Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
40d9d1ae by security tracker role at 2024-02-13T20:12:08+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,13 +1,281 @@
-CVE-2023-4408
+CVE-2024-25122 (sidekiq-unique-jobs is an open source project which prevents 
simultane ...)
+       TODO: check
+CVE-2024-24925 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24924 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24923 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24922 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24921 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24920 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
+       TODO: check
+CVE-2024-24814 (mod_auth_openidc is an OpenID Certified\u2122 authentication 
and autho ...)
+       TODO: check
+CVE-2024-24782 (An unauthenticated attacker can send a ping request from one 
network t ...)
+       TODO: check
+CVE-2024-24781 (An unauthenticated remote attacker can use an uncontrolled 
resource co ...)
+       TODO: check
+CVE-2024-24751 (sf_event_mgt is an event management and registration extension 
for the ...)
+       TODO: check
+CVE-2024-23816 (A vulnerability has been identified in Location Intelligence 
Perpetual ...)
+       TODO: check
+CVE-2024-23813 (A vulnerability has been identified in Polarion ALM (All 
versions). Th ...)
+       TODO: check
+CVE-2024-23812 (A vulnerability has been identified in SINEC NMS (All versions 
< V2.0  ...)
+       TODO: check
+CVE-2024-23811 (A vulnerability has been identified in SINEC NMS (All versions 
< V2.0  ...)
+       TODO: check
+CVE-2024-23810 (A vulnerability has been identified in SINEC NMS (All versions 
< V2.0  ...)
+       TODO: check
+CVE-2024-23804 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23803 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23802 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23801 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23800 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23799 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23798 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23797 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23796 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23795 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
+       TODO: check
+CVE-2024-23440 (Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory 
Read vuln ...)
+       TODO: check
+CVE-2024-23439 (Vba32 Antivirus v3.36.0 is vulnerable to an Arbitrary Memory 
Read vuln ...)
+       TODO: check
+CVE-2024-22923 (SQL injection vulnerability in adv radius v.2.2.5 allows a 
local attac ...)
+       TODO: check
+CVE-2024-22043 (A vulnerability has been identified in Parasolid V35.0 (All 
versions < ...)
+       TODO: check
+CVE-2024-22042 (A vulnerability has been identified in Unicam FX (All 
versions). The w ...)
+       TODO: check
+CVE-2024-21420 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21413 (Microsoft Outlook Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21412 (Internet Shortcut Files Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-21410 (Microsoft Exchange Server Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21406 (Windows Printing Service Spoofing Vulnerability)
+       TODO: check
+CVE-2024-21405 (Microsoft Message Queuing (MSMQ) Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-21404 (.NET Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-21403 (Microsoft Azure Kubernetes Service Confidential Container 
Elevation of ...)
+       TODO: check
+CVE-2024-21402 (Microsoft Outlook Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21401 (Microsoft Entra Jira Single-Sign-On Plugin Elevation of 
Privilege Vuln ...)
+       TODO: check
+CVE-2024-21397 (Microsoft Azure File Sync Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21396 (Dynamics 365 Sales Spoofing Vulnerability)
+       TODO: check
+CVE-2024-21395 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-21394 (Dynamics 365 Field Service Spoofing Vulnerability)
+       TODO: check
+CVE-2024-21393 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-21391 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21389 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-21386 (.NET Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-21384 (Microsoft Office OneNote Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21381 (Microsoft Azure Active Directory B2C Spoofing Vulnerability)
+       TODO: check
+CVE-2024-21380 (Microsoft Dynamics Business Central/NAV Information Disclosure 
Vulnera ...)
+       TODO: check
+CVE-2024-21379 (Microsoft Word Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21378 (Microsoft Outlook Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21377 (Windows DNS Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-21376 (Microsoft Azure Kubernetes Service Confidential Container 
Remote Code  ...)
+       TODO: check
+CVE-2024-21375 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21374 (Microsoft Teams for Android Information Disclosure)
+       TODO: check
+CVE-2024-21372 (Windows OLE Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21371 (Windows Kernel Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21370 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21369 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21368 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21367 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21366 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21365 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21364 (Microsoft Azure Site Recovery Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-21363 (Microsoft Message Queuing (MSMQ) Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-21362 (Windows Kernel Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-21361 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21360 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21359 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21358 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21357 (Windows Pragmatic General Multicast (PGM) Remote Code 
Execution Vulner ...)
+       TODO: check
+CVE-2024-21356 (Windows Lightweight Directory Access Protocol (LDAP) Denial of 
Service ...)
+       TODO: check
+CVE-2024-21355 (Microsoft Message Queuing (MSMQ) Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-21354 (Microsoft Message Queuing (MSMQ) Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-21353 (Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21352 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21351 (Windows SmartScreen Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-21350 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2024-21349 (Microsoft ActiveX Data Objects Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-21348 (Internet Connection Sharing (ICS) Denial of Service 
Vulnerability)
+       TODO: check
+CVE-2024-21347 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21346 (Win32k Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21345 (Windows Kernel Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21344 (Windows Network Address Translation (NAT) Denial of Service 
Vulnerabil ...)
+       TODO: check
+CVE-2024-21343 (Windows Network Address Translation (NAT) Denial of Service 
Vulnerabil ...)
+       TODO: check
+CVE-2024-21342 (Windows DNS Client Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-21341 (Windows Kernel Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-21340 (Windows Kernel Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-21339 (Windows USB Generic Parent Driver Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-21338 (Windows Kernel Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-21329 (Azure Connected Machine Agent Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-21328 (Dynamics 365 Sales Spoofing Vulnerability)
+       TODO: check
+CVE-2024-21327 (Microsoft Dynamics 365 Customer Engagement Cross-Site 
Scripting Vulner ...)
+       TODO: check
+CVE-2024-21315 (Microsoft Defender for Endpoint Protection Elevation of 
Privilege Vuln ...)
+       TODO: check
+CVE-2024-21304 (Trusted Compute Base Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-20695 (Skype for Business Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-20684 (Windows Hyper-V Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-20679 (Azure Stack Hub Spoofing Vulnerability)
+       TODO: check
+CVE-2024-20673 (Microsoft Office Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-20667 (Azure DevOps Server Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-1378 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1374 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1372 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1369 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1359 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1355 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1354 (A command injection vulnerability was identified in GitHub 
Enterprise  ...)
+       TODO: check
+CVE-2024-1309 (Uncontrolled Resource Consumption vulnerability in Honeywell 
Niagara F ...)
+       TODO: check
+CVE-2024-1216 (Twister Antivirus v8.17 is vulnerable to a Denial of Service 
vulnerabi ...)
+       TODO: check
+CVE-2024-1163 (Path Traversal in GitHub repository mbloch/mapshaper prior to 
0.6.44.)
+       TODO: check
+CVE-2024-1160 (The Bold Page Builder plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-1159 (The Bold Page Builder plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-1157 (The Bold Page Builder plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-1140 (Twister Antivirus v8.17 is vulnerable to an Out-of-bounds Read 
vulnera ...)
+       TODO: check
+CVE-2024-1096 (Twister Antivirus v8.17 allows Elevation of Privileges on the 
computer ...)
+       TODO: check
+CVE-2024-1084 (Cross-site Scripting in thetag name pattern field in the tag 
protectio ...)
+       TODO: check
+CVE-2024-1082 (A path traversal vulnerability was identified in GitHub 
Enterprise Ser ...)
+       TODO: check
+CVE-2024-0707
+       REJECTED
+CVE-2023-6072 (A cross-site scripting vulnerability in Trellix Central 
Management (CM ...)
+       TODO: check
+CVE-2023-5680 (If a resolver cache has a very large number of ECS records 
stored for  ...)
+       TODO: check
+CVE-2023-51440 (A vulnerability has been identified in SIMATIC CP 343-1 
(6GK7343-1EX30 ...)
+       TODO: check
+CVE-2023-50808 (Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows 
DOM-based  ...)
+       TODO: check
+CVE-2023-50236 (A vulnerability has been identified in Polarion ALM (All 
versions). Th ...)
+       TODO: check
+CVE-2023-49125 (A vulnerability has been identified in Parasolid V35.0 (All 
versions < ...)
+       TODO: check
+CVE-2023-48432 (An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 
9.0, and ...)
+       TODO: check
+CVE-2023-48364 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions),  ...)
+       TODO: check
+CVE-2023-48363 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions),  ...)
+       TODO: check
+CVE-2023-45207 (An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 
9.0, and ...)
+       TODO: check
+CVE-2023-45206 (An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 
9.0, and ...)
+       TODO: check
+CVE-2023-31347 (Due to a code bug in Secure_TSC, SEV firmware may allow an 
attacker wi ...)
+       TODO: check
+CVE-2023-31346 (Failure to initialize memory in SEV Firmware may allow a 
privileged at ...)
+       TODO: check
+CVE-2023-4408 (The DNS message parsing code in `named` includes a section 
whose compu ...)
        - bind9 <unfixed>
        NOTE: https://kb.isc.org/docs/cve-2023-4408
-CVE-2023-5517
+CVE-2023-5517 (A flaw in query-handling code can cause `named` to exit 
prematurely wi ...)
        - bind9 <unfixed>
        NOTE: https://kb.isc.org/docs/cve-2023-5517
-CVE-2023-5679
+CVE-2023-5679 (A bad interaction between DNS64 and serve-stale may cause 
`named` to c ...)
        - bind9 <unfixed>
        NOTE: https://kb.isc.org/docs/cve-2023-5679
-CVE-2023-6516
+CVE-2023-6516 (To keep its cache database efficient, `named` running as a 
recursive r ...)
        - bind9 1:9.17.19-1
        [buster] - bind9 <not-affected> (Vulnerable code only in 9.16.y series)
        NOTE: https://kb.isc.org/docs/cve-2023-6516
@@ -959,9 +1227,9 @@ CVE-2024-24593 (A cross-site request forgery (CSRF) 
vulnerability in all version
        NOT-FOR-US: Allegro AI's ClearML platform
 CVE-2024-24592 (Lack of authentication in all versions of the fileserver 
component of  ...)
        NOT-FOR-US: Allegro AI's ClearML platform
-CVE-2024-24591 (A path traversal vulnerability in version 1.4.0 or newer of 
Allegro AI ...)
+CVE-2024-24591 (A path traversal vulnerability in versions 1.4.0 to 1.14.1 of 
the clie ...)
        NOT-FOR-US: Allegro AI's ClearML platform
-CVE-2024-24590 (Deserialization of untrusted data can occur in version 0.17.0 
or newer ...)
+CVE-2024-24590 (Deserialization of untrusted data can occur in versions 0.17.0 
to 1.14 ...)
        NOT-FOR-US: Allegro AI's ClearML platform
 CVE-2024-24291 (An issue in the component /member/index/login of yzmcms v7.0 
allows at ...)
        NOT-FOR-US: yzmcms
@@ -12109,9 +12377,9 @@ CVE-2023-49713 (Denial-of-service (DoS) vulnerability 
exists in NetBIOS service
        NOT-FOR-US: JTEKT ELECTRONICS CORPORATION
 CVE-2023-49695 (OS command injection vulnerability in WRC-X3000GSN v1.0.2, 
WRC-X3000GS ...)
        NOT-FOR-US: ELECOM
-CVE-2023-49692 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU (Al ...)
+CVE-2023-49692 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU (6G ...)
        NOT-FOR-US: Siemens
-CVE-2023-49691 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU (Al ...)
+CVE-2023-49691 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU (6G ...)
        NOT-FOR-US: Siemens
 CVE-2023-49607 (Mattermost fails to validate the type of the "reminder" body 
request p ...)
        - mattermost-server <itp> (bug #823556)
@@ -12141,15 +12409,15 @@ CVE-2023-46455 (In GL.iNET GL-AR300M routers with 
firmware v4.3.7 it is possible
        NOT-FOR-US: GL.iNET GL-AR300M routers
 CVE-2023-46454 (In GL.iNET GL-AR300M routers with firmware v4.3.7, it is 
possible to i ...)
        NOT-FOR-US: GL.iNET GL-AR300M routers
-CVE-2023-46285 (A vulnerability has been identified in Opcenter Quality (All 
versions) ...)
+CVE-2023-46285 (A vulnerability has been identified in Opcenter Quality (All 
versions  ...)
        NOT-FOR-US: Siemens
-CVE-2023-46284 (A vulnerability has been identified in Opcenter Quality (All 
versions) ...)
