Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
cc1bff55 by security tracker role at 2023-06-14T08:12:10+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,135 @@
+CVE-2023-3238 (A vulnerability, which was classified as critical, has been
found in O ...)
+ TODO: check
+CVE-2023-3237 (A vulnerability classified as critical was found in OTCMS up to
6.62. ...)
+ TODO: check
+CVE-2023-3236 (A vulnerability classified as critical has been found in mccms
up to 2 ...)
+ TODO: check
+CVE-2023-3235 (A vulnerability was found in mccms up to 2.6.5. It has been
rated as c ...)
+ TODO: check
+CVE-2023-3234 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It
has been ...)
+ TODO: check
+CVE-2023-3233 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It
has been ...)
+ TODO: check
+CVE-2023-3232 (A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and
classifi ...)
+ TODO: check
+CVE-2023-3231 (A vulnerability has been found in UJCMS up to 6.0.2 and
classified as ...)
+ TODO: check
+CVE-2023-3230 (Missing Authorization in GitHub repository
fossbilling/fossbilling pri ...)
+ TODO: check
+CVE-2023-3229 (Business Logic Errors in GitHub repository
fossbilling/fossbilling pri ...)
+ TODO: check
+CVE-2023-3228 (Business Logic Errors in GitHub repository
fossbilling/fossbilling pri ...)
+ TODO: check
+CVE-2023-3227 (Insufficient Granularity of Access Control in GitHub repository
fossbi ...)
+ TODO: check
+CVE-2023-3203 (The MStore API plugin for WordPress is vulnerable to Cross-Site
Reques ...)
+ TODO: check
+CVE-2023-3201 (The MStore API plugin for WordPress is vulnerable to Cross-Site
Reques ...)
+ TODO: check
+CVE-2023-3200 (The MStore API plugin for WordPress is vulnerable to Cross-Site
Reques ...)
+ TODO: check
+CVE-2023-3198 (The MStore API plugin for WordPress is vulnerable to Cross-Site
Reques ...)
+ TODO: check
+CVE-2023-3189 (A vulnerability, which was classified as problematic, was found
in Sou ...)
+ TODO: check
+CVE-2023-3001 (A CWE-502: Deserialization of Untrusted Data vulnerability
exists in t ...)
+ TODO: check
+CVE-2023-34944 (An arbitrary file upload vulnerability in the
/fileUpload.lib.php comp ...)
+ TODO: check
+CVE-2023-34537 (A Reflected XSS was discovered in HotelDruid version 3.0.5, an
attacke ...)
+ TODO: check
+CVE-2023-34396 (Allocation of Resources Without Limits or Throttling
vulnerability in ...)
+ TODO: check
+CVE-2023-34250 (Discourse is an open source discussion platform. Prior to
version 3.0. ...)
+ TODO: check
+CVE-2023-34149 (Allocation of Resources Without Limits or Throttling
vulnerability in ...)
+ TODO: check
+CVE-2023-34000 (Unauth. IDOR vulnerability leading to PII Disclosure
inWooCommerce Str ...)
+ TODO: check
+CVE-2023-33933 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2023-33817 (hoteldruid v3.0.5 was discovered to contain a SQL injection
vulnerabil ...)
+ TODO: check
+CVE-2023-33146 (Microsoft Office Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-33145 (Microsoft Edge (Chromium-based) Information Disclosure
Vulnerability)
+ TODO: check
+CVE-2023-33144 (Visual Studio Code Spoofing Vulnerability)
+ TODO: check
+CVE-2023-33142 (Microsoft SharePoint Server Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2023-33140 (Microsoft OneNote Spoofing Vulnerability)
+ TODO: check
+CVE-2023-33139 (Visual Studio Information Disclosure Vulnerability)
+ TODO: check
+CVE-2023-33137 (Microsoft Excel Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-33135 (.NET and Visual Studio Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-33133 (Microsoft Excel Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-33132 (Microsoft SharePoint Server Spoofing Vulnerability)
+ TODO: check
+CVE-2023-33131 (Microsoft Outlook Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-33130 (Microsoft SharePoint Server Spoofing Vulnerability)
+ TODO: check
+CVE-2023-33129 (Microsoft SharePoint Denial of Service Vulnerability)
+ TODO: check
+CVE-2023-33128 (.NET and Visual Studio Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-33126 (.NET and Visual Studio Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-32301 (Discourse is an open source discussion platform. Prior to
version 3.0. ...)
