[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Jun 3 21:12:20 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
dab9027b by security tracker role at 2023-06-03T20:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,11 @@
+CVE-2023-3086 (Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassn ...)
+	TODO: check
+CVE-2023-3085 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2023-3084 (Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassn ...)
+	TODO: check
+CVE-2023-32582 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kyle ...)
+	TODO: check
 CVE-2023-3083 (Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassn ...)
 	- teampass <itp> (bug #730180)
 CVE-2023-3055 (The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross- ...)
@@ -417,6 +425,7 @@ CVE-2023-2998 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten
 CVE-2023-2987 (The Wordapp plugin for WordPress is vulnerable to authorization bypass ...)
 	NOT-FOR-US: Wordapp plugin for WordPress
 CVE-2023-2952 (XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3 ...)
+	{DLA-3443-1}
 	[experimental] - wireshark 4.0.6-1~exp1
 	- wireshark <unfixed>
 	[bookworm] - wireshark <no-dsa> (Minor issue)
@@ -657,42 +666,55 @@ CVE-2023-2943 (Code Injection in GitHub repository openemr/openemr prior to 7.0.
 CVE-2023-2942 (Improper Input Validation in GitHub repository openemr/openemr prior t ...)
 	NOT-FOR-US: OpenEMR
 CVE-2023-2941 (Inappropriate implementation in Extensions API in Google Chrome prior  ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2940 (Inappropriate implementation in Downloads in Google Chrome prior to 11 ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2939 (Insufficient data validation in Installer in Google Chrome on Windows  ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2938 (Inappropriate implementation in Picture In Picture in Google Chrome pr ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2937 (Inappropriate implementation in Picture In Picture in Google Chrome pr ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2936 (Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2935 (Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2934 (Out of bounds memory access in Mojo in Google Chrome prior to 114.0.57 ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2933 (Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed  ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2932 (Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed  ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2931 (Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed  ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2930 (Use after free in Extensions in Google Chrome prior to 114.0.5735.90 a ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2929 (Out of bounds write in Swiftshader in Google Chrome prior to 114.0.573 ...)
+	{DSA-5418-1}
 	- chromium 114.0.5735.90-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2023-2928 (A vulnerability was found in DedeCMS up to 5.7.106. It has been declar ...)
@@ -797,6 +819,7 @@ CVE-2023-2854 (BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.
 	NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19084
 	NOTE: Introduced by: https://gitlab.com/wireshark/wireshark/-/commit/19ed05756313a0181fd3188eae0557f688bfddaf (v3.7.0)
 CVE-2023-2856 (VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 ...)
+	{DLA-3443-1}
 	[experimental] - wireshark 4.0.6-1~exp1
 	- wireshark <unfixed>
 	[bookworm] - wireshark <no-dsa> (Minor issue)
@@ -804,6 +827,7 @@ CVE-2023-2856 (VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and
 	NOTE: https://www.wireshark.org/security/wnpa-sec-2023-16.html
 	NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19083
 CVE-2023-2858 (NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3 ...)
+	{DLA-3443-1}
 	[experimental] - wireshark 4.0.6-1~exp1
 	- wireshark <unfixed>
 	[bookworm] - wireshark <no-dsa> (Minor issue)
@@ -811,6 +835,7 @@ CVE-2023-2858 (NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0
 	NOTE: https://www.wireshark.org/security/wnpa-sec-2023-15.html
 	NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19081
 CVE-2023-2879 (GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 al ...)
+	{DLA-3443-1}
 	[experimental] - wireshark 4.0.6-1~exp1
 	- wireshark <unfixed>
 	[bookworm] - wireshark <no-dsa> (Minor issue)
@@ -149414,6 +149439,7 @@ CVE-2021-32864
 CVE-2021-32863
 	REJECTED
 CVE-2021-32862 (The GitHub Security Lab discovered sixteen ways to exploit a cross-sit ...)
+	{DLA-3442-1}
 	- nbconvert 6.5.1-1
 	NOTE: https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
 	NOTE: https://github.com/jupyter/nbconvert/commit/d09000bbf076410ce4bd4d9a406f9bbe849cd5c6 (6.5.1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dab9027baec79b4eba06085ad772ce5cf4b89b32

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dab9027baec79b4eba06085ad772ce5cf4b89b32
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230603/30ac6291/attachment.htm>


More information about the debian-security-tracker-commits mailing list