[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Aug 24 21:12:18 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f512bb00 by security tracker role at 2023-08-24T20:12:07+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,75 @@
+CVE-2023-4420 (A remote unprivileged attacker can intercept the communication via e.g ...)
+	TODO: check
+CVE-2023-4419 (The LMS5xx uses hard-coded credentials, which potentially allow low-sk ...)
+	TODO: check
+CVE-2023-4418 (A remote unprivileged attacker can sent multiple packages to the LMS5x ...)
+	TODO: check
+CVE-2023-40904 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain  ...)
+	TODO: check
+CVE-2023-40902 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain  ...)
+	TODO: check
+CVE-2023-40901 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain  ...)
+	TODO: check
+CVE-2023-40900 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40899 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40898 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40897 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40896 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40895 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40894 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40893 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40892 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40891 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a  ...)
+	TODO: check
+CVE-2023-40877 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...)
+	TODO: check
+CVE-2023-40876 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...)
+	TODO: check
+CVE-2023-40875 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...)
+	TODO: check
+CVE-2023-40874 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...)
+	TODO: check
+CVE-2023-40710 (An adversary could cause a continuous restart loop to the entire devic ...)
+	TODO: check
+CVE-2023-40709 (An adversary could crash the entire device by sending a large quantity ...)
+	TODO: check
+CVE-2023-40708 (The File Transfer Protocol (FTP) port is open by default in the SNAP P ...)
+	TODO: check
+CVE-2023-40707 (There are no requirements for setting a complex password in the built- ...)
+	TODO: check
+CVE-2023-40706 (There is no limit on the number of login attempts in the web server fo ...)
+	TODO: check
+CVE-2023-40371 (IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non- ...)
+	TODO: check
+CVE-2023-39834 (PbootCMS below v3.2.0 was discovered to contain a command injection vu ...)
+	TODO: check
+CVE-2023-39801 (A lack of exception handling in the Renault Easy Link Multimedia Syste ...)
+	TODO: check
+CVE-2023-34973 (An insufficient entropy vulnerability has been reported to affect QNAP ...)
+	TODO: check
+CVE-2023-34972 (A cleartext transmission of sensitive information vulnerability has be ...)
+	TODO: check
+CVE-2023-34971 (An inadequate encryption strength vulnerability has been reported to a ...)
+	TODO: check
+CVE-2023-34040 (In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and e ...)
+	TODO: check
+CVE-2023-32516 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFo ...)
+	TODO: check
+CVE-2023-32511 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking  ...)
+	TODO: check
+CVE-2023-32510 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...)
+	TODO: check
+CVE-2023-31412 (The LMS5xx uses weak hash generation methods, resulting in the creatio ...)
+	TODO: check
 CVE-2023-XXXX [tryton-server lack of record validation]
 	- tryton-server 6.0.34-1
 	[bookworm] - tryton-server 6.0.29-2+deb12u1
@@ -3987,11 +4059,13 @@ CVE-2023-32232 (An issue was discovered in Vasion PrinterLogic Client for Window
 CVE-2023-32231 (An issue was discovered in Vasion PrinterLogic Client for Windows befo ...)
 	NOT-FOR-US: Vasion
 CVE-2023-38289 [libtiff: potential integer overflow in raw2tiff.c]
+	REJECTED
 	{DLA-3513-1}
 	- tiff 4.5.1+git230720-1
 	NOTE: https://gitlab.com/libtiff/libtiff/-/issues/592
 	NOTE: https://gitlab.com/libtiff/libtiff/-/commit/6e2dac5f904496d127c92ddc4e56eccfca25c2ee
 CVE-2023-38288 [libtiff: integer overflow in tiffcp.c]
+	REJECTED
 	{DLA-3513-1}
 	- tiff 4.5.1+git230720-1
 	NOTE: https://gitlab.com/libtiff/libtiff/-/commit/4fc16f649fa2875d5c388cf2edc295510a247ee5
@@ -46277,8 +46351,8 @@ CVE-2022-46886 (There exists an open redirect within the response list update fu
 CVE-2022-46885 (Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzin ...)
 	- firefox 106.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2022-44/#CVE-2022-46885
-CVE-2022-46884
-	RESERVED
+CVE-2022-46884 (A potential use-after-free vulnerability existed in SVG Images if the  ...)
+	TODO: check
 CVE-2022-46883 (Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight a ...)
 	- firefox 107.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2022-47/#CVE-2022-46883
@@ -73658,6 +73732,7 @@ CVE-2022-38225
 CVE-2022-38224
 	RESERVED
 CVE-2022-38223 (There is an out-of-bounds write in checkType located in etc.c in w3m 0 ...)
+	{DLA-3541-1}
 	- w3m 0.5.3+git20230121-1 (bug #1019599)
 	[bullseye] - w3m 0.5.3+git20210102-6+deb11u1
 	NOTE: https://github.com/tats/w3m/issues/242



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f512bb00e1f936d769d7a563f2b9fba6df488ad7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f512bb00e1f936d769d7a563f2b9fba6df488ad7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230824/dd93ddde/attachment.htm>


More information about the debian-security-tracker-commits mailing list