+ TODO: check
+CVE-2023-32061 (Discourse is an open source discussion platform. Prior to
version 3.0. ...)
+ TODO: check
+CVE-2023-32032 (.NET and Visual Studio Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-32029 (Microsoft Excel Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-32022 (<div data-wrapper="true" style="font-family:'Segoe
UI','Helvetica Neue ...)
+ TODO: check
+CVE-2023-32021 (Windows SMB Witness Service Security Feature Bypass
Vulnerability)
+ TODO: check
+CVE-2023-32020 (Windows DNS Spoofing Vulnerability)
+ TODO: check
+CVE-2023-32019 (Windows Kernel Information Disclosure Vulnerability)
+ TODO: check
+CVE-2023-32018 (Windows Hello Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-32017 (Microsoft PostScript Printer Driver Remote Code Execution
Vulnerabilit ...)
+ TODO: check
+CVE-2023-32016 (Windows Installer Information Disclosure Vulnerability)
+ TODO: check
+CVE-2023-32015 (Windows Pragmatic General Multicast (PGM) Remote Code
Execution Vulner ...)
+ TODO: check
+CVE-2023-32014 (Windows Pragmatic General Multicast (PGM) Remote Code
Execution Vulner ...)
+ TODO: check
+CVE-2023-32013 (Windows Hyper-V Denial of Service Vulnerability)
+ TODO: check
+CVE-2023-32012 (Windows Container Manager Service Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2023-32011 (Windows iSCSI Discovery Service Denial of Service
Vulnerability)
+ TODO: check
+CVE-2023-32010 (Windows Bus Filter Driver Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-32009 (Windows Collaborative Translation Framework Elevation of
Privilege Vul ...)
+ TODO: check
+CVE-2023-32008 (Windows Resilient File System (ReFS) Remote Code Execution
Vulnerabili ...)
+ TODO: check
+CVE-2023-2778 (A denial-of-service vulnerability exists in Rockwell Automation
Factor ...)
+ TODO: check
+CVE-2023-2639 (The underlying feedback mechanism of Rockwell
Automation'sFactoryTal ...)
+ TODO: check
+CVE-2023-2638 (Rockwell Automation's FactoryTalk System Services does not
verify that ...)
+ TODO: check
+CVE-2023-2637 (Rockwell Automation's FactoryTalk System Services uses a
hard-coded cr ...)
+ TODO: check
+CVE-2023-2570 (A CWE-129: Improper Validation of Array Index vulnerability
exists tha ...)
+ TODO: check
+CVE-2023-2569 (A CWE-787: Out-of-Bounds Write vulnerability exists that could
cause l ...)
+ TODO: check
CVE-2023-3224 (Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3.)
NOT-FOR-US: Nuxt
CVE-2023-3218 (Race Condition within a Thread in GitHub repository
it-novum/openitcoc ...)
@@ -4215,8 +4347,8 @@ CVE-2023-31144 (Craft CMS is a content management system.
Starting in version 3.
NOT-FOR-US: Craft CMS
CVE-2023-31143 (mage-ai is an open-source data pipeline tool for transforming
and inte ...)
NOT-FOR-US: mage-ai
-CVE-2023-31142
- RESERVED
+CVE-2023-31142 (Discourse is an open source discussion platform. Prior to
version 3.0. ...)
+ TODO: check
CVE-2023-31141 (OpenSearch is open-source software suite for search,
analytics, and ob ...)
NOT-FOR-US: OpenSearch
CVE-2023-31140 (OpenProject is open source project management software.
Starting with ...)
@@ -5805,8 +5937,8 @@ CVE-2023-30633
RESERVED
CVE-2023-30632
RESERVED
-CVE-2023-30631
- RESERVED
+CVE-2023-30631 (Improper Input Validation vulnerability in Apache Software
Foundation ...)
+ TODO: check
CVE-2023-30630 (Dmidecode before 3.5 allows -dump-bin to overwrite a local
file. This ...)
- dmidecode <unfixed> (bug #1034483)
[bookworm] - dmidecode <no-dsa> (Minor issue)
@@ -9316,52 +9448,52 @@ CVE-2023-29375 (An issue was discovered in Progress
Sitefinity 13.3 before 13.3.
NOT-FOR-US: Progress Sitefinity
CVE-2023-29374 (In LangChain through 0.0.131, the LLMMathChain chain allows
prompt inj ...)
NOT-FOR-US: LangChain
-CVE-2023-29373
- RESERVED
-CVE-2023-29372
- RESERVED
-CVE-2023-29371
- RESERVED
-CVE-2023-29370
- RESERVED
-CVE-2023-29369
- RESERVED
-CVE-2023-29368
- RESERVED
-CVE-2023-29367
- RESERVED
-CVE-2023-29366
- RESERVED
-CVE-2023-29365
- RESERVED
-CVE-2023-29364
- RESERVED
-CVE-2023-29363
- RESERVED
-CVE-2023-29362
- RESERVED
-CVE-2023-29361
- RESERVED
-CVE-2023-29360
- RESERVED
-CVE-2023-29359
- RESERVED
-CVE-2023-29358
- RESERVED
-CVE-2023-29357
- RESERVED
+CVE-2023-29373 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-29372 (Microsoft WDAC OLE DB provider for SQL Server Remote Code
Execution Vu ...)
+ TODO: check
+CVE-2023-29371 (Windows GDI Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-29370 (Windows Media Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-29369 (Remote Procedure Call Runtime Denial of Service Vulnerability)
+ TODO: check
+CVE-2023-29368 (Windows Filtering Platform Elevation of Privilege
Vulnerability)
+ TODO: check
+CVE-2023-29367 (iSCSI Target WMI Provider Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-29366 (Windows Geolocation Service Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2023-29365 (Windows Media Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-29364 (Windows Authentication Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-29363 (Windows Pragmatic General Multicast (PGM) Remote Code
Execution Vulner ...)
+ TODO: check
+CVE-2023-29362 (Remote Desktop Client Remote Code Execution Vulnerability)
+ TODO: check
+CVE-2023-29361 (Windows Cloud Files Mini Filter Driver Elevation of Privilege
Vulnerab ...)
+ TODO: check
+CVE-2023-29360 (Windows TPM Device Driver Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-29359 (GDI Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-29358 (Windows GDI Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2023-29357 (Microsoft SharePoint Server Elevation of Privilege
Vulnerability)
+ TODO: check
CVE-2023-29356
RESERVED
-CVE-2023-29355
- RESERVED
+CVE-2023-29355 (DHCP Server Service Information Disclosure Vulnerability)
+ TODO: check
CVE-2023-29354 (Microsoft Edge (Chromium-based) Security Feature Bypass
Vulnerability)
NOT-FOR-US: Microsoft
-CVE-2023-29353
- RESERVED
-CVE-2023-29352
- RESERVED
-CVE-2023-29351
- RESERVED
+CVE-2023-29353 (Sysinternals Process Monitor for Windows Denial of Service
Vulnerabili ...)
+ TODO: check
+CVE-2023-29352 (Windows Remote Desktop Security Feature Bypass Vulnerability)
+ TODO: check
+CVE-2023-29351 (Windows Group Policy Elevation of Privilege Vulnerability)
+ TODO: check
CVE-2023-29350 (Microsoft Edge (Chromium-based) Elevation of Privilege
Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-29349
@@ -9370,8 +9502,8 @@ CVE-2023-29348
RESERVED
CVE-2023-29347
RESERVED
-CVE-2023-29346
- RESERVED
+CVE-2023-29346 (NTFS Elevation of Privilege Vulnerability)
+ TODO: check
CVE-2023-29345 (Microsoft Edge (Chromium-based) Security Feature Bypass
Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-29344 (Microsoft Office Remote Code Execution Vulnerability)
@@ -15732,6 +15864,7 @@ CVE-2023-27478 (libmemcached-awesome is an open source
C/C++ client library and
CVE-2023-27477 (wasmtime is a fast and secure runtime for WebAssembly.
Wasmtime's code ...)
NOT-FOR-US: wasmtime
CVE-2023-27476 (OWSLib is a Python package for client programming with Open
Geospatial ...)
+ {DSA-5426-1}
[experimental] - owslib 0.28.1-1~exp1
- owslib 0.27.2-3 (bug #1034182)
NOTE:
https://github.com/geopython/OWSLib/commit/d91267303a695d69e73fa71efa100a035852a063
(0.29.0)
@@ -16401,8 +16534,8 @@ CVE-2023-1051 (Improper Neutralization of Input During
Web Page Generation ('Cro
NOT-FOR-US: Web Report System
CVE-2023-1050 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
NOT-FOR-US: Web Report System
-CVE-2023-1049
- RESERVED
+CVE-2023-1049 (A CWE-94: Improper Control of Generation of Code ('Code
Injection') vu ...)
+ TODO: check
CVE-2023-XXXX [RUSTSEC-2023-0015]
- rust-ascii 0.9.3-1
[bullseye] - rust-ascii <no-dsa> (Minor issue)
@@ -20230,8 +20363,8 @@ CVE-2023-0839 (Improper Protection for Outbound Error
Messages and Alert Signals
NOT-FOR-US: ProMIS Process Co. InSCADA
CVE-2023-0838 (An issue has been discovered in GitLab affecting versions
starting fro ...)
- gitlab 15.10.8+ds1-2
-CVE-2023-0837
- RESERVED
+CVE-2023-0837 (An improper authorization check of local device settings in
TeamViewe ...)
+ TODO: check
CVE-2023-25780 (It is identified a vulnerability of insufficient
authentication in an ...)
NOT-FOR-US: Intel
CVE-2023-25776 (Improper input validation in some Intel(R) Server Board BMC
firmware b ...)
@@ -22855,10 +22988,10 @@ CVE-2023-24940 (Windows Pragmatic General Multicast
(PGM) Denial of Service Vuln
NOT-FOR-US: Microsoft
CVE-2023-24939 (Server for NFS Denial of Service Vulnerability)
NOT-FOR-US: Microsoft
-CVE-2023-24938
- RESERVED
-CVE-2023-24937
- RESERVED
+CVE-2023-24938 (Windows CryptoAPI Denial of Service Vulnerability)
+ TODO: check
+CVE-2023-24937 (Windows CryptoAPI Denial of Service Vulnerability)
+ TODO: check
CVE-2023-24936
RESERVED
CVE-2023-24935 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
@@ -24014,8 +24147,8 @@ CVE-2023-24548
RESERVED
CVE-2023-24547
RESERVED
-CVE-2023-24546
- RESERVED
+CVE-2023-24546 (On affected versions of the CloudVision Portal improper access
control ...)
+ TODO: check
CVE-2023-24545 (On affected platforms running Arista CloudEOS an issue in the
Software ...)
NOT-FOR-US: Arista
CVE-2023-0517
@@ -24443,10 +24576,10 @@ CVE-2022-4896
RESERVED
CVE-2020-36656 (The Spectra WordPress plugin before 1.15.0 does not sanitize
user inpu ...)
NOT-FOR-US: WordPress plugin
-CVE-2023-24470
- RESERVED
-CVE-2023-24469
- RESERVED
+CVE-2023-24470 (Potential XML External Entity Injection in ArcSight Logger
versions pr ...)
+ TODO: check
+CVE-2023-24469 (Potential Cross-Site Scripting in ArcSight Logger versions
prior to 7. ...)
+ TODO: check
CVE-2023-24468 (Broken access control in Advanced Authentication versions
prior to 6.4 ...)
NOT-FOR-US: NetIQ
CVE-2023-24467
@@ -30290,7 +30423,7 @@ CVE-2023-22612 (An issue was discovered in IhisiSmm in
Insyde InsydeH2O with ker
NOT-FOR-US: Insyde
CVE-2023-22611 (A CWE-200: Exposure of Sensitive Information to an
Unauthorized Actor ...)
NOT-FOR-US: EcoStruxure Geo SCADA Expert
-CVE-2023-22610 (A CWE-285: Improper Authorization vulnerability exists that
could caus ...)
+CVE-2023-22610 (A CWE-863: Incorrect Authorization vulnerability exists that
could cau ...)
NOT-FOR-US: EcoStruxure Geo SCADA Expert
CVE-2023-22609
REJECTED
@@ -35745,8 +35878,8 @@ CVE-2022-47186
RESERVED
CVE-2022-47185
RESERVED
-CVE-2022-47184
- RESERVED
+CVE-2022-47184 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
CVE-2022-47183 (Cross-Site Request Forgery (CSRF) vulnerability in StylistWP
Extra Blo ...)
NOT-FOR-US: WordPress plugin
CVE-2022-47182
@@ -38190,16 +38323,16 @@ CVE-2023-21571 (Microsoft Dynamics 365 (on-premises)
Cross-site Scripting Vulner
NOT-FOR-US: Microsoft
CVE-2023-21570 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting
Vulnerabilit ...)
NOT-FOR-US: Microsoft
-CVE-2023-21569
- RESERVED
+CVE-2023-21569 (Azure DevOps Server Spoofing Vulnerability)
+ TODO: check
CVE-2023-21568 (Microsoft SQL Server Integration Service (VS extension) Remote
Code Ex ...)
NOT-FOR-US: Microsoft
CVE-2023-21567 (Visual Studio Denial of Service Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-21566 (Visual Studio Elevation of Privilege Vulnerability)
NOT-FOR-US: Microsoft
-CVE-2023-21565
- RESERVED
+CVE-2023-21565 (Azure DevOps Server Spoofing Vulnerability)
+ TODO: check
CVE-2023-21564 (Azure DevOps Server Cross-Site Scripting Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-21563 (BitLocker Security Feature Bypass Vulnerability)
@@ -55951,7 +56084,7 @@ CVE-2022-41121 (Windows Graphics Component Elevation of
Privilege Vulnerability.
NOT-FOR-US: Microsoft
CVE-2022-41120 (Microsoft Windows System Monitor (Sysmon) Elevation of
Privilege Vulne ...)
NOT-FOR-US: Microsoft
-CVE-2022-41119 (Visual Studio Remote Code Execution Vulnerability.)
+CVE-2022-41119 (Visual Studio Remote Code Execution Vulnerability)
NOT-FOR-US: Microsoft
CVE-2022-41118 (Windows Scripting Languages Remote Code Execution
Vulnerability)
NOT-FOR-US: Microsoft
@@ -56019,7 +56152,7 @@ CVE-2022-41087
RESERVED
CVE-2022-41086 (Windows Group Policy Elevation of Privilege Vulnerability)
NOT-FOR-US: Microsoft
-CVE-2022-41085 (Azure CycleCloud Elevation of Privilege Vulnerability.)
+CVE-2022-41085 (Azure CycleCloud Elevation of Privilege Vulnerability)
NOT-FOR-US: Microsoft
CVE-2022-41084
RESERVED
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc1bff55e16a5167e787c5fdc2050b7bd4d924c2
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc1bff55e16a5167e787c5fdc2050b7bd4d924c2
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits