[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Sep 28 09:12:38 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9acddbd3 by security tracker role at 2023-09-28T08:12:20+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,73 @@
+CVE-2023-5244 (Cross-site Scripting (XSS) - Reflected in GitHub repository microweber ...)
+	TODO: check
+CVE-2023-5233 (The Font Awesome Integration plugin for WordPress is vulnerable to Sto ...)
+	TODO: check
+CVE-2023-5232 (The Font Awesome More Icons plugin for WordPress is vulnerable to Stor ...)
+	TODO: check
+CVE-2023-5230 (The TM WooCommerce Compare & Wishlist plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2023-44276 (OPNsense before 23.7.5 allows XSS via the index.php sequence parameter ...)
+	TODO: check
+CVE-2023-44275 (OPNsense before 23.7.5 allows XSS via the index.php column_count param ...)
+	TODO: check
+CVE-2023-44273 (Consensys gnark-crypto through 0.11.2 allows Signature Malleability. T ...)
+	TODO: check
+CVE-2023-44080 (An issue in PGYER codefever v.2023.8.14-2ce4006 allows a remote attack ...)
+	TODO: check
+CVE-2023-43660 (Warpgate is a smart SSH, HTTPS and MySQL bastion host for Linux that d ...)
+	TODO: check
+CVE-2023-43656 (matrix-hookshot is a Matrix bot for connecting to external services li ...)
+	TODO: check
+CVE-2023-43651 (JumpServer is an open source bastion host. An authenticated user can e ...)
+	TODO: check
+CVE-2023-43320 (An issue in Proxmox Server Solutions GmbH Proxmox VE v.5.4 thru v.8.0, ...)
+	TODO: check
+CVE-2023-43314 (Buffer Overflow vulnerability in ZYXEL ZYXEL v.PMG2005-T20B allows a r ...)
+	TODO: check
+CVE-2023-43233 (A stored cross-site scripting (XSS) vulnerability in the cms/content/e ...)
+	TODO: check
+CVE-2023-43192 (SQL injection can exist in a newly created part of the JFinalcms backg ...)
+	TODO: check
+CVE-2023-43191 (JFinalCMS foreground message can be embedded malicious code saved in t ...)
+	TODO: check
+CVE-2023-42818 (JumpServer is an open source bastion host. When users enable MFA and u ...)
+	TODO: check
+CVE-2023-42222 (WebCatalog before 49.0 is vulnerable to Incorrect Access Control. WebC ...)
+	TODO: check
+CVE-2023-41453 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41452 (Cross Site Request Forgery vulnerability in phpkobo AjaxNewTicker v.1. ...)
+	TODO: check
+CVE-2023-41451 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41450 (An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to ...)
+	TODO: check
+CVE-2023-41449 (An issue in phpkobo AjaxNewