[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Aug 9 21:12:31 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
13e211d9 by security tracker role at 2023-08-09T20:12:18+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,121 @@
+CVE-2023-4273 (A flaw was found in the exFAT driver of the Linux kernel. The vulnerab ...)
+ TODO: check
+CVE-2023-40012 (uthenticode is a small cross-platform library for partially verifying ...)
+ TODO: check
+CVE-2023-3953 (A CWE-119: Improper Restriction of Operations within the Bounds of a M ...)
+ TODO: check
+CVE-2023-3518 (HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for ...)
+ TODO: check
+CVE-2023-39969 (uthenticode is a small cross-platform library for partially verifying ...)
+ TODO: check
+CVE-2023-39531 (Sentry is an error tracking and performance monitoring platform. Start ...)
+ TODO: check
+CVE-2023-39008 (A command injection vulnerability in the component /api/cron/settings/ ...)
+ TODO: check
+CVE-2023-39007 (/ui/cron/item/open in the Cron component of OPNsense before 23.7 allow ...)
+ TODO: check
+CVE-2023-39006 (The Crash Reporter (crash_reporter.php) component of OPNsense before 2 ...)
+ TODO: check
+CVE-2023-39005 (Insecure permissions exist for configd.socket in OPNsense before 23.7.)
+ TODO: check
+CVE-2023-39004 (Insecure permissions in the configuration directory (/conf/) of OPNsen ...)
+ TODO: check
+CVE-2023-39003 (OPNsense before 23.7 was discovered to contain insecure permissions in ...)
+ TODO: check
+CVE-2023-39002 (A cross-site scripting (XSS) vulnerability in the act parameter of sys ...)
+ TODO: check
+CVE-2023-39001 (A command injection vulnerability in the component diag_backup.php of ...)
+ TODO: check
+CVE-2023-39000 (A reflected cross-site scripting (XSS) vulnerability in the component ...)
+ TODO: check
+CVE-2023-38999 (A Cross-Site Request Forgery (CSRF) in the System Halt API (/system/ha ...)
+ TODO: check
+CVE-2023-38998 (An open redirect in the Login page of OPNsense before 23.7 allows atta ...)
+ TODO: check
+CVE-2023-38997 (A directory traversal vulnerability in the Captive Portal templates of ...)
+ TODO: check
+CVE-2023-38348 (A CSRF issue was discovered in LWsystems Benno MailArchiv 2.10.1.)
+ TODO: check
+CVE-2023-38347 (An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attacker ...)
+ TODO: check
+CVE-2023-38213 (Adobe Dimension version 3.4.9 is affected by an out-of-bounds read vul ...)
+ TODO: check
+CVE-2023-38212 (Adobe Dimension version 3.4.9 is affected by a Heap-based Buffer Overf ...)
+ TODO: check
+CVE-2023-38211 (Adobe Dimension version 3.4.9 is affected by a Use After Free vulnerab ...)
+ TODO: check
+CVE-2023-37068 (Code-Projects Gym Management System V1.0 allows remote attackers to ex ...)
+ TODO: check
+CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 1.3.0 allows remote attackers ...)
+ TODO: check
+CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table accounting error ...)
+ TODO: check
+CVE-2023-33469 (In instances where the screen is visible and remote mouse connection i ...)
+ TODO: check
+CVE-2023-33468 (KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior t ...)
+ TODO: check
+CVE-2023-32782 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
+ TODO: check
+CVE-2023-32781 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
+ TODO: check
+CVE-2023-31452 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 ...)
+ TODO: check
+CVE-2023-31450 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 ...)
+ TODO: check
+CVE-2023-31449 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 ...)
+ TODO: check
+CVE-2023-31448 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 ...)
+ TODO: check
+CVE-2022-48604 (A SQL injection vulnerability exists in the \u201clogging export\u201d ...)
+ TODO: check
+CVE-2022-48603 (A SQL injection vulnerability exists in the \u201cmessage viewer ifram ...)
+ TODO: check
+CVE-2022-48602 (A SQL injection vulnerability exists in the \u201cmessage viewer print ...)
+ TODO: check
+CVE-2022-48601 (A SQL injection vulnerability exists in the \u201cnetwork print report ...)
+ TODO: check
+CVE-2022-48600 (A SQL injection vulnerability exists in the \u201cnotes view\u201d fea ...)
+ TODO: check
+CVE-2022-48599 (A SQL injection vulnerability exists in the \u201creporter events type ...)
+ TODO: check
+CVE-2022-48598 (A SQL injection vulnerability exists in the \u201creporter events type ...)
+ TODO: check
+CVE-2022-48597 (A SQL injection vulnerability exists in the \u201cticket event report\ ...)
+ TODO: check
+CVE-2022-48596 (A SQL injection vulnerability exists in the \u201cticket queue watcher ...)
+ TODO: check
+CVE-2022-48595 (A SQL injection vulnerability exists in the \u201cticket template watc ...)
+ TODO: check
+CVE-2022-48594 (A SQL injection vulnerability exists in the \u201cticket watchers emai ...)
+ TODO: check
+CVE-2022-48593 (A SQL injection vulnerability exists in the \u201ctopology data servic ...)
+ TODO: check
+CVE-2022-48592 (A SQL injection vulnerability exists in the vendor_country parameter o ...)
+ TODO: check
+CVE-2022-48591 (A SQL injection vulnerability exists in the vendor_state parameter of ...)
+ TODO: check
+CVE-2022-48590 (A SQL injection vulnerability exists in the \u201cadmin dynamic app mi ...)
+ TODO: check
+CVE-2022-48589 (A SQL injection vulnerability exists in the \u201creporting job editor ...)
+ TODO: check
+CVE-2022-48588 (A SQL injection vulnerability exists in the \u201cschedule editor deco ...)
+ TODO: check
+CVE-2022-48587 (A SQL injection vulnerability exists in the \u201cschedule editor\u201 ...)
+ TODO: check
+CVE-2022-48586 (A SQL injection vulnerability exists in the \u201cjson walker\u201d fe ...)
+ TODO: check
+CVE-2022-48585 (A SQL injection vulnerability exists in the \u201cadmin brand portal\u ...)
+ TODO: check
+CVE-2022-48584 (A command injection vulnerability exists in the download and convert r ...)
+ TODO: check
+CVE-2022-48583 (A command injection vulnerability exists in the dashboard scheduler fe ...)
+ TODO: check
+CVE-2022-48582 (A command injection vulnerability exists in the ticket report generate ...)
+ TODO: check
+CVE-2022-48581 (A command injection vulnerability exists in the \u201cdash export\u201 ...)
+ TODO: check
+CVE-2022-48580 (A command injection vulnerability exists in the ARP ping device tool f ...)
+ TODO: check
CVE-2023-4243 (The FULL - Customer plugin for WordPress is vulnerable to Arbitrary Fi ...)
NOT-FOR-US: WordPress plugin
CVE-2023-4242 (The FULL - Customer plugin for WordPress is vulnerable to Information ...)
@@ -1285,7 +1403,7 @@ CVE-2023-4057 (Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-31/#CVE-2023-4057
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4057
CVE-2023-4056 (Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1295,7 +1413,7 @@ CVE-2023-4056 (Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Fir
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4056
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4056
CVE-2023-4055 (When the number of cookies per domain was exceeded in `document.cookie ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1327,7 +1445,7 @@ CVE-2023-4051 (A website could have obscured the full screen notification by usi
- firefox 116.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-29/#CVE-2023-4051
CVE-2023-4050 (In some cases, an untrusted input stream was copied to a stack buffer ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1337,7 +1455,7 @@ CVE-2023-4050 (In some cases, an untrusted input stream was copied to a stack bu
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4050
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4050
CVE-2023-4049 (Race conditions in reference counting code were found through code ins ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1347,7 +1465,7 @@ CVE-2023-4049 (Race conditions in reference counting code were found through cod
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4049
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4049
CVE-2023-4048 (An out-of-bounds read could have led to an exploitable crash when pars ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1357,7 +1475,7 @@ CVE-2023-4048 (An out-of-bounds read could have led to an exploitable crash when
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4048
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4048
CVE-2023-4047 (A bug in popup notifications delay calculation could have made it poss ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1367,7 +1485,7 @@ CVE-2023-4047 (A bug in popup notifications delay calculation could have made it
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4047
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4047
CVE-2023-4046 (In some circumstances, a stale value could have been used for a global ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -1377,7 +1495,7 @@ CVE-2023-4046 (In some circumstances, a stale value could have been used for a g
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-32/#CVE-2023-4046
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-33/#CVE-2023-4046
CVE-2023-4045 (Offscreen Canvas did not properly track cross-origin tainting, which c ...)
- {DSA-5469-1 DSA-5464-1 DLA-3521-1}
+ {DSA-5469-1 DSA-5464-1 DLA-3523-1 DLA-3521-1}
- firefox 116.0-1
- firefox-esr 115.1.0esr-1
- thunderbird 1:115.1.0-1
@@ -32059,16 +32177,16 @@ CVE-2023-24482 (A vulnerability has been identified in COMOS V10.2 (All versions
NOT-FOR-US: Siemens
CVE-2023-24477 (In certain conditions, depending on timing and the usage of the Chrome ...)
TODO: check
-CVE-2023-24471
- RESERVED
-CVE-2023-24015
- RESERVED
-CVE-2023-23903
- RESERVED
-CVE-2023-23574
- RESERVED
-CVE-2023-22843
- RESERVED
+CVE-2023-24471 (An access control vulnerability was found, due to the restrictions tha ...)
+ TODO: check
+CVE-2023-24015 (A partial DoS vulnerability has been detected in the Reports section, ...)
+ TODO: check
+CVE-2023-23903 (An authenticated administrator can upload a SAML configuration file wi ...)
+ TODO: check
+CVE-2023-23574 (A blind SQL Injection vulnerability in Nozomi Networks Guardian and CM ...)
+ TODO: check
+CVE-2023-22843 (An authenticated attacker with administrative access to the appliance ...)
+ TODO: check
CVE-2023-22378 (A blind SQL Injection vulnerability in Nozomi Networks Guardian and CM ...)
TODO: check
CVE-2023-0479
@@ -35404,10 +35522,10 @@ CVE-2022-48254 (There is a data processing error vulnerability in Leia-B29 2.0.0
NOT-FOR-US: Huawei
CVE-2023-23348 (HCL Launch could disclose sensitive information if a manual edit of a ...)
NOT-FOR-US: HCL
-CVE-2023-23347
- RESERVED
-CVE-2023-23346
- RESERVED
+CVE-2023-23347 (HCL DRYiCE iAutomate is affected by the use of a broken cryptographic ...)
+ TODO: check
+CVE-2023-23346 (HCL DRYiCE MyCloud is affected by the use of a broken cryptographic al ...)
+ TODO: check
CVE-2023-23345
RESERVED
CVE-2023-23344 (A permission issue in BigFix WebUI Insights site version 14 allows an ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13e211d9d55c5046ef6ad87240f79baf3decab4c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13e211d9d55c5046ef6ad87240f79baf3decab4c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230809/89abeae1/attachment.htm>
More information about the debian-security-tracker-commits
mailing list