+CVE-2023-46284 (A vulnerability has been identified in Opcenter Quality (All 
versions  ...)
        NOT-FOR-US: Siemens
-CVE-2023-46283 (A vulnerability has been identified in Opcenter Quality (All 
versions) ...)
+CVE-2023-46283 (A vulnerability has been identified in Opcenter Quality (All 
versions  ...)
        NOT-FOR-US: Siemens
-CVE-2023-46282 (A vulnerability has been identified in Opcenter Quality (All 
versions) ...)
+CVE-2023-46282 (A vulnerability has been identified in Opcenter Quality (All 
versions  ...)
        NOT-FOR-US: Siemens
-CVE-2023-46281 (A vulnerability has been identified in Opcenter Quality (All 
versions) ...)
+CVE-2023-46281 (A vulnerability has been identified in Opcenter Quality (All 
versions  ...)
        NOT-FOR-US: Siemens
 CVE-2023-46156 (Affected devices improperly handle specially crafted packets 
sent to p ...)
        NOT-FOR-US: Siemens
@@ -16677,19 +16945,19 @@ CVE-2023-45582 (An improper restriction of excessive 
authentication attempts vul
        NOT-FOR-US: FortiGuard
 CVE-2023-44374 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
        NOT-FOR-US: Siemens
-CVE-2023-44373 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44373 (Affected devices do not properly sanitize an input field.  
This could  ...)
        NOT-FOR-US: Siemens
-CVE-2023-44322 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44322 (Affected devices can be configured to send emails when certain 
events  ...)
        NOT-FOR-US: Siemens
-CVE-2023-44321 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44321 (Affected devices do not properly validate the length of inputs 
when pe ...)
        NOT-FOR-US: Siemens
-CVE-2023-44320 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44320 (Affected devices do not properly validate the authentication 
when perf ...)
        NOT-FOR-US: Siemens
-CVE-2023-44319 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44319 (Affected devices use a weak checksum algorithm to protect the 
configur ...)
        NOT-FOR-US: Siemens
 CVE-2023-44318 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
        NOT-FOR-US: Siemens
-CVE-2023-44317 (A vulnerability has been identified in RUGGEDCOM RM1224 
LTE(4G) EU, RU ...)
+CVE-2023-44317 (Affected products do not properly validate the content of 
uploaded X50 ...)
        NOT-FOR-US: Siemens
 CVE-2023-44248 (An improper access control vulnerability [CWE-284] 
inFortiEDRCollector ...)
        NOT-FOR-US: FortiGuard
@@ -57745,8 +58013,8 @@ CVE-2023-26564 (The Syncfusion EJ2 ASPCore File 
Provider 3ac357f is vulnerable t
        NOT-FOR-US: Syncfusion
 CVE-2023-26563 (The Syncfusion EJ2 Node File Provider 0102271 is vulnerable to 
filesys ...)
        NOT-FOR-US: Syncfusion
-CVE-2023-26562
-       RESERVED
+CVE-2023-26562 (In Zimbra Collaboration (ZCS) 8.8.15 and 9.0, a closed account 
(with 2 ...)
+       TODO: check
 CVE-2023-26561
        RESERVED
 CVE-2023-26560 (Northern.tech CFEngine Enterprise before 3.21.1 allows a 
subset of aut ...)
@@ -70347,7 +70615,7 @@ CVE-2023-22620 (An issue was discovered in SecurePoint 
UTM before 12.2.5.1. The
        NOT-FOR-US: SecurePoint UTM
 CVE-2023-22619
        RESERVED
-CVE-2023-0076 (The Download Attachments WordPress plugin through 1.2.24 does 
not vali ...)
+CVE-2023-0076 (The Download Attachments WordPress plugin before 1.3 does not 
validate ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-0075 (The Amazon JS WordPress plugin through 0.10 does not validate 
and esca ...)
        NOT-FOR-US: WordPress plugin
@@ -87119,8 +87387,8 @@ CVE-2023-20588 (A division-by-zero error on some AMD 
processors can potentially
        NOTE: 
https://git.kernel.org/linus/f58d6fbcb7c848b7f2469be339bc571f2e9d245b
        NOTE: https://xenbits.xen.org/xsa/advisory-439.html
        NOTE: 
https://github.com/xen-project/xen/commit/d7b78041dc819efde0350f27754a61cb01a93496
-CVE-2023-20587
-       RESERVED
+CVE-2023-20587 (Improper Access Control in System Management Mode (SMM) may 
allow an a ...)
+       TODO: check
 CVE-2023-20586 (A potential vulnerability was reported in Radeon\u2122 
Software Crimso ...)
        NOT-FOR-US: AMD
 CVE-2023-20585
@@ -87135,8 +87403,8 @@ CVE-2023-20581
        RESERVED
 CVE-2023-20580
        RESERVED
-CVE-2023-20579
-       RESERVED
+CVE-2023-20579 (Improper Access Control in the AMD SPI protection feature may 
allow a  ...)
+       TODO: check
 CVE-2023-20578
        RESERVED
 CVE-2023-20577
@@ -87153,8 +87421,8 @@ CVE-2023-20572
        RESERVED
 CVE-2023-20571 (A race condition in System Management Mode (SMM) code may 
allow an att ...)
        NOT-FOR-US: AMD
-CVE-2023-20570
-       RESERVED
+CVE-2023-20570 (Insufficient verification of data authenticity in the 
configuration st ...)
+       TODO: check
 CVE-2023-20569 (A side channel vulnerability on some of the AMD CPUs may allow 
an atta ...)
        {DSA-5475-1 DLA-3525-1}
        - amd64-microcode 3.20230719.1
@@ -132402,8 +132670,8 @@ CVE-2021-46759 (Improper syscall input validation in 
AMD TEE (Trusted Execution
        NOT-FOR-US: AMD
 CVE-2021-46758 (Insufficient validation of SPI flash addresses in the ASP (AMD 
Secure  ...)
        NOT-FOR-US: AMD
-CVE-2021-46757
-       RESERVED
+CVE-2021-46757 (Insufficient checking of memory buffer in ASP Secure OS may 
allow an a ...)
+       TODO: check
 CVE-2021-46756 (Insufficient validation of inputs in SVC_MAP_USER_STACK in the 
ASP (AM ...)
        NOT-FOR-US: AMD
 CVE-2021-46755 (Failure to unmap certain SysHub mappings in error paths of the 
ASP (AM ...)
@@ -210551,9 +210819,9 @@ CVE-2021-25666 (A vulnerability has been identified 
in SCALANCE W780 and W740 (I
        NOT-FOR-US: Siemens
 CVE-2021-25665 (A vulnerability has been identified in Simcenter STAR-CCM+ 
Viewer (All ...)
        NOT-FOR-US: Siemens
-CVE-2021-25664 (A vulnerability has been identified in Capital VSTAR (Versions 
includi ...)
+CVE-2021-25664 (A vulnerability has been identified in Capital Embedded AR 
Classic 431 ...)
        NOT-FOR-US: Nucleus (Siemens)
-CVE-2021-25663 (A vulnerability has been identified in Capital VSTAR (Versions 
includi ...)
+CVE-2021-25663 (A vulnerability has been identified in Capital Embedded AR 
Classic 431 ...)
        NOT-FOR-US: Nucleus (Siemens)
 CVE-2021-25662 (A vulnerability has been identified in SIMATIC HMI Comfort 
Outdoor Pan ...)
        NOT-FOR-US: Siemens
@@ -323601,7 +323869,7 @@ CVE-2019-13941 (A vulnerability has been identified 
in OZW672 (All versions < V1
        NOT-FOR-US: Siemens
 CVE-2019-13940 (A vulnerability has been identified in SIMATIC ET 200pro 
IM154-8 PN/DP ...)
        NOT-FOR-US: Siemens
-CVE-2019-13939 (A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) 
(All ve ...)
+CVE-2019-13939 (A vulnerability has been identified in Capital Embedded AR 
Classic 431 ...)
        NOT-FOR-US: Nucleus
 CVE-2019-13938
        RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40d9d1ae13c1f6b3185b4f0e7179dbacdc989541

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40d9d1ae13c1f6b3185b4f0e7179dbacdc989541
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to