[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Oct 21 09:12:18 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5f829ba2 by security tracker role at 2023-10-21T08:12:04+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,79 @@
+CVE-2023-5684 (A vulnerability was found in Beijing Baichuo Smart S85F Management Pla ...)
+	TODO: check
+CVE-2023-5683 (A vulnerability was found in Beijing Baichuo Smart S85F Management Pla ...)
+	TODO: check
+CVE-2023-5682 (A vulnerability has been found in Tongda OA 2017 and classified as cri ...)
+	TODO: check
+CVE-2023-5681 (A vulnerability, which was classified as critical, was found in Netent ...)
+	TODO: check
+CVE-2023-5205 (The Add Custom Body Class plugin for WordPress is vulnerable to Stored ...)
+	TODO: check
+CVE-2023-5132 (The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unau ...)
+	TODO: check
+CVE-2023-4939 (The SALESmanago plugin for WordPress is vulnerable to Log Injection in ...)
+	TODO: check
+CVE-2023-4635 (The EventON plugin for WordPress is vulnerable to Reflected Cross-Site ...)
+	TODO: check
+CVE-2023-46055 (An issue in ThingNario Photon v.1.0 allows a remote attacker to execut ...)
+	TODO: check
+CVE-2023-46054 (Cross Site Scripting (XSS) vulnerability in WBCE CMS v.1.6.1 and befor ...)
+	TODO: check
+CVE-2023-46003 (I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) vi ...)
+	TODO: check
+CVE-2023-45682 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45681 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45680 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45679 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45678 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45677 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45676 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45675 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...)
+	TODO: check
+CVE-2023-45667 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-45666 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-45664 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-45663 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-45662 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-45661 (stb_image is a single file MIT licensed library for processing images. ...)
+	TODO: check
+CVE-2023-43357 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a  ...)
+	TODO: check
+CVE-2023-43356 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a  ...)
+	TODO: check
+CVE-2023-43355 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a  ...)
+	TODO: check
+CVE-2023-43354 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a  ...)
+	TODO: check
+CVE-2023-43353 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a  ...)
+	TODO: check
+CVE-2023-43346 (Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6 ...)
+	TODO: check
+CVE-2023-38194 (An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keep ...)
+	TODO: check
+CVE-2023-38193 (An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Remo ...)
+	TODO: check
+CVE-2023-38192 (An issue was discovered in SuperWebMailer 9.00.0.01710. It allows supe ...)
+	TODO: check
+CVE-2023-38191 (An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spam ...)
+	TODO: check
+CVE-2023-38190 (An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Expo ...)
+	TODO: check
+CVE-2023-32786 (In Langchain through 0.0.155, prompt injection allows an attacker to f ...)
+	TODO: check
+CVE-2023-32785 (In Langchain through 0.0.155, prompt injection allows execution of arb ...)
+	TODO: check
 CVE-2023-5690 (Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa ...)
 	NOT-FOR-US: Modoboa
 CVE-2023-5689 (Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa  ...)
@@ -577,7 +653,7 @@ CVE-2023-39276 (SonicOS post-authentication stack-based buffer overflow vulnerab
 	NOT-FOR-US: SonicOS
 CVE-2023-38552 (When the Node.js policy feature checks the integrity of a resource aga ...)
 	TODO: check
-CVE-2023-36321 (Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 wwas discove ...)
+CVE-2023-36321 (Connected Vehicle Systems Alliance (COVESA) up to v2.18.8 was discover ...)
 	TODO: check
 CVE-2023-35084 (Unsafe Deserialization of User Input could lead to Execution of Unauth ...)
 	NOT-FOR-US: Ivanti
@@ -34036,7 +34112,7 @@ CVE-2023-27540 (IBM Watson CP4D Data Stores 4.6.0 does not properly allocate res
 	NOT-FOR-US: IBM
 CVE-2023-1165 (A vulnerability was found in Zhong Bang CRMEB Java 1.3.4. It has been  ...)
 	NOT-FOR-US: Zhong Bang CRMEB Java
-CVE-2023-1164 (A vulnerability was found in KylinSoft kylin-activation and classified ...)
+CVE-2023-1164 (A vulnerability was found in KylinSoft kylin-activation on KylinOS and ...)
 	NOT-FOR-US: KylinSoft
 CVE-2023-1163 (A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4 and class ...)
 	NOT-FOR-US: DrayTek Vigor 2960
@@ -36705,7 +36781,7 @@ CVE-2023-1006 (A vulnerability was found in SourceCodester Medical Certificate G
 	NOT-FOR-US: SourceCodester Medical Certificate Generator App
 CVE-2023-1005 (A vulnerability was found in JP1016 Markdown-Electron and classified a ...)
 	NOT-FOR-US: JP1016 Markdown-Electron
-CVE-2023-1004 (A vulnerability has been found in MarkText up to 0.17.1 and classified ...)
+CVE-2023-1004 (A vulnerability has been found in MarkText up to 0.17.1 on Windows and ...)
 	NOT-FOR-US: MarkText
 CVE-2023-1003 (A vulnerability, which was classified as critical, was found in Typora ...)
 	NOT-FOR-US: Typora



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5f829ba2de81801d3065f037db3f2e3062ec757a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5f829ba2de81801d3065f037db3f2e3062ec757a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231021/771c0672/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list