Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e1f32d65 by security tracker role at 2023-10-25T20:12:12+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,28 +1,278 @@
-CVE-2023-46660
+CVE-2023-5717 (A heap out-of-bounds write vulnerability in the Linux kernel's 
Linux K ...)
+       TODO: check
+CVE-2023-5671 (HP Print and Scan Doctor for Windows may potentially be 
vulnerable to  ...)
+       TODO: check
+CVE-2023-46564 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46563 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46562 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46560 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46559 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46558 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46557 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46556 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46555 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46554 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46553 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46552 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46551 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46550 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46549 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46548 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46547 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46546 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46545 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46544 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46543 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46542 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46541 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46540 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to 
contain ...)
+       TODO: check
+CVE-2023-46539 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46538 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46537 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46536 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46535 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46534 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46527 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46526 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46525 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46523 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46522 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46521 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46520 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was 
discover ...)
+       TODO: check
+CVE-2023-46518 (Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a 
command ex ...)
+       TODO: check
+CVE-2023-46424 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46423 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46422 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46421 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46420 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46419 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46418 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46417 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46416 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46415 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46414 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a rem ...)
+       TODO: check
+CVE-2023-46413 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46412 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46411 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46410 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46409 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46408 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to 
contain a com ...)
+       TODO: check
+CVE-2023-46396 (Audimex 15.0.0 is vulnerable to Cross Site Scripting (XSS) in 
/audimex ...)
+       TODO: check
+CVE-2023-46102 (The Android Client application, when enrolled to the AppHub 
server, co ...)
+       TODO: check
+CVE-2023-45851 (The Android Client application, when enrolled to the AppHub 
server,con ...)
+       TODO: check
+CVE-2023-45844 (The vulnerability allows a low privileged user that have 
access to the ...)
+       TODO: check
+CVE-2023-45321 (The Android Client application, when enrolled with the define  
method  ...)
+       TODO: check
+CVE-2023-45220 (The Android Client application, when enrolled with the define 
method 1 ...)
+       TODO: check
+CVE-2023-45136 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-45135 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-45134 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-43488 (The vulnerability allows a low privileged (untrusted) 
application to m ...)
+       TODO: check
+CVE-2023-42861 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2023-42857 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-42856 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-42854 (This issue was addressed by removing the vulnerable code. This 
issue i ...)
+       TODO: check
+CVE-2023-42852 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42850 (The issue was addressed with improved permissions logic. This 
issue is ...)
+       TODO: check
+CVE-2023-42849 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-42847 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42846 (This issue was addressed by removing the vulnerable code. This 
issue i ...)
+       TODO: check
+CVE-2023-42845 (An authentication issue was addressed with improved state 
management.  ...)
+       TODO: check
+CVE-2023-42844 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2023-42842 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42841 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-42494 (EisBaer Scada - CWE-749: Exposed Dangerous Method or Function)
+       TODO: check
+CVE-2023-42493 (EisBaer Scada - CWE-256: Plaintext Storage of a Password)
+       TODO: check
+CVE-2023-42492 (EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key)
+       TODO: check
+CVE-2023-42491 (EisBaer Scada - CWE-285: Improper Authorization)
+       TODO: check
+CVE-2023-42490 (EisBaer Scada - CWE-200: Exposure of Sensitive Information to 
an Unaut ...)
+       TODO: check
+CVE-2023-42489 (EisBaer Scada - CWE-732: Incorrect Permission Assignment for 
Critical  ...)
+       TODO: check
+CVE-2023-42488 (EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a 
Restric ...)
+       TODO: check
+CVE-2023-42438 (An inconsistent user interface issue was addressed with 
improved state ...)
+       TODO: check
+CVE-2023-41997 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2023-41989 (The issue was addressed by restricting options offered on a 
locked dev ...)
+       TODO: check
+CVE-2023-41988 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2023-41983 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-41982 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2023-41977 (The issue was addressed with improved handling of caches. This 
issue i ...)
+       TODO: check
+CVE-2023-41976 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2023-41975 (This issue was addressed by removing the vulnerable code. This 
issue i ...)
+       TODO: check
+CVE-2023-41960 (The vulnerability allows an unprivileged(untrusted) 
third-party applic ...)
+       TODO: check
+CVE-2023-41372 (The vulnerability allows an unprivileged (untrusted) third- 
party appl ...)
+       TODO: check
+CVE-2023-41255 (The vulnerability allows an unprivileged user with access to 
the subne ...)
+       TODO: check
+CVE-2023-41254 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-41077 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-41072 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-40449 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-40447 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-40445 (The issue was addressed with improved UI handling. This issue 
is fixed ...)
+       TODO: check
+CVE-2023-40444 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-40425 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-40423 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-40421 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-40416 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2023-40413 (The issue was addressed with improved handling of caches. This 
issue i ...)
+       TODO: check
+CVE-2023-40408 (An inconsistent user interface issue was addressed with 
improved state ...)
+       TODO: check
+CVE-2023-40405 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-40404 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2023-40401 (The issue was addressed with additional permissions checks. 
This issue ...)
+       TODO: check
+CVE-2023-3010 (Grafana is an open-source platform for monitoring and 
observability.   ...)
+       TODO: check
+CVE-2023-37913 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-37912 (XWiki Rendering is a generic Rendering system that converts 
textual in ...)
+       TODO: check
+CVE-2023-37911 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-37910 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-37909 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2023-37908 (XWiki Rendering is a generic Rendering system that converts 
textual in ...)
+       TODO: check
+CVE-2023-34447 (iTop is an open source, web-based IT service management 
platform. Prio ...)
+       TODO: check
+CVE-2023-34446 (iTop is an open source, web-based IT service management 
platform. Prio ...)
+       TODO: check
+CVE-2023-32359 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2023-46660 (Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time 
compari ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46659
+CVE-2023-46659 (Jenkins Edgewall Trac Plugin 1.13 and earlier does not escape 
the Trac ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46658
+CVE-2023-46658 (Jenkins MSTeams Webhook Trigger Plugin 0.1.1 and earlier uses 
a non-co ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46657
+CVE-2023-46657 (Jenkins Gogs Plugin 1.0.15 and earlier uses a non-constant 
time compar ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46656
+CVE-2023-46656 (Jenkins Multibranch Scan Webhook Trigger Plugin 1.0.9 and 
earlier uses ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46655
+CVE-2023-46655 (Jenkins CloudBees CD Plugin 1.1.32 and earlier follows 
symbolic links  ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46654
+CVE-2023-46654 (Jenkins CloudBees CD Plugin 1.1.32 and earlier follows 
symbolic links  ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46653
+CVE-2023-46653 (Jenkins lambdatest-automation Plugin 1.20.10 and earlier logs 
LAMBDATE ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46652
+CVE-2023-46652 (A missing permission check in Jenkins lambdatest-automation 
Plugin 1.2 ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46651
+CVE-2023-46651 (Jenkins Warnings Plugin 10.5.0 and earlier does not set the 
appropriat ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-46650
+CVE-2023-46650 (Jenkins GitHub Plugin 1.37.3 and earlier does not escape the 
GitHub pr ...)
        NOT-FOR-US: Jenkins plugin
-CVE-2023-5043
+CVE-2023-5043 (Ingress nginx annotation injection causes arbitrary command 
execution.)
        NOT-FOR-US: Kubernetes ingress-nginx
-CVE-2023-5044
+CVE-2023-5044 (Code injection via 
nginx.ingress.kubernetes.io/permanent-redirect anno ...)
        NOT-FOR-US: Kubernetes ingress-nginx
 CVE-2023-5758 (When opening a page in reader mode, the redirect URL could have 
caused ...)
        - firefox <not-affected> (Only affects Firefox on iOS)
@@ -129,23 +379,25 @@ CVE-2023-31581 (Dromara Sureness before v1.0.8 was 
discovered to use a hardcoded
        NOT-FOR-US: Dromara Sureness
 CVE-2023-31580 (light-oauth2 before version 2.1.27 obtains the public key 
without any  ...)
        TODO: check
-CVE-2023-5574 [Use-after-free bug in DamageDestroy]
+CVE-2023-5574 (A use-after-free flaw was found in xorg-x11-server-Xvfb. This 
issue oc ...)
        - xorg-server <unfixed>
        [bookworm] - xorg-server <no-dsa> (Minor issue)
        [bullseye] - xorg-server <no-dsa> (Minor issue)
        NOTE: 
https://lists.x.org/archives/xorg-announce/2023-October/003430.html
        NOTE: https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/1189
-CVE-2023-5380 [Use-after-free bug in DestroyWindow]
+CVE-2023-5380 (A use-after-free flaw was found in the xorg-x11-server. An X 
server cr ...)
+       {DSA-5534-1 DLA-3631-1}
        - xorg-server 2:21.1.9-1
        NOTE: 
https://lists.x.org/archives/xorg-announce/2023-October/003430.html
        NOTE: Fixed by: 
https://gitlab.freedesktop.org/xorg/xserver/-/commit/564ccf2ce9616620456102727acb8b0256b7bbd7
-CVE-2023-5367 [X.Org server: OOB write in 
XIChangeDeviceProperty/RRChangeOutputProperty]
+CVE-2023-5367 (A out-of-bounds write flaw was found in the xorg-x11-server. 
This issu ...)
+       {DSA-5534-1 DLA-3631-1}
        - xorg-server 2:21.1.9-1
        - xwayland 2:23.2.2-1
        [bookworm] - xwayland <no-dsa> (Minor issue; Xwayland shouldn't be 
running as root)
        NOTE: 
https://lists.x.org/archives/xorg-announce/2023-October/003430.html
        NOTE: Fixed by: 
https://gitlab.freedesktop.org/xorg/xserver/-/commit/541ab2ecd41d4d8689e71855d93e492bc554719a
-CVE-2023-5472
+CVE-2023-5472 (Use after free in Profiles in Google Chrome prior to 
118.0.5993.117 al ...)
        - chromium 118.0.5993.117-1
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-5753 (Potential buffer overflows in the Bluetooth subsystem due to 
asserts b ...)
@@ -275,6 +527,7 @@ CVE-2023-39619 (ReDos in NPMJS Node Email Check v.1.0.4 
allows an attacker to ca
 CVE-2023-39231 (PingFederate using the PingOne MFA adapter allows a new MFA 
device to  ...)
        NOT-FOR-US: PingFederate
 CVE-2023-5732 (An attacker could have created a malicious link using 
bidirectional ch ...)
+       {DSA-5535-1}
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-46/#CVE-2023-5732
@@ -283,6 +536,7 @@ CVE-2023-5731 (Memory safety bugs present in Firefox 118. 
Some of these bugs sho
        - firefox 119.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-45/#CVE-2023-5731
 CVE-2023-5730 (Memory safety bugs present in Firefox 118, Firefox ESR 115.3, 
and Thun ...)
+       {DSA-5535-1}
        - firefox 119.0-1
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
@@ -293,6 +547,7 @@ CVE-2023-5729 (A malicious web site can enter fullscreen 
mode while simultaneous
        - firefox 119.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-45/#CVE-2023-5729
 CVE-2023-5728 (During garbage collection extra operations were performed on a 
object  ...)
+       {DSA-5535-1}
        - firefox 119.0-1
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
@@ -314,6 +569,7 @@ CVE-2023-5726 (A website could have obscured the full 
screen notification by usi
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-46/#CVE-2023-5726
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-47/#CVE-2023-5726
 CVE-2023-5725 (A malicious installed WebExtension could open arbitrary URLs, 
which un ...)
+       {DSA-5535-1}
        - firefox 119.0-1
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
@@ -321,6 +577,7 @@ CVE-2023-5725 (A malicious installed WebExtension could 
open arbitrary URLs, whi
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-46/#CVE-2023-5725
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-47/#CVE-2023-5725
 CVE-2023-5724 (Drivers are not always robust to extremely large draw calls and 
in som ...)
+       {DSA-5535-1}
        - firefox 119.0-1
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
@@ -334,6 +591,7 @@ CVE-2023-5722 (Using iterative requests an attacker was 
able to learn the size o
        - firefox 119.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-45/#CVE-2023-5722
 CVE-2023-5721 (It was possible for certain browser prompts and dialogs to be 
activate ...)
+       {DSA-5535-1}
        - firefox 119.0-1
        - firefox-esr 115.4.0esr-1
        - thunderbird <unfixed>
@@ -3901,12 +4159,12 @@ CVE-2023-2681 (An SQL Injection vulnerability has been 
found on Jorani version 1
        NOT-FOR-US: Jorani
 CVE-2023-2544 (Authorization bypass vulnerability in UPV PEIX, affecting the 
componen ...)
        NOT-FOR-US: UPV PEIX
-CVE-2023-4693 [Crafted file system images can cause out-of-bounds write and 
may leak sensitive information into the GRUB pager]
+CVE-2023-4693 (An out-of-bounds read flaw was found on grub2's NTFS filesystem 
driver ...)
        {DSA-5519-1 DLA-3605-1}
        - grub2 2.12~rc1-11
        NOTE: 
https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
        NOTE: 
https://lore.kernel.org/all/zrxk8s4nqv2jbq%...@tomti.i.net-space.pl/
-CVE-2023-4692 [Crafted file system images can cause heap-based buffer overflow 
and may allow arbitrary code execution and secure boot bypass]
+CVE-2023-4692 (An out-of-bounds write flaw was found in grub2's NTFS 
filesystem drive ...)
        {DSA-5519-1 DLA-3605-1}
        - grub2 2.12~rc1-11
        NOTE: 
https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
@@ -23948,8 +24206,8 @@ CVE-2023-2199 (An issue has been discovered in GitLab 
CE/EE affecting all versio
        - gitlab 15.10.8+ds1-2
 CVE-2023-2198 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
        - gitlab 15.10.8+ds1-2
-CVE-2023-30912
-       RESERVED
+CVE-2023-30912 (A remote code execution issue exists in HPE OneView.)
+       TODO: check
 CVE-2023-30911 (HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using 
iLOrest ...)
        NOT-FOR-US: HPE
 CVE-2023-30910 (HPE MSA Controller prior to versionIN210R004 could be remotely 
exploit ...)
@@ -32916,8 +33174,8 @@ CVE-2023-28144 (KDAB Hotspot 1.3.x and 1.4.x through 
1.4.1, in a non-default con
        NOTE: Introduced by: 
https://github.com/KDAB/hotspot/commit/3b4682565f0e53f903f3ad0f3f2c0f236d382efb 
(v1.3.0)
        NOTE: Opt-In to allow privilege escalation (and disable by default):
        NOTE: 
https://github.com/KDAB/hotspot/commit/65a246ce9196462081483fd07d97678dcfe36b9c
-CVE-2023-1356
-       RESERVED
+CVE-2023-1356 (Reflected cross-site scripting in the StudentSearch component 
in IDAtt ...)
+       TODO: check
 CVE-2023-1355 (NULL Pointer Dereference in GitHub repository vim/vim prior to 
9.0.140 ...)
        - vim 2:9.0.1658-1 (unimportant)
        NOTE: https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9
@@ -35302,12 +35560,12 @@ CVE-2021-4327 (A vulnerability was found in 
SerenityOS. It has been rated as cri
        NOT-FOR-US: SerenityOS
 CVE-2023-27381
        RESERVED
-CVE-2023-27377
-       RESERVED
-CVE-2023-27376
-       RESERVED
-CVE-2023-27375
-       RESERVED
+CVE-2023-27377 (Missing authentication in the 
StudentPopupDetails_EmergencyContactDeta ...)
+       TODO: check
+CVE-2023-27376 (Missing authentication in the 
StudentPopupDetails_StudentDetails       ...)
+       TODO: check
+CVE-2023-27375 (Missing authentication in the 
StudentPopupDetails_ContactDetails       ...)
+       TODO: check
 CVE-2023-27374
        RESERVED
 CVE-2023-27373 (An issue was discovered in Insyde InsydeH2O with kernel 5.0 
through 5. ...)
@@ -35747,24 +36005,24 @@ CVE-2023-XXXX [RUSTSEC-2023-0015]
        NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0015.html
        NOTE: 
https://github.com/tomprogrammer/rust-ascii/commit/dc7e07397ce362487162cb86f92c0bec4645d867
 (v0.9.3)
        NOTE: https://github.com/tomprogrammer/rust-ascii/issues/64
-CVE-2023-27262
-       RESERVED
-CVE-2023-27261
-       RESERVED
-CVE-2023-27260
-       RESERVED
-CVE-2023-27259
-       RESERVED
-CVE-2023-27258
-       RESERVED
-CVE-2023-27257
-       RESERVED
-CVE-2023-27256
-       RESERVED
-CVE-2023-27255
-       RESERVED
-CVE-2023-27254
-       RESERVED
+CVE-2023-27262 (Unauthenticated SQL injection in the GetAssignmentsDue        
method i ...)
+       TODO: check
+CVE-2023-27261 (Missing authentication in the DeleteAssignments         method 
in IDAt ...)
+       TODO: check
+CVE-2023-27260 (Unauthenticated SQL injection in the GetAssignmentsDue        
method i ...)
+       TODO: check
+CVE-2023-27259 (Missing authentication in the GetAssignmentsDue      method in 
IDAtten ...)
+       TODO: check
+CVE-2023-27258 (Missing authentication in the GetStudentGroupStudents     
method in ID ...)
+       TODO: check
+CVE-2023-27257 (Missing authentication in the GetActiveToiletPasses    method 
in IDAtt ...)
+       TODO: check
+CVE-2023-27256 (Missing authentication in the GetLogFiles   method in 
IDAttend\u2019s  ...)
+       TODO: check
+CVE-2023-27255 (Unauthenticated SQL injection in the DeleteRoomChanges       
method in ...)
+       TODO: check
+CVE-2023-27254 (Unauthenticated SQL injection in the GetRoomChanges      
method in IDA ...)
+       TODO: check
 CVE-2023-27253 (A command injection vulnerability in the function 
restore_rrddata() of ...)
        NOT-FOR-US: pfSense
 CVE-2023-27252
@@ -37179,40 +37437,40 @@ CVE-2023-26598
        RESERVED
 CVE-2023-26588 (Use of hard-coded credentials vulnerability in Buffalo network 
devices ...)
        NOT-FOR-US: Buffalo network devices
-CVE-2023-26584
-       RESERVED
-CVE-2023-26583
-       RESERVED
-CVE-2023-26582
-       RESERVED
-CVE-2023-26581
-       RESERVED
-CVE-2023-26580
-       RESERVED
-CVE-2023-26579
-       RESERVED
-CVE-2023-26578
-       RESERVED
-CVE-2023-26577
-       RESERVED
-CVE-2023-26576
-       RESERVED
-CVE-2023-26575
-       RESERVED
-CVE-2023-26574
-       RESERVED
-CVE-2023-26573
-       RESERVED
-CVE-2023-26572
-       RESERVED
-CVE-2023-26571
-       RESERVED
-CVE-2023-26570
-       RESERVED
-CVE-2023-26569
-       RESERVED
-CVE-2023-26568
-       RESERVED
+CVE-2023-26584 (Unauthenticated SQL injection in the GetStudentInconsistencies 
    met ...)
+       TODO: check
+CVE-2023-26583 (Unauthenticated SQL injection in the GetCurrentPeriod    
method in IDA ...)
+       TODO: check
+CVE-2023-26582 (Unauthenticated SQL injection in the GetExcursionDetails   
method in I ...)
+       TODO: check
+CVE-2023-26581 (Unauthenticated SQL injection in the GetVisitors  method in 
IDAttend\u ...)
+       TODO: check
+CVE-2023-26580 (Unauthenticated arbitrary file read in the IDAttend\u2019s 
IDWeb appli ...)
+       TODO: check
+CVE-2023-26579 (Missing authentication in the DeleteStaff method in 
IDAttend\u2019s ID ...)
+       TODO: check
+CVE-2023-26578 (Arbitrary file upload to web root in the IDAttend\u2019s IDWeb 
applica ...)
+       TODO: check
+CVE-2023-26577 (Stored cross-site scripting in the IDAttend\u2019s IDWeb 
application 3 ...)
+       TODO: check
+CVE-2023-26576 (Missing authentication in the SearchStudentsRFID   method in 
IDAttend\ ...)
+       TODO: check
+CVE-2023-26575 (Missing authentication in the SearchStudentsStaff  method in 
IDAttend\ ...)
+       TODO: check
+CVE-2023-26574 (Missing authentication in the SearchStudents method in 
IDAttend\u2019s ...)
+       TODO: check
+CVE-2023-26573 (Missing authentication in the SetDB method in IDAttend\u2019s 
IDWeb ap ...)
+       TODO: check
+CVE-2023-26572 (Unauthenticated SQL injection in the GetExcursionList method 
in IDAtte ...)
+       TODO: check
+CVE-2023-26571 (Missing authentication in the SetStudentNotes  method in 
IDAttend\u201 ...)
+       TODO: check
+CVE-2023-26570 (Missing authentication in the StudentPopupDetails_Timetable 
method in  ...)
+       TODO: check
+CVE-2023-26569 (Unauthenticated SQL injection in the 
StudentPopupDetails_Timetable met ...)
+       TODO: check
+CVE-2023-26568 (Unauthenticated SQL injection in the GetStudentGroupStudents 
method in ...)
+       TODO: check
 CVE-2023-26567 (Sangoma FreePBX 1805 through 2302 (when obtained as a ,.ISO 
file) plac ...)
        NOT-FOR-US: Sangoma
 CVE-2023-26566
@@ -47266,8 +47524,7 @@ CVE-2023-0224
        RESERVED
 CVE-2023-0223 (An issue has been discovered in GitLab affecting all versions 
starting ...)
        - gitlab 15.10.8+ds1-2
-CVE-2022-4886
-       RESERVED
+CVE-2022-4886 (Ingress-nginx `path` sanitization can be bypassed with 
`log_format` di ...)
        NOT-FOR-US: Kubernetes ingress-nginx
 CVE-2022-48255 (There is a system command injection vulnerability in 
BiSheng-WNM FW 3. ...)
        NOT-FOR-US: Huawei
@@ -80638,7 +80895,7 @@ CVE-2022-39180 (College Management System v1.0 - SQL 
Injection (SQLi). By insert
        NOT-FOR-US: College Management System
 CVE-2022-39179 (College Management System v1.0 - Authenticated remote code 
execution.  ...)
        NOT-FOR-US: College Management System
-CVE-2022-39178 (Webvendome - Webvendome Internal Server IP Disclosure. Send 
GET Reques ...)
+CVE-2022-39178 (Webvendome - webvendome Internal Server IP Disclosure. Send 
GET Reques ...)
        NOT-FOR-US: Webvendome
 CVE-2022-39177 (BlueZ before 5.59 allows physically proximate attackers to 
cause a den ...)
        {DLA-3157-1}
@@ -87569,9 +87826,9 @@ CVE-2022-2548
        RESERVED
 CVE-2022-2547 (A crafted HTTP packet without a content-type header can create 
a denia ...)
        NOT-FOR-US: Softing Industrial Automation
-CVE-2022-36787 (Webvendome - Webvendome SQL Injection. SQL Injection in the 
Parameter  ...)
+CVE-2022-36787 (webvendome - webvendome SQL Injection. SQL Injection in the 
Parameter  ...)
        NOT-FOR-US: Webvendome
-CVE-2022-36786 (DLINK - DSL-224 Post-auth PCE. DLINK router has an interface 
where you ...)
+CVE-2022-36786 (DLINK - DSL-224 Post-auth RCE. DLINK router version 3.0.8 has 
an inter ...)
        NOT-FOR-US: DLINK
 CVE-2022-36785 (D-Link \u2013 G integrated Access Device4 Information 
Disclosure & Aut ...)
        NOT-FOR-US: DLINK



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1f32d656eca6bc70dabe119d6523c5e3c8307fa

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1f32d656eca6bc70dabe119d6523c5e3c8307fa
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to