Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
04525b33 by security tracker role at 2023-11-30T20:12:07+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,6 +1,294 @@
-CVE-2023-49620
+CVE-2023-6439 (A vulnerability classified as problematic was found in ZenTao 
PMS 18.8 ...)
+       TODO: check
+CVE-2023-6438 (A vulnerability classified as problematic has been found in 
IceCMS 2.0 ...)
+       TODO: check
+CVE-2023-6435 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6434 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6433 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6432 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6431 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6430 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6429 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6428 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6427 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6426 (A vulnerability has been discovered in BigProf Online Invoicing 
System ...)
+       TODO: check
+CVE-2023-6425 (A vulnerability has been discovered in BigProf Online Clinic 
Managemen ...)
+       TODO: check
+CVE-2023-6424 (A vulnerability has been discovered in BigProf Online Clinic 
Managemen ...)
+       TODO: check
+CVE-2023-6423 (A vulnerability has been discovered in BigProf Online Clinic 
Managemen ...)
+       TODO: check
+CVE-2023-6422 (A vulnerability has been discovered in BigProf Online Clinic 
Managemen ...)
+       TODO: check
+CVE-2023-6420 (A vulnerability has been reported in Voovi Social Networking 
Script ve ...)
+       TODO: check
+CVE-2023-6419 (A vulnerability has been reported in Voovi Social Networking 
Script ve ...)
+       TODO: check
+CVE-2023-6418 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6417 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6416 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6415 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6414 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6413 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6412 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6411 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6410 (A vulnerability has been reported in Voovi Social Networking 
Script th ...)
+       TODO: check
+CVE-2023-6402 (A vulnerability, which was classified as critical, was found in 
PHPGur ...)
+       TODO: check
+CVE-2023-6401 (A vulnerability classified as problematic was found in 
NotePad++ up to ...)
+       TODO: check
+CVE-2023-6376 (Henschen & Associates court document management software does 
not suff ...)
+       TODO: check
+CVE-2023-6375 (Tyler Technologies Court Case Management Plus may store backups 
in a l ...)
+       TODO: check
+CVE-2023-6360 (The 'My Calendar' WordPress Plugin, version < 3.4.22 is 
affected by an ...)
+       TODO: check
+CVE-2023-6354 (Tyler Technologies Magistrate Court Case Management Plus allows 
an una ...)
+       TODO: check
+CVE-2023-6353 (Tyler Technologies Civil and Criminal Electronic Filing allows 
an unau ...)
+       TODO: check
+CVE-2023-6352 (The default configuration of Aquaforest TIFF Server allows 
access to a ...)
+       TODO: check
+CVE-2023-6344 (Tyler Technologies Court Case Management Plus allows a remote, 
unauthe ...)
+       TODO: check
+CVE-2023-6343 (Tyler Technologies Court Case Management Plus allows a remote, 
unauthe ...)
+       TODO: check
+CVE-2023-6342 (Tyler Technologies Court Case Management Plus allows a remote 
attacker ...)
+       TODO: check
+CVE-2023-6341 (Catalis (previously Icon Software) CMS360 allows a remote, 
unauthentic ...)
+       TODO: check
+CVE-2023-6137 (Cross-Site Request Forgery (CSRF) vulnerability in finnj 
Frontier Post ...)
+       TODO: check
+CVE-2023-6136 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-6071 (An Improper Neutralization of Special Elements used in a 
command vulne ...)
+       TODO: check
+CVE-2023-6027 (A critical flaw has been identified in elijaa/phpmemcachedadmin 
affect ...)
+       TODO: check
+CVE-2023-6026 (A Path traversal vulnerability has been reported in 
elijaa/phpmemcache ...)
+       TODO: check
+CVE-2023-5966 (An authenticated privileged attacker could upload a specially 
crafted  ...)
+       TODO: check
+CVE-2023-5965 (An authenticated privileged attacker could upload a specially 
crafted  ...)
