Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
7ef0dfcf by security tracker role at 2023-09-29T20:12:42+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,107 @@
+CVE-2023-5289 (Allocation of Resources Without Limits or Throttling in GitHub
reposit ...)
+ TODO: check
+CVE-2023-5288 (A remote unauthorized attacker may connect to the SIM1012,
interact wi ...)
+ TODO: check
+CVE-2023-5287 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was
classified ...)
+ TODO: check
+CVE-2023-5286 (A vulnerability, which was classified as problematic, has been
found i ...)
+ TODO: check
+CVE-2023-5285 (A vulnerability classified as critical was found in Tongda OA
2017. Af ...)
+ TODO: check
+CVE-2023-5284 (A vulnerability classified as critical has been found in
SourceCodeste ...)
+ TODO: check
+CVE-2023-5283 (A vulnerability was found in SourceCodester Engineers Online
Portal 1. ...)
+ TODO: check
+CVE-2023-5282 (A vulnerability was found in SourceCodester Engineers Online
Portal 1. ...)
+ TODO: check
+CVE-2023-5281 (A vulnerability was found in SourceCodester Engineers Online
Portal 1. ...)
+ TODO: check
+CVE-2023-5280 (A vulnerability was found in SourceCodester Engineers Online
Portal 1. ...)
+ TODO: check
+CVE-2023-5279 (A vulnerability has been found in SourceCodester Engineers
Online Port ...)
+ TODO: check
+CVE-2023-5278 (A vulnerability, which was classified as critical, was found in
Source ...)
+ TODO: check
+CVE-2023-5277 (A vulnerability, which was classified as critical, has been
found in S ...)
+ TODO: check
+CVE-2023-5276 (A vulnerability classified as critical was found in
SourceCodester Eng ...)
+ TODO: check
+CVE-2023-5273 (A vulnerability classified as problematic was found in
SourceCodester ...)
+ TODO: check
+CVE-2023-5272 (A vulnerability classified as critical has been found in
SourceCodeste ...)
+ TODO: check
+CVE-2023-5271 (A vulnerability was found in SourceCodester Best Courier
Management Sy ...)
+ TODO: check
+CVE-2023-5270 (A vulnerability was found in SourceCodester Best Courier
Management Sy ...)
+ TODO: check
+CVE-2023-5269 (A vulnerability was found in SourceCodester Best Courier
Management Sy ...)
+ TODO: check
+CVE-2023-5268 (A vulnerability was found in DedeBIZ 6.2 and classified as
critical. T ...)
+ TODO: check
+CVE-2023-5267 (A vulnerability has been found in Tongda OA 2017 and classified
as cri ...)
+ TODO: check
+CVE-2023-5266 (A vulnerability, which was classified as critical, was found in
DedeBI ...)
+ TODO: check
+CVE-2023-5265 (A vulnerability, which was classified as critical, has been
found in T ...)
+ TODO: check
+CVE-2023-5264 (A vulnerability classified as critical was found in huakecms
3.0. Affe ...)
+ TODO: check
+CVE-2023-5263 (A vulnerability was found in ZZZCMS 2.1.7 and classified as
critical. ...)
+ TODO: check
+CVE-2023-5262 (A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and
classif ...)
+ TODO: check
+CVE-2023-5261 (A vulnerability, which was classified as critical, was found in
Tongda ...)
+ TODO: check
+CVE-2023-5260 (A vulnerability, which was classified as critical, has been
found in S ...)
+ TODO: check
+CVE-2023-5259 (A vulnerability classified as problematic was found in ForU
CMS. This ...)
+ TODO: check
+CVE-2023-5258 (A vulnerability classified as critical has been found in
OpenRapid Rap ...)
+ TODO: check
+CVE-2023-5257 (A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on
Windows. It ...)
+ TODO: check
+CVE-2023-5196 (Mattermost fails to enforce character limits in all possible
notificat ...)
+ TODO: check
+CVE-2023-5195 (Mattermost fails to properly validate the permissions when soft
deleti ...)
+ TODO: check
+CVE-2023-5194 (Mattermost fails to properly validate permissions when demoting
and de ...)
+ TODO: check
+CVE-2023-5193 (Mattermost fails to properly check permissions when retrieving
a post ...)
+ TODO: check
+CVE-2023-5159 (Mattermost fails to properly verify the permissions when
managing/upda ...)
+ TODO: check
+CVE-2023-43944 (A Stored Cross Site Scripting (XSS) vulnerability was found in
SourceC ...)
+ TODO: check
+CVE-2023-43909 (Hospital Management System thru commit 4770d was discovered to
contain ...)
+ TODO: check
+CVE-2023-43655 (Composer is a dependency manager for PHP. Users publishing a
composer. ...)
+ TODO: check
+CVE-2023-41691 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Pensopay ...)
+ TODO: check
+CVE-2023-41687 (Auth. (contributor+) Stored Cross-Site Scripting (XSS)
vulnerability i ...)
+ TODO: check
+CVE-2023-41666 (Auth. (contributor+) Stored Cross-Site Scripting (XSS)
vulnerability i ...)
+ TODO: check
+CVE-2023-41663 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Giovamba ...)
+ TODO: check
+CVE-2023-41662 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
Ulf Benj ...)
+ TODO: check
+CVE-2023-41661 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Pres ...)
+ TODO: check
+CVE-2023-41658 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in
I Thirte ...)
+ TODO: check
+CVE-2023-41657 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Grou ...)
+ TODO: check
+CVE-2023-41655 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability
in Andr ...)
+ TODO: check
+CVE-2023-3413 (An issue has been discovered in GitLab affecting all versions
starting ...)
+ TODO: check
+CVE-2023-3024 (Forcing the Bluetooth LE stack to segment 'prepare write
response' pac ...)
+ TODO: check
+CVE-2023-39410 (When deserializing untrusted or corrupted data, it is possible
for a r ...)
+ TODO: check
+CVE-2023-39308 (Unauth. Stored Cross-Site Scripting (XSS) vulnerability in
UserFeedbac ...)
+ TODO: check
CVE-2023-5198 (An issue has been discovered in GitLab affecting all versions
prior to ...)
TODO: check
CVE-2023-5185 (Gym Management System Project v1.0 is vulnerable to an
Insecure File ...)
@@ -42,7 +146,7 @@ CVE-2023-44164 (The 'Email' parameter of the
process_login.php resource does no
TODO: check
CVE-2023-44163 (The 'search' parameter of the process_search.php resource
does not va ...)
TODO: check
-CVE-2023-43740 ([PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION]
on [PLATF ...)
+CVE-2023-43740 (Online Book Store Project v1.0 is vulnerable to an Insecure
File Uploa ...)
TODO: check
CVE-2023-43739 (The 'bookisbn' parameter of the cart.php resource does not
validate t ...)
TODO: check
@@ -260,6 +364,7 @@ CVE-2023-5222 (A vulnerability classified as critical was
found in Viessmann Vit
CVE-2023-5221 (A vulnerability classified as critical has been found in ForU
CMS. Thi ...)
NOT-FOR-US: ForU CMS
CVE-2023-5217 (Heap buffer overflow in vp8 encoding in libvpx in Google Chrome
prior ...)
+ {DSA-5509-1 DSA-5508-1}
- chromium 117.0.5938.132-1
[buster] - chromium <end-of-life> (see DSA 5046)
- firefox <unfixed> (unimportant)
@@ -273,9 +378,11 @@ CVE-2023-5217 (Heap buffer overflow in vp8 encoding in
libvpx in Google Chrome p
NOTE: src:firefox and firefox-esr use the system libvpx starting in
bookworm and above. For
NOTE: older releases still needs the fixes in src:firefox-esr.
CVE-2023-5187 (Use after free in Extensions in Google Chrome prior to
117.0.5938.132 ...)
+ {DSA-5508-1}
- chromium 117.0.5938.132-1
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2023-5186 (Use after free in Passwords in Google Chrome prior to
117.0.5938.132 a ...)
+ {DSA-5508-1}
- chromium 117.0.5938.132-1
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2023-5184 (Two potential signed to unsigned conversion errors and buffer
overflow ...)
@@ -789,7 +896,7 @@ CVE-2023-34043 (VMware Aria Operations contains a local
privilege escalation vul
CVE-2023-32541 (A use-after-free vulnerability exists in the footerr
functionality of ...)
NOT-FOR-US: Hancom Office 2020 HWord
CVE-2023-5176 (Memory safety bugs present in Firefox 117, Firefox ESR 115.2,
and Thun ...)
- {DSA-5506-1}
+ {DSA-5506-1 DLA-3587-1}
- firefox 118.0-1
- firefox-esr 115.3.0esr-1
- thunderbird 1:115.3.0-1
@@ -813,7 +920,7 @@ CVE-2023-5172 (A hashtable in the Ion Engine could have
been mutated while ther
- firefox 118.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-41/#CVE-2023-5172
CVE-2023-5171 (During Ion compilation, a Garbage Collection could have
resulted in a ...)
