[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jul 21 09:12:16 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c7dbd5c3 by security tracker role at 2023-07-21T08:12:04+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,59 @@
+CVE-2023-3815 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2023-3813 (The Jupiter X Core plugin for WordPress is vulnerable to arbitrary fil ...)
+	TODO: check
+CVE-2023-3811 (A vulnerability was found in Hospital Management System 1.0. It has be ...)
+	TODO: check
+CVE-2023-3810 (A vulnerability was found in Hospital Management System 1.0. It has be ...)
+	TODO: check
+CVE-2023-3809 (A vulnerability was found in Hospital Management System 1.0. It has be ...)
+	TODO: check
+CVE-2023-3808 (A vulnerability was found in Hospital Management System 1.0 and classi ...)
+	TODO: check
+CVE-2023-3807 (A vulnerability has been found in Campcodes Beauty Salon Management Sy ...)
+	TODO: check
+CVE-2023-3806 (A vulnerability, which was classified as critical, was found in Source ...)
+	TODO: check
+CVE-2023-3805 (A vulnerability, which was classified as critical, has been found in X ...)
+	TODO: check
+CVE-2023-3804 (A vulnerability classified as problematic was found in Chengdu Flash F ...)
+	TODO: check
+CVE-2023-3803 (A vulnerability classified as problematic has been found in Chengdu Fl ...)
+	TODO: check
+CVE-2023-3802 (A vulnerability was found in Chengdu Flash Flood Disaster Monitoring a ...)
+	TODO: check
+CVE-2023-3801 (A vulnerability was found in IBOS OA 4.5.5. It has been declared as cr ...)
+	TODO: check
+CVE-2023-3800 (A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classifie ...)
+	TODO: check
+CVE-2023-3799 (A vulnerability was found in IBOS OA 4.5.5 and classified as critical. ...)
+	TODO: check
+CVE-2023-3798 (A vulnerability has been found in Chengdu Flash Flood Disaster Monitor ...)
+	TODO: check
+CVE-2023-3797 (A vulnerability, which was classified as critical, was found in Gen Te ...)
+	TODO: check
+CVE-2023-3796 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2023-3795 (A vulnerability classified as critical was found in Bug Finder ChainCi ...)
+	TODO: check
+CVE-2023-38632 (async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in t ...)
+	TODO: check
+CVE-2023-37645 (eyoucms v1.6.3 was discovered to contain an information disclosure vul ...)
+	TODO: check
+CVE-2023-37292 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2023-37291 (Galaxy Software Services Vitals ESP is vulnerable to using a hard-code ...)
+	TODO: check
+CVE-2023-35087 (It is identified a format string vulnerability in ASUS RT-AX56U V2 & R ...)
+	TODO: check
+CVE-2023-35086 (It is identified a format string vulnerability in ASUS RT-AX56U V2 & R ...)
+	TODO: check
+CVE-2023-32625 (Cross-site request forgery (CSRF) vulnerability in TS Webfonts for SAK ...)
+	TODO: check
+CVE-2023-32624 (Cross-site scripting vulnerability in TS Webfonts for SAKURA 3.1.0 and ...)
+	TODO: check
+CVE-2023-32478 (Dell PowerStore versions prior to 3.5.0.1 contain an insertion of sens ...)
+	TODO: check
 CVE-2023-3812 [net: tun: fix bugs for oversize packet when napi frags enabled]
 	- linux 6.0.8-1
 	[bullseye] - linux 5.10.158-1
@@ -16204,9 +16260,9 @@ CVE-2023-28767 (The configuration parser fails to sanitize user-controlled input
 CVE-2023-28766 (A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All v ...)
 	NOT-FOR-US: Siemens
 CVE-2023-25180
-	RESERVED
+	REJECTED
 CVE-2023-24593
-	RESERVED
+	REJECTED
 CVE-2023-1613 (A vulnerability has been found in Rebuild up to 3.2.3 and classified a ...)
 	NOT-FOR-US: Rebuild
 CVE-2023-1612 (A vulnerability, which was classified as critical, was found in Rebuil ...)
@@ -16413,12 +16469,12 @@ CVE-2023-1555
 	RESERVED
 CVE-2013-10022 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2023-28730
-	RESERVED
-CVE-2023-28729
-	RESERVED
-CVE-2023-28728
-	RESERVED
+CVE-2023-28730 (A memory corruption vulnerability Panasonic Control FPWIN Pro versions ...)
+	TODO: check
+CVE-2023-28729 (A type confusion vulnerability in Panasonic Control FPWIN Pro versions ...)
+	TODO: check
+CVE-2023-28728 (A stack-based buffer overflow in Panasonic Control FPWIN Pro versions  ...)
+	TODO: check
 CVE-2023-28727 (Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attacker ...)
 	NOT-FOR-US: Panasonic AiSEG2
 CVE-2023-28726 (Panasonic AiSEG2 versions 2.80F through 2.93A allows remote attackers  ...)
@@ -25053,12 +25109,12 @@ CVE-2023-25839 (There is SQL injection vulnerability in Esri ArcGIS Insights Des
 	TODO: check
 CVE-2023-25838 (There is SQL injection vulnerabilityin Esri ArcGIS Insights 2022.1 for ...)
 	TODO: check
-CVE-2023-25837
-	RESERVED
-CVE-2023-25836
-	RESERVED
-CVE-2023-25835
-	RESERVED
+CVE-2023-25837 (There is a Cross-site Scripting vulnerabilityin Esri Portal Sites in v ...)
+	TODO: check
+CVE-2023-25836 (There is a Cross-site Scripting vulnerabilityin Esri Portal Sites in v ...)
+	TODO: check
+CVE-2023-25835 (There is a Cross-site Scripting vulnerabilityin Esri Portal Sites in v ...)
+	TODO: check
 CVE-2023-25834 (Changes to user permissions in Portal for ArcGIS 10.9.1 and below are  ...)
 	NOT-FOR-US: Esri
 CVE-2023-25833 (There is an HTML injection vulnerability in Esri Portal for ArcGIS ver ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7dbd5c3c8f6072ba6703b54c90bdae4729cf65b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7dbd5c3c8f6072ba6703b54c90bdae4729cf65b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230721/3f9f2d1f/attachment.htm>


More information about the debian-security-tracker-commits mailing list