+       TODO: check
+CVE-2023-5803 (Cross-Site Request Forgery (CSRF) vulnerability in Business 
Directory  ...)
+       TODO: check
+CVE-2023-4770 (An uncontrolled search path element vulnerability has been 
found on 4D ...)
+       TODO: check
+CVE-2023-48964 (Tenda i6 V1.0.0.8(3856) is vulnerable to Buffer Overflow via 
/goform/W ...)
+       TODO: check
+CVE-2023-48963 (Tenda i6 V1.0.0.8(3856) is vulnerable to Buffer Overflow via 
/goform/w ...)
+       TODO: check
+CVE-2023-48914 (Dreamer CMS v4.1.3 was discovered to contain a Cross-Site 
Request Forg ...)
+       TODO: check
+CVE-2023-48913 (Dreamer CMS v4.1.3 was discovered to contain a Cross-Site 
Request Forg ...)
+       TODO: check
+CVE-2023-48912 (Dreamer CMS v4.1.3 was discovered to contain a Cross-Site 
Request Forg ...)
+       TODO: check
+CVE-2023-48812 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file 
sub_4119A0  ...)
+       TODO: check
+CVE-2023-48811 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48810 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48808 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48807 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48806 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48805 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48804 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48803 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48802 (In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, 
sub_4119A0 ...)
+       TODO: check
+CVE-2023-48754 (Cross-Site Request Forgery (CSRF) vulnerability in Wap Nepal 
Delete Po ...)
+       TODO: check
+CVE-2023-48752 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48749 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48748 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48746 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48744 (Cross-Site Request Forgery (CSRF) vulnerability in Offshore 
Web Master ...)
+       TODO: check
+CVE-2023-48743 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48742 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2023-48737 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48336 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48334 (Cross-Site Request Forgery (CSRF) vulnerability in DAEXT 
League Table  ...)
+       TODO: check
+CVE-2023-48333 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-48331 (Cross-Site Request Forgery (CSRF) vulnerability in Stormhill 
Media MyB ...)
+       TODO: check
+CVE-2023-48330 (Cross-Site Request Forgery (CSRF) vulnerability in Mike Strand 
Bulk Co ...)
+       TODO: check
+CVE-2023-48329 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48328 (Cross-Site Request Forgery (CSRF) vulnerability in Imagely 
WordPress G ...)
+       TODO: check
+CVE-2023-48326 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48323 (Cross-Site Request Forgery (CSRF) vulnerability in Awesome 
Support Tea ...)
+       TODO: check
+CVE-2023-48322 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48321 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48320 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48317 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48289 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-48284 (Cross-Site Request Forgery (CSRF) vulnerability in WebToffee 
Decorator ...)
+       TODO: check
+CVE-2023-48283 (Cross-Site Request Forgery (CSRF) vulnerability in PressTigers 
Simple  ...)
+       TODO: check
+CVE-2023-48282 (Cross-Site Request Forgery (CSRF) vulnerability in Andrea 
Landonio Tax ...)
+       TODO: check
+CVE-2023-48281 (Cross-Site Request Forgery (CSRF) vulnerability in Super Blog 
Me Broke ...)
+       TODO: check
+CVE-2023-48279 (Cross-Site Request Forgery (CSRF) vulnerability in Seraphinite 
Solutio ...)
+       TODO: check
+CVE-2023-48278 (Cross-Site Request Forgery (CSRF) vulnerability in Nitin 
Rathod WP For ...)
+       TODO: check
+CVE-2023-48272 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47877 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47876 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47875 (Cross-Site Request Forgery (CSRF) vulnerability in Perfmatters 
allows  ...)
+       TODO: check
+CVE-2023-47872 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47870 (Cross-Site Request Forgery (CSRF), Missing Authorization 
vulnerability ...)
+       TODO: check
+CVE-2023-47854 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47853 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47851 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47850 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47848 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47844 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47827 (Incorrect Authorization vulnerability in NicheAddons Events 
Addon for  ...)
+       TODO: check
+CVE-2023-47777 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47645 (Cross-Site Request Forgery (CSRF) vulnerability in 
RegistrationMagic R ...)
+       TODO: check
+CVE-2023-47521 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47505 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-46820 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-46086 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-45834 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-45609 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-45066 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-45050 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-44150 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-44143 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-41735 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-41136 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-41128 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-41127 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-40680 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-40674 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-40662 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-40600 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-40211 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-39921 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-38474 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-38400 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-37972 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-37890 (Missing Authorization vulnerability in WPOmnia KB Support 
\u2013 WordP ...)
+       TODO: check
+CVE-2023-37868 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-37867 (Time-of-check Time-of-use (TOCTOU) Race Condition 
vulnerability in Yet ...)
+       TODO: check
+CVE-2023-36685 (Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm 
Force US ...)
+       TODO: check
+CVE-2023-36682 (Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm 
Force US ...)
+       TODO: check
+CVE-2023-36523 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-36507 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2023-34390 (An input validation vulnerability in the Schweitzer 
Engineering Labora ...)
+       TODO: check
+CVE-2023-34389 (An allocation of resources without limits or throttling 
vulnerability  ...)
+       TODO: check
+CVE-2023-34388 (AnImproper Authentication vulnerability in the Schweitzer 
Engineering  ...)
+       TODO: check
+CVE-2023-34030 (Cross-Site Request Forgery (CSRF) vulnerability in Really 
Simple Plugi ...)
+       TODO: check
+CVE-2023-34018 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-33333 (Cross-Site Request Forgery (CSRF) vulnerability in Really 
Simple Plugi ...)
+       TODO: check
+CVE-2023-32291 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-49620 (Before DolphinScheduler version 3.1.0, the login user could 
delete UDF ...)
        NOT-FOR-US: Apache DolphinScheduler
-CVE-2023-49733
+CVE-2023-49733 (Improper Restriction of XML External Entity Reference 
vulnerability in ...)
        NOT-FOR-US: Apache Cocoon
 CVE-2023-5772 (The Debug Log Manager plugin for WordPress is vulnerable to 
Cross-Site ...)
        NOT-FOR-US: WordPress plugin
@@ -168,21 +456,27 @@ CVE-2023-45480 (Tenda AC10 version 
US_AC10V4.0si_V16.03.10.13_cn was discovered
 CVE-2023-45479 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
        NOT-FOR-US: Tenda
 CVE-2023-6351 (Use after free in libavif in Google Chrome prior to 
119.0.6045.199 all ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6350 (Use after free in libavif in Google Chrome prior to 
119.0.6045.199 all ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6348 (Type Confusion in Spellcheck in Google Chrome prior to 
119.0.6045.199  ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6347 (Use after free in Mojo in Google Chrome prior to 119.0.6045.199 
allowe ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6346 (Use after free in WebAudio in Google Chrome prior to 
119.0.6045.199 al ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6345 (Integer overflow in Skia in Google Chrome prior to 
119.0.6045.199 allo ...)
+       {DSA-5569-1}
        - chromium 119.0.6045.199-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-6359 (A Cross-Site Scripting (XSS) vulnerability has been found in 
Alumne LM ...)
@@ -1000,7 +1294,7 @@ CVE-2023-6213 (Memory safety bugs present in Firefox 119. 
Some of these bugs sho
        - firefox 120.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6213
 CVE-2023-6212 (Memory safety bugs present in Firefox 119, Firefox ESR 115.4, 
and Thun ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1014,7 +1308,7 @@ CVE-2023-6210 (When an https: web page created a pop-up 
from a "javascript:" URL
        - firefox 120.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6210
 CVE-2023-6209 (Relative URLs starting with three slashes were incorrectly 
parsed, and ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1022,7 +1316,7 @@ CVE-2023-6209 (Relative URLs starting with three slashes 
were incorrectly parsed
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6209
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6209
 CVE-2023-6208 (When using X11, text selected by the page using the Selection 
API was  ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1030,7 +1324,7 @@ CVE-2023-6208 (When using X11, text selected by the page 
using the Selection API
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6208
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6208
 CVE-2023-6207 (Ownership mismanagement led to a use-after-free in 
ReadableByteStreams ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1038,7 +1332,7 @@ CVE-2023-6207 (Ownership mismanagement led to a 
use-after-free in ReadableByteSt
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6207
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6207
 CVE-2023-6206 (The black fade animation when exiting fullscreen is roughly the 
length ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1046,7 +1340,7 @@ CVE-2023-6206 (The black fade animation when exiting 
fullscreen is roughly the l
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6206
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6206
 CVE-2023-6205 (It was possible to cause the use of a MessagePort after it had 
already ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1054,7 +1348,7 @@ CVE-2023-6205 (It was possible to cause the use of a 
MessagePort after it had al
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6205
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6205
 CVE-2023-6204 (On some systems\u2014depending on the graphics settings and 
drivers\u2 ...)
-       {DSA-5566-1 DSA-5561-1 DLA-3661-1}
+       {DSA-5566-1 DSA-5561-1 DLA-3674-1 DLA-3661-1}
        - firefox 120.0-1
        - firefox-esr 115.5.0esr-1
        - thunderbird 1:115.5.0-1
@@ -1754,12 +2048,14 @@ CVE-2023-47674 (Missing authentication for critical 
function vulnerability in Fi
 CVE-2023-47638
        REJECTED
 CVE-2023-43887 (Libde265 v1.0.12 was discovered to contain multiple buffer 
overflows v ...)
+       {DLA-3676-1}
        - libde265 1.0.13-1
        [bookworm] - libde265 <no-dsa> (Minor issue)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        NOTE: https://github.com/strukturag/libde265/issues/418
        NOTE: 
https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133
 (v1.0.13)
 CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 
allows a ...)
+       {DLA-3676-1}
        - libde265 1.0.13-1 (bug #1056187)
        [bookworm] - libde265 <no-dsa> (Minor issue)
        [bullseye] - libde265 <no-dsa> (Minor issue)
@@ -2079,7 +2375,7 @@ CVE-2023-44442 [GIMP PSD File Parsing Heap-based Buffer 
Overflow Remote Code Exe
        NOTE: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/985c0a20e18b5b3b8a48ee9cb12287b1d5732d3d
 (GIMP_2_10_36)
        NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10101 (restricted)
 CVE-2023-44441 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code 
Execution Vulnerability]
-       {DSA-5564-1}
+       {DSA-5564-1 DLA-3677-1}
        - gimp 2.10.36-1 (bug #1055984)
        [buster] - gimp <not-affected> (DDS plugin added in 2.10.10)
        - gimp-dds <removed>
@@ -8400,7 +8696,7 @@ CVE-2023-36429 (Microsoft Dynamics 365 (On-Premises) 
Information Disclosure Vuln
        NOT-FOR-US: Microsoft
 CVE-2023-36420 (Microsoft ODBC Driver for SQL Server Remote Code Execution 
Vulnerabili ...)
        NOT-FOR-US: Microsoft
-CVE-2023-36419 (Azure HDInsight Apache Oozie Workflow Scheduler Elevation of 
Privilege ...)
+CVE-2023-36419 (Azure HDInsight Apache Oozie Workflow Scheduler XXE Elevation 
of Privi ...)
        NOT-FOR-US: Microsoft
 CVE-2023-36418 (Azure RTOS GUIX Studio Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
@@ -12474,7 +12770,7 @@ CVE-2023-38161 (Windows GDI Elevation of Privilege 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-38160 (Windows TCP/IP Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-38156 (Azure HDInsight Apache Ambari Elevation of Privilege 
Vulnerability)
+CVE-2023-38156 (Azure HDInsight Apache Ambari JDBC Injection Elevation of 
Privilege Vu ...)
        NOT-FOR-US: Microsoft
 CVE-2023-38155 (Azure DevOps Server Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
@@ -14632,11 +14928,13 @@ CVE-2023-41362 (MyBB before 1.8.36 allows Code 
Injection by users with certain h
 CVE-2023-41037 (OpenPGP.js is a JavaScript implementation of the OpenPGP 
protocol. In  ...)
        - node-openpgp <itp> (bug #787774)
 CVE-2023-40890 (A stack-based buffer overflow vulnerability exists in the 
lookup_seque ...)
+       {DLA-3675-1}
        - zbar <unfixed> (bug #1051724)
        NOTE: https://hackmd.io/@cspl/H1PxPAUnn
        NOTE: https://github.com/mchehab/zbar/issues/263
        NOTE: 0.23.92-9 upload adds patch to avoid exploitation, but no 
upstream fix exists yet.
 CVE-2023-40889 (A heap-based buffer overflow exists in the 
qr_reader_match_centers fun ...)
+       {DLA-3675-1}
        - zbar <unfixed> (bug #1051724)
        NOTE: https://hackmd.io/@cspl/B1ZkFZv23
        NOTE: https://github.com/mchehab/zbar/issues/263
@@ -28936,10 +29234,10 @@ CVE-2023-31179 (AgilePoint NX v8.0 SU2.2 & SU2.3 - 
Path traversal -Vulnerability
        NOT-FOR-US: AgilePoint
 CVE-2023-31178 (AgilePoint NX v8.0 SU2.2 & SU2.3 \u2013 Arbitrary File 
DeleteVulnerabi ...)
        NOT-FOR-US: AgilePoint
-CVE-2023-31177
-       RESERVED
-CVE-2023-31176
-       RESERVED
+CVE-2023-31177 (An Improper Neutralization of Input During Web Page Generation 
('Cross ...)
+       TODO: check
+CVE-2023-31176 (An Insufficient Entropy vulnerability in the Schweitzer 
Engineering La ...)
+       TODO: check
 CVE-2023-31175 (An Execution with Unnecessary Privileges vulnerability in the 
Schweitz ...)
        NOT-FOR-US: Schweitzer Engineering Laboratories
 CVE-2023-31174 (A Cross-Site Request Forgery (CSRF) vulnerability in the 
Schweitzer En ...)
@@ -29097,14 +29395,14 @@ CVE-2023-2269 (A denial of service problem was found, 
due to a possible recursiv
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2189388
 CVE-2023-2268 (Plane version 0.7.1 allows an unauthenticated attacker to view 
all sto ...)
        NOT-FOR-US: Plane
-CVE-2023-2267
-       RESERVED
-CVE-2023-2266
-       RESERVED
-CVE-2023-2265
-       RESERVED
-CVE-2023-2264
-       RESERVED
+CVE-2023-2267 (An Improper Input Validation vulnerability in Schweitzer 
Engineering L ...)
+       TODO: check
+CVE-2023-2266 (AnImproper neutralization of input during web page generation 
in the S ...)
+       TODO: check
+CVE-2023-2265 (AnImproper Restriction of Rendered UI Layers or Frames in the 
Schweitz ...)
+       TODO: check
+CVE-2023-2264 (An improper input validation vulnerability in the Schweitzer 
Engineeri ...)
+       TODO: check
 CVE-2023-2263 (The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series 
A is v ...)
        NOT-FOR-US: Rockwell Automation
 CVE-2023-2262 (A buffer overflow vulnerability exists in the Rockwell 
Automation sele ...)