- {DSA-5506-1}
+ {DSA-5506-1 DLA-3587-1}
- firefox 118.0-1
- firefox-esr 115.3.0esr-1
- thunderbird 1:115.3.0-1
@@ -824,7 +931,7 @@ CVE-2023-5170 (In canvas rendering, a compromised content
process could have cau
- firefox 118.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2023-41/#CVE-2023-5170
CVE-2023-5169 (A compromised content process could have provided malicious
data in a ...)
- {DSA-5506-1}
+ {DSA-5506-1 DLA-3587-1}
- firefox 118.0-1
- firefox-esr 115.3.0esr-1
- thunderbird 1:115.3.0-1
@@ -3157,6 +3264,7 @@ CVE-2023-29166 (A logic issue was addressed with improved
state management. This
CVE-2023-36851 (A Missing Authentication for Critical Function vulnerability
in Junipe ...)
NOT-FOR-US: Juniper
CVE-2023-4781 (Heap-based Buffer Overflow in GitHub repository vim/vim prior
to 9.0.1 ...)
+ {DLA-3588-1}
- vim 2:9.0.1894-1
[bookworm] - vim <no-dsa> (Minor issue)
[bullseye] - vim <no-dsa> (Minor issue)
@@ -3329,6 +3437,7 @@ CVE-2023-4754 (Out-of-bounds Write in GitHub repository
gpac/gpac prior to 2.3-D
NOTE:
https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0
NOTE: https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
CVE-2023-4752 (Use After Free in GitHub repository vim/vim prior to 9.0.1858.)
+ {DLA-3588-1}
- vim 2:9.0.1894-1
[bookworm] - vim <no-dsa> (Minor issue)
[bullseye] - vim <no-dsa> (Minor issue)
@@ -4049,6 +4158,7 @@ CVE-2023-41163 (A Reflected Cross-site scripting (XSS)
vulnerability in the file
CVE-2023-41041 (Graylog is a free and open log management platform. In a
multi-node Gr ...)
- graylog2 <itp> (bug #652273)
CVE-2023-41040 (GitPython is a python library used to interact with Git
repositories. ...)
+ {DLA-3589-1}
- python-git 3.1.36-1
[bookworm] - python-git <no-dsa> (Minor issue; can be fixed via point
release)
[bullseye] - python-git <no-dsa> (Minor issue; can be fixed via point
release)
@@ -33718,8 +33828,8 @@ CVE-2023-26220
RESERVED
CVE-2023-26219
RESERVED
-CVE-2023-26218
- RESERVED
+CVE-2023-26218 (The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus
contain ...)
+ TODO: check
CVE-2023-26217 (The Data Exchange Add-on component of TIBCO Software Inc.'s
TIBCO EBX ...)
NOT-FOR-US: TIBICO Software
CVE-2023-26216 (The server component of TIBCO Software Inc.'s TIBCO EBX
Add-ons contai ...)
@@ -207750,6 +207860,7 @@ CVE-2020-28465
CVE-2020-28464 (This affects the package djv before 2.1.4. By controlling the
schema f ...)
NOT-FOR-US: Node djv
CVE-2020-28463 (All versions of package reportlab are vulnerable to
Server-side Reques ...)
+ {DLA-3590-1}
- python-reportlab 3.5.55-1
[stretch] - python-reportlab <postponed> (Can be fixed in next DLA)
NOTE: https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145
@@ -278050,6 +278161,7 @@ CVE-2019-19451 (When GNOME Dia before 2019-11-27 is
launched with a filename arg
NOTE: Fixed by:
https://gitlab.gnome.org/GNOME/dia/commit/baa2df853f9fb770eedcf3d94c7f5becebc90bb9
NOTE: Negligible security impact, hang in end user tool
CVE-2019-19450 (paraparser in ReportLab before 3.5.31 allows remote code
execution bec ...)
+ {DLA-3590-1}
- python-reportlab 3.5.31-1
NOTE:
https://github.com/MrBitBucket/reportlab-mirror/blob/master/CHANGES.md#release-353115102019
NOTE: Fixed by:
https://hg.reportlab.com/hg-public/reportlab/rev/b117091a73c2
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ef0dfcf9c4729e65d70dfb7f883f79b6aa1929a
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ef0dfcf9c4729e65d70dfb7f883f79b6aa1929a
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits