[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 24 08:11:44 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f67c4f0a by security tracker role at 2023-11-24T08:11:29+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,22 @@
-CVE-2023-6118 (: Path Traversal: '/../filedir' vulnerability in Neutron IP Camera all ...)
+CVE-2023-49216 (Usedesk before 1.7.57 allows profile stored XSS.)
+	TODO: check
+CVE-2023-49215 (Usedesk before 1.7.57 allows filter reflected XSS.)
+	TODO: check
+CVE-2023-49214 (Usedesk before 1.7.57 allows chat template injection.)
+	TODO: check
+CVE-2023-49213 (The API endpoints in Ironman PowerShell Universal 3.0.0 through 4.2.0  ...)
+	TODO: check
+CVE-2023-48796 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-47529 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-47244 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-44303 (RVTools, Version 3.9.2 and above, contain a sensitive data exposure vu ...)
+	TODO: check
+CVE-2023-33706 (SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks  ...)
+	TODO: check
+CVE-2023-6118 (Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allow ...)
 	NOT-FOR-US: Neutron IP Camera
 CVE-2023-5972 (A null pointer dereference flaw was found in the nft_inner.c functiona ...)
 	- linux 6.5.10-1
@@ -410,7 +428,7 @@ CVE-2023-6213 (Memory safety bugs present in Firefox 119. Some of these bugs sho
 	- firefox 120.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6213
 CVE-2023-6212 (Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thun ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -424,7 +442,7 @@ CVE-2023-6210 (When an https: web page created a pop-up from a "javascript:" URL
 	- firefox 120.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6210
 CVE-2023-6209 (Relative URLs starting with three slashes were incorrectly parsed, and ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -432,7 +450,7 @@ CVE-2023-6209 (Relative URLs starting with three slashes were incorrectly parsed
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6209
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6209
 CVE-2023-6208 (When using X11, text selected by the page using the Selection API was  ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -440,7 +458,7 @@ CVE-2023-6208 (When using X11, text selected by the page using the Selection API
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6208
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6208
 CVE-2023-6207 (Ownership mismanagement led to a use-after-free in ReadableByteStreams ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -448,7 +466,7 @@ CVE-2023-6207 (Ownership mismanagement led to a use-after-free in ReadableByteSt
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6207
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6207
 CVE-2023-6206 (The black fade animation when exiting fullscreen is roughly the length ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -456,7 +474,7 @@ CVE-2023-6206 (The black fade animation when exiting fullscreen is roughly the l
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6206
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6206
 CVE-2023-6205 (It was possible to cause the use of a MessagePort after it had already ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -464,7 +482,7 @@ CVE-2023-6205 (It was possible to cause the use of a MessagePort after it had al
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6205
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6205
 CVE-2023-6204 (On some systems\u2014depending on the graphics settings and drivers\u2 ...)
-	{DSA-5561-1}
+	{DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -43325,8 +43343,8 @@ CVE-2023-26281 (IBM HTTP Server 8.5 used by IBM WebSphere Application Server cou
 	NOT-FOR-US: IBM
 CVE-2023-26280
 	RESERVED
-CVE-2023-26279
-	RESERVED
+CVE-2023-26279 (IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a local us ...)
+	TODO: check
 CVE-2023-26278 (IBM QRadar WinCollect Agent 10.0 through 10.1.3 could allow a local au ...)
 	NOT-FOR-US: IBM
 CVE-2023-26277 (IBM QRadar WinCollect Agent 10.0 though 10.1.3 could allow a local use ...)
@@ -160695,8 +160713,8 @@ CVE-2021-39010
 	RESERVED
 CVE-2021-39009 (IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 stores user credential ...)
 	NOT-FOR-US: IBM
-CVE-2021-39008
-	RESERVED
+CVE-2021-39008 (IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a privileg ...)
+	TODO: check
 CVE-2021-39007
 	RESERVED
 CVE-2021-39006 (IBM QRadar WinCollect Agent 10.0 and 10.0.1 could allow an attacker to ...)
@@ -233968,6 +233986,7 @@ CVE-2020-22526
 CVE-2020-22525
 	RESERVED
 CVE-2020-22524 (Buffer Overflow vulnerability in FreeImage_Load function in FreeImage  ...)
+	{DLA-3662-1}
 	- freeimage 3.18.0+ds2-10 (bug #1051889)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/319/
 	NOTE: Fixed with r1848 from http://svn.code.sf.net/p/freeimage/svn/FreeImage/
@@ -236519,10 +236538,12 @@ CVE-2020-21430
 CVE-2020-21429
 	RESERVED
 CVE-2020-21428 (Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in  ...)
+	{DLA-3662-1}
 	- freeimage 3.18.0+ds2-10 (bug #1051738)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/299/
 	NOTE: Fixed with r1877 from http://svn.code.sf.net/p/freeimage/svn/FreeImage/
 CVE-2020-21427 (Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginB ...)
+	{DLA-3662-1}
 	- freeimage 3.18.0+ds2-10 (bug #1051737)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/298/
 	NOTE: Probably fixed with r1832 and r1836 from http://svn.code.sf.net/p/freeimage/svn/FreeImage/



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f67c4f0ad22c0f89f5718efc62b80011f9a85c44

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f67c4f0ad22c0f89f5718efc62b80011f9a85c44
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231124/e6d9c869/attachment.htm>


More information about the debian-security-tracker-commits mailing list