ...)
+ TODO: check
+CVE-2023-40428 (The issue was addressed with improved handling of caches. This
issue i ...)
+ TODO: check
+CVE-2023-40427 (The issue was addressed with improved handling of caches. This
issue i ...)
+ TODO: check
+CVE-2023-40426 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-40424 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2023-40422 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40420 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40419 (The issue was addressed with improved checks. This issue is
fixed in t ...)
+ TODO: check
+CVE-2023-40418 (An authentication issue was addressed with improved state
management. ...)
+ TODO: check
+CVE-2023-40417 (A window management issue was addressed with improved state
management ...)
+ TODO: check
+CVE-2023-40412 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40410 (An out-of-bounds read was addressed with improved input
validation. Th ...)
+ TODO: check
+CVE-2023-40409 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40407 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2023-40406 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2023-40403 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40402 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-40400 (This issue was addressed with improved checks. This issue is
fixed in ...)
+ TODO: check
+CVE-2023-40399 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40395 (The issue was addressed with improved handling of caches. This
issue i ...)
+ TODO: check
+CVE-2023-40391 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-40388 (A privacy issue was addressed with improved handling of
temporary file ...)
+ TODO: check
+CVE-2023-40386 (A privacy issue was addressed with improved handling of
temporary file ...)
+ TODO: check
+CVE-2023-40384 (A permissions issue was addressed with improved redaction of
sensitive ...)
+ TODO: check
+CVE-2023-40330 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Milan Pe ...)
+ TODO: check
+CVE-2023-39434 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2023-39233 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2023-38615 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-38596 (The issue was addressed with improved handling of protocols.
This issu ...)
+ TODO: check
+CVE-2023-38586 (An access issue was addressed with additional sandbox
restrictions. Th ...)
+ TODO: check
+CVE-2023-37448 (A lock screen issue was addressed with improved state
management. This ...)
+ TODO: check
+CVE-2023-35990 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2023-35984 (The issue was addressed with improved checks. This issue is
fixed in t ...)
+ TODO: check
+CVE-2023-35793 (An issue was discovered in Cassia Access Controller
2.1.1.2303271039. ...)
+ TODO: check
+CVE-2023-35074 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2023-35071 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2023-32421 (A privacy issue was addressed with improved handling of
temporary file ...)
+ TODO: check
+CVE-2023-32396 (This issue was addressed with improved checks. This issue is
fixed in ...)
+ TODO: check
+CVE-2023-32377 (A buffer overflow issue was addressed with improved memory
handling. T ...)
+ TODO: check
+CVE-2023-32361 (The issue was addressed with improved handling of caches. This
issue i ...)
+ TODO: check
+CVE-2023-2358 (Hitachi Vantara Pentaho Business Analytics Server prior to
versions 9. ...)
+ TODO: check
+CVE-2023-29497 (A privacy issue was addressed with improved handling of
temporary file ...)
+ TODO: check
CVE-2023-43040 [Improperly verified POST keys]
- ceph <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2023/09/26/10
@@ -145,7 +391,7 @@ CVE-2023-4258 (In Bluetooth mesh implementation If
provisionee has a public key
NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
CVE-2023-43457 (An issue in Service Provider Management System v.1.0 allows a
remote a ...)
NOT-FOR-US: Service Provider Management System
-CVE-2023-43326 (mooSocial v3.1.8 was discovered to contain a cross-site
scripting (XSS ...)
+CVE-2023-43326 (A reflected cross-site scripting (XSS) vulnerability exisits
in multip ...)
NOT-FOR-US: mooSocial
CVE-2023-43325 (A reflected cross-site scripting (XSS) vulnerability in the
data[redir ...)
NOT-FOR-US: mooSocial
@@ -508,11 +754,11 @@ CVE-2023-42280 (mee-admin 1.5 is vulnerable to Directory
Traversal. The download
TODO: check
CVE-2023-42279 (Dreamer CMS 4.1.3 is vulnerable to SQL Injection.)
NOT-FOR-US: Dreamer CMS
-CVE-2023-41993 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+CVE-2023-41993 (The issue was addressed with improved checks. This issue is
fixed in S ...)
TODO: check
-CVE-2023-41992 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+CVE-2023-41992 (The issue was addressed with improved checks. This issue is
fixed in m ...)
TODO: check
-CVE-2023-41991 (A certificate validation issue was addressed. This issue is
fixed in i ...)
+CVE-2023-41991 (A certificate validation issue was addressed. This issue is
fixed in m ...)
TODO: check
CVE-2023-41048 (plone.namedfile allows users to handle `File` and `Image`
fields targe ...)
NOT-FOR-US: plone.namedfile
@@ -20257,8 +20503,8 @@ CVE-2023-30473 (Unauth. Reflected Cross-Site Scripting
(XSS) vulnerability in Ma
NOT-FOR-US: WordPress Plugin
CVE-2023-30472
RESERVED
-CVE-2023-30471
- RESERVED
+CVE-2023-30471 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Cornel R ...)
+ TODO: check
CVE-2023-30470 (A use-after-free related to unsound inference in the bytecode
generati ...)
NOT-FOR-US: Facebook Hermes
CVE-2023-1990 (A use-after-free flaw was found in ndlc_remove in
drivers/nfc/st-nci/n ...)
@@ -25176,8 +25422,8 @@ CVE-2023-28792 (Unauth. Reflected Cross-Site Scripting
(XSS) vulnerability in I
NOT-FOR-US: WordPress plugin
CVE-2023-28791
RESERVED
-CVE-2023-28790
- RESERVED
+CVE-2023-28790 (Auth. (editor+) Stored Cross-Site Scripting (XSS)
vulnerability in Bre ...)
+ TODO: check
CVE-2023-28789 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Cimatti ...)
NOT-FOR-US: WordPress plugin
CVE-2023-28788
@@ -26188,8 +26434,8 @@ CVE-2023-28492
RESERVED
CVE-2023-28491
RESERVED
-CVE-2023-28490
- RESERVED
+CVE-2023-28490 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Estatik ...)
+ TODO: check
CVE-2023-28489 (A vulnerability has been identified in CP-8031 MASTER MODULE
(All vers ...)
NOT-FOR-US: Siemens
CVE-2023-1478 (The Hummingbird WordPress plugin before 3.4.2 does not validate
the ge ...)
@@ -29204,8 +29450,8 @@ CVE-2023-27630
RESERVED
CVE-2023-27629 (Auth. (contributor+) Stored Cross-Site Scripting (XSS)
vulnerability i ...)
NOT-FOR-US: WordPress plugin
-CVE-2023-27628
- RESERVED
+CVE-2023-27628 (Auth. (contributor+) Stored Cross-Site Scripting (XSS)
vulnerability i ...)
+ TODO: check
CVE-2023-27627 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
eggemplo ...)
NOT-FOR-US: WordPress plugin
CVE-2023-27626
@@ -29216,8 +29462,8 @@ CVE-2023-27624 (Auth. (admin+) Stored Cross-Site
Scripting (XSS) vulnerability i
NOT-FOR-US: WordPress plugin
CVE-2023-27623
RESERVED
-CVE-2023-27622
- RESERVED
+CVE-2023-27622 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Abel ...)
+ TODO: check
CVE-2023-27621 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in MrDe ...)
NOT-FOR-US: WordPress plugin
CVE-2023-27620 (Auth. (contributor+) Stored Cross-site Scripting (XSS)
vulnerability i ...)
@@ -29226,10 +29472,10 @@ CVE-2023-27619 (Auth (subscriber+) Reflected
Cross-Site Scripting (XSS) vulnerab
NOT-FOR-US: WordPress theme
CVE-2023-27618 (Auth. (editor+) Stored Cross-Site Scripting (XSS)
vulnerability in AGI ...)
NOT-FOR-US: WordPress plugin
-CVE-2023-27617
- RESERVED
-CVE-2023-27616
- RESERVED
+CVE-2023-27617 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Davi ...)
+ TODO: check
+CVE-2023-27616 (Unauth. Stored Cross-Site Scripting (XSS) vulnerability in
David F. Ca ...)
+ TODO: check
CVE-2023-27615
RESERVED
CVE-2023-27614 (Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Ian
Haycox ...)
@@ -35662,8 +35908,8 @@ CVE-2023-25485 (Auth. (admin+) Stored Cross-Site
Scripting (XSS) vulnerability i
NOT-FOR-US: WordPress plugin
CVE-2023-25484 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Oliv ...)
NOT-FOR-US: WordPress plugin
-CVE-2023-25483
- RESERVED
+CVE-2023-25483 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Anki ...)
+ TODO: check
CVE-2023-25482 (Cross-Site Request Forgery (CSRF) vulnerability in Mike Martel
WP Tile ...)
NOT-FOR-US: WordPress plugin
CVE-2023-25481 (Cross-Site Request Forgery (CSRF) vulnerability in Podlove
Podlove Sub ...)
@@ -39957,8 +40203,8 @@ CVE-2023-23960
RESERVED
CVE-2023-23959
RESERVED
-CVE-2023-23958
- RESERVED
+CVE-2023-23958 (Symantec Protection Engine, prior to 9.1.0, may be susceptible
to a Ha ...)
+ TODO: check
CVE-2023-23957 (An authenticated user can see and modify the value for
\u2018next\u201 ...)
NOT-FOR-US: Symantec Identity Portal
CVE-2023-23956 (A user can supply malicious HTML and JavaScript code that will
be exec ...)
@@ -41468,8 +41714,8 @@ CVE-2023-23497 (A logic issue was addressed with
improved state management. This
NOT-FOR-US: Apple
CVE-2023-23496 (The issue was addressed with improved checks. This issue is
fixed in m ...)
NOT-FOR-US: Apple
-CVE-2023-23495
- RESERVED
+CVE-2023-23495 (A permissions issue was addressed with improved redaction of
sensitive ...)
+ TODO: check
CVE-2023-23494 (A buffer overflow was addressed with improved bounds checking.
This is ...)
NOT-FOR-US: Apple
CVE-2023-23493 (A logic issue was addressed with improved state management.
This issue ...)
@@ -151975,8 +152221,8 @@ CVE-2021-38245
RESERVED
CVE-2021-38244 (A regular expression denial of service (ReDoS) vulnerability
exits in ...)
NOT-FOR-US: cbioportal
-CVE-2021-38243
- RESERVED
+CVE-2021-38243 (xunruicms <=4.5.1 is vulnerable to Remote Code Execution.)
+ TODO: check
CVE-2021-38242
RESERVED
CVE-2021-38241 (Deserialization issue discovered in Ruoyi before 4.6.1 allows
remote a ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d7a17ded5df3e81d4a45a3a93868bc5236d0f7a
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d7a17ded5df3e81d4a45a3a93868bc5236d0f7a
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits