[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed May 31 16:54:19 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7d4dc504 by Moritz Muehlenhoff at 2023-05-31T17:53:55+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,25 +1,25 @@
CVE-2023-33962 (JStachio is a type-safe Java Mustache templating engine. Prior to ver ...)
- TODO: check
+ NOT-FOR-US: JStachio
CVE-2023-33961 (Leantime is a lean open source project management system. Starting in ...)
- TODO: check
+ NOT-FOR-US: Leantime
CVE-2023-33741 (Macrovideo v380pro v1.4.97 shares the device id and password when shar ...)
- TODO: check
+ NOT-FOR-US: Macrovideo
CVE-2023-33740 (Incorrect access control in luowice v3.5.18 allows attackers to access ...)
- TODO: check
+ NOT-FOR-US: luowice
CVE-2023-33734 (BlueCMS v1.6 was discovered to contain a SQL injection vulnerability v ...)
- TODO: check
+ NOT-FOR-US: BlueCMS
CVE-2023-33181 (Xibo is a content management system (CMS). Starting in version 3.0.0 a ...)
- TODO: check
+ NOT-FOR-US: Xibo
CVE-2023-33180 (Xibo is a content management system (CMS). An SQL injection vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Xibo
CVE-2023-33179 (Xibo is a content management system (CMS). An SQL injection vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Xibo
CVE-2023-32342 (IBM GSKit could allow a remote attacker to obtain sensitive informatio ...)
NOT-FOR-US: IBM
CVE-2023-2999 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpm ...)
- TODO: check
+ NOT-FOR-US: phpmyfaq
CVE-2023-2998 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpm ...)
- TODO: check
+ NOT-FOR-US: phpmyfaq
CVE-2023-2987 (The Wordapp plugin for WordPress is vulnerable to authorization bypass ...)
NOT-FOR-US: Wordapp plugin for WordPress
CVE-2023-2952 (XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3 ...)
@@ -27,7 +27,7 @@ CVE-2023-2952 (XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0
CVE-2023-2836 (The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross ...)
NOT-FOR-US: CRM Perks Forms plugin for WordPress
CVE-2023-2612 (Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ub ...)
- TODO: check
+ NOT-FOR-US: shiftfs (part of Ubuntu kernels, not not upstream)
CVE-2023-2549 (The Feather Login Page plugin for WordPress is vulnerable to Cross-Sit ...)
NOT-FOR-US: Feather Login Page plugin for WordPress
CVE-2023-2547 (The Feather Login Page plugin for WordPress is vulnerable to unauthori ...)
@@ -41,11 +41,11 @@ CVE-2023-2435 (The Blog-in-Blog plugin for WordPress is vulnerable to Local File
CVE-2023-2434 (The Nested Pages plugin for WordPress is vulnerable to unauthorized lo ...)
NOT-FOR-US: Nested Pages plugin for WordPress
CVE-2015-10107 (A vulnerability was found in Simplr Registration Form Plus+ Plugin up ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2014-125103 (A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on ...)
- TODO: check
+ NOT-FOR-US: Twitter plugin
CVE-2012-10015 (A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on ...)
- TODO: check
+ NOT-FOR-US: Twitter plugin
CVE-2023-33975 (RIOT-OS, an operating system for Internet of Things (IoT) devices, con ...)
NOT-FOR-US: RIOT-OS
CVE-2023-33974 (RIOT-OS, an operating system for Internet of Things (IoT) devices, con ...)
@@ -53,7 +53,7 @@ CVE-2023-33974 (RIOT-OS, an operating system for Internet of Things (IoT) device
CVE-2023-33973 (RIOT-OS, an operating system for Internet of Things (IoT) devices, con ...)
NOT-FOR-US: RIOT-OS
CVE-2023-33656 (A memory leak vulnerability exists in NanoMQ 0.17.2. The vulnerability ...)
- TODO: check
+ NOT-FOR-US: NanoMQ
CVE-2023-33234 (Arbitrary code execution in Apache Airflow CNCF Kubernetes provider ve ...)
NOT-FOR-US: Apache Airflow CNCF Kubernetes provider
CVE-2023-33178 (Xibo is a content management system (CMS). An SQL injection vulnerabil ...)
@@ -65,13 +65,13 @@ CVE-2023-32699 (MeterSphere is an open source continuous testing platform. Versi
CVE-2023-32696 (CKAN is an open-source data management system for powering data hubs a ...)
NOT-FOR-US: CKAN
CVE-2023-32689 (Parse Server is an open source backend that can be deployed to any inf ...)
- TODO: check
+ NOT-FOR-US: Node parse-server
CVE-2023-32684 (Lima launches Linux virtual machines, typically on macOS, for running ...)
- TODO: check
+ NOT-FOR-US: Lima
CVE-2023-32448 (PowerPath for Windows, versions 7.0, 7.1 & 7.2 contains License Key St ...)
- TODO: check
+ NOT-FOR-US: PowerPath
CVE-2023-32218 (Avaya IX Workforce Engagement v15.2.7.1195 - CWE-601: URL Redirection ...)
- TODO: check
+ NOT-FOR-US: Avaya
CVE-2023-2994
REJECTED
CVE-2023-2985 [fs: hfsplus: fix UAF issue in hfsplus_put_super]
@@ -80,17 +80,17 @@ CVE-2023-2985 [fs: hfsplus: fix UAF issue in hfsplus_put_super]
[buster] - linux 4.19.282-1
NOTE: https://git.kernel.org/linus/07db5e247ab5858439b14dd7cc1fe538b9efcf32 (6.3-rc1)
CVE-2023-2984 (Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore pr ...)
- TODO: check
+ NOT-FOR-US: pimcore
CVE-2023-2983 (Privilege Defined With Unsafe Actions in GitHub repository pimcore/pim ...)
- TODO: check
+ NOT-FOR-US: pimcore
CVE-2023-2981 (A vulnerability, which was classified as problematic, has been found i ...)
- TODO: check
+ NOT-FOR-US: Abstrium Pydio Cells
CVE-2023-2980 (A vulnerability classified as critical was found in Abstrium Pydio Cel ...)
- TODO: check
+ NOT-FOR-US: Abstrium Pydio Cells
CVE-2023-2979 (A vulnerability classified as critical has been found in Abstrium Pydi ...)
- TODO: check
+ NOT-FOR-US: Abstrium Pydio Cells
CVE-2023-2978 (A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been r ...)
- TODO: check
+ NOT-FOR-US: Abstrium Pydio Cells
CVE-2023-2977
- opensc <unfixed>
NOTE: https://github.com/OpenSC/OpenSC/issues/2785
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d4dc504df1ff7942a119d480cae619b727aefbf
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d4dc504df1ff7942a119d480cae619b727aefbf
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230531/19fdf5bf/attachment.htm>
More information about the debian-security-tracker-commits
mailing list