[Git][security-tracker-team/security-tracker][master] Process some new NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Oct 5 13:31:42 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ddbe489b by Salvatore Bonaccorso at 2023-10-05T14:31:28+02:00
Process some new NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,11 +1,11 @@
CVE-2023-45198 (ftpd before "NetBSD-ftpd 20230930" can leak information about the host ...)
TODO: check
CVE-2023-44389 (Zope is an open-source web application server. The title property, ava ...)
- TODO: check
+ NOT-FOR-US: Zope
CVE-2023-43877 (Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities t ...)
- TODO: check
+ NOT-FOR-US: Rite CMS
CVE-2023-43809 (Soft Serve is a self-hostable Git server for the command line. Prior t ...)
- TODO: check
+ NOT-FOR-US: Soft Serve
CVE-2023-43805 (Nexkey is a fork of Misskey, an open source, decentralized social medi ...)
TODO: check
CVE-2023-43799 (Altair is a GraphQL Client. Prior to version 5.2.5, the Altair GraphQL ...)
@@ -13,7 +13,7 @@ CVE-2023-43799 (Altair is a GraphQL Client. Prior to version 5.2.5, the Altair G
CVE-2023-43793 (Misskey is an open source, decentralized social media platform. Prior ...)
TODO: check
CVE-2023-43321 (File Upload vulnerability in Digital China Networks DCFW-1800-SDC v.3. ...)
- TODO: check
+ NOT-FOR-US: Digital China Networks DCFW-1800-SDC
CVE-2023-40299 (Kong Insomnia 2023.4.0 on macOS allows attackers to execute code and a ...)
TODO: check
CVE-2023-36619 (Atos Unify OpenScape Session Border Controller through V10 R3.01.03 al ...)
@@ -85,7 +85,7 @@ CVE-2023-4090 (Cross-site Scripting (XSS) reflected vulnerability on WideStand u
CVE-2023-4037 (Blind SQL injection vulnerability in the Conacwin 3.7.1.2 web interfac ...)
TODO: check
CVE-2023-44210 (Sensitive information disclosure and manipulation due to missing autho ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-44209 (Local privilege escalation due to improper soft link handling. The fol ...)
NOT-FOR-US: Acronis
CVE-2023-44208 (Sensitive information disclosure and manipulation due to missing autho ...)
@@ -103,7 +103,7 @@ CVE-2023-42824 (The issue was addressed with improved checks. This issue is fixe
CVE-2023-42809 (Redisson is a Java Redis client that uses the Netty framework. Prior t ...)
TODO: check
CVE-2023-42808 (Common Voice is the web app for Mozilla Common Voice, a platform for c ...)
- TODO: check
+ NOT-FOR-US: Mozilla Common Voice
CVE-2023-42449 (Hydra is the two-layer scalability solution for Cardano. Prior to vers ...)
TODO: check
CVE-2023-42448 (Hydra is the layer-two scalability solution for Cardano. Prior to vers ...)
@@ -113,9 +113,9 @@ CVE-2023-41094 (TouchLink packets processed after timeout or out of range due to
CVE-2023-40684 (IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOn ...)
NOT-FOR-US: IBM
CVE-2023-40561 (Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Enhance ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-40559 (Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-40376 (IBM UrbanCode Deploy (UCD) 7.1 - 7.1.2.12, 7.2 through 7.2.3.5, and 7. ...)
NOT-FOR-US: IBM
CVE-2023-3701 (Aqua Drive, in its 2.4 version, is vulnerable to a relative path trave ...)
@@ -1297,7 +1297,7 @@ CVE-2023-42822 (xrdp is an open source remote desktop protocol server. Access to
CVE-2023-42657 (In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traver ...)
NOT-FOR-US: Progress WS_FTP Server
CVE-2023-42487 (Soundminer \u2013 CWE-22: Improper Limitation of a Pathname to a Restr ...)
- TODO: check
+ NOT-FOR-US: Soundminer
CVE-2023-42486 (Fortect - CWE-428: Unquoted Search Path or Element, may be used by loc ...)
NOT-FOR-US: Fortect
CVE-2023-41653 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Beplus S ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ddbe489bb828fbe39f247c20f2286691ce546751
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ddbe489bb828fbe39f247c20f2286691ce546751
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231005/1dc277e8/attachment.htm>
More information about the debian-security-tracker-commits
mailing list