@@ -41878,12 +42176,14 @@ CVE-2023-27105 (A vulnerability in the Wi-Fi file 
transfer module of Shanling M5
 CVE-2023-27104
        RESERVED
 CVE-2023-27103 (Libde265 v1.0.11 was discovered to contain a heap buffer 
overflow via  ...)
+       {DLA-3676-1}
        - libde265 1.0.12-1 (bug #1033257)
        [bookworm] - libde265 <no-dsa> (Minor issue)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        NOTE: https://github.com/strukturag/libde265/issues/394
        NOTE: 
https://github.com/strukturag/libde265/commit/d6bf73e765b7a23627bfd7a8645c143fd9097995
 (v1.0.12)
 CVE-2023-27102 (Libde265 v1.0.11 was discovered to contain a segmentation 
violation vi ...)
+       {DLA-3676-1}
        - libde265 1.0.12-1 (bug #1033257)
        [bookworm] - libde265 <no-dsa> (Minor issue)
        [bullseye] - libde265 <no-dsa> (Minor issue)
@@ -43191,8 +43491,8 @@ CVE-2023-26535 (Cross-Site Request Forgery (CSRF) 
vulnerability in WPPOOL Sheets
        NOT-FOR-US: WordPress plugin
 CVE-2023-26534 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability 
in OneW ...)
        NOT-FOR-US: WordPress plugin
-CVE-2023-26533
-       RESERVED
+CVE-2023-26533 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
 CVE-2023-26532 (Cross-Site Request Forgery (CSRF) vulnerability in AccessPress 
Themes  ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-26531 (Cross-Site Request Forgery (CSRF) vulnerability in 
\u95ea\u7535\u535a  ...)
@@ -47843,8 +48143,8 @@ CVE-2023-25059 (Auth. (admin+) Stored Cross-Site 
Scripting (XSS) vulnerability i
        NOT-FOR-US: WordPress plugin
 CVE-2023-25058 (Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm 
Force Sc ...)
        NOT-FOR-US: WordPress plugin
-CVE-2023-25057
-       RESERVED
+CVE-2023-25057 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
 CVE-2023-25056 (Cross-Site Request Forgery (CSRF) vulnerability in SlickRemix 
Feed The ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-25055 (Cross-Site Request Forgery (CSRF) vulnerability in Amit 
Agarwal Google ...)
@@ -67646,8 +67946,7 @@ CVE-2022-45136 (Apache Jena SDB 3.17.0 and earlier is 
vulnerable to a JDBC Deser
        - apache-jena 4.5.0-1 (bug #1024738)
        NOTE: https://www.openwall.com/lists/oss-security/2022/11/14/5
        NOTE: The SDB module was removed after 3.17.0, marking 4.5.0 as fixed: 
https://jena.apache.org/documentation/archive/sdb/
-CVE-2022-45135
-       RESERVED
+CVE-2022-45135 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
        NOT-FOR-US: Apache Cocoon
 CVE-2022-43668 (Typora versions prior to 1.4.4 fails to properly neutralize 
JavaScript ...)
        NOT-FOR-US: Typora
@@ -166912,8 +167211,8 @@ CVE-2021-36808 (A local attacker could bypass the app 
password using a race cond
        NOT-FOR-US: Sophos
 CVE-2021-36807 (An authenticated user could potentially execute code via an 
SQLi vulne ...)
        NOT-FOR-US: Sophos
-CVE-2021-36806
-       RESERVED
+CVE-2021-36806 (A reflected XSS vulnerability allows an open redirect when the 
victim  ...)
+       TODO: check
 CVE-2020-36431 (Unicorn Engine 1.0.2 has an out-of-bounds write in 
helper_wfe_arm.)
        NOT-FOR-US: Unicorn Engine
 CVE-2020-36430 (libass 0.15.x before 0.15.1 has a heap-based buffer overflow 
in decode ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04525b332aea5cbd55aad776464bc7e104d1068e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04525b332aea5cbd55aad776464bc7e104d1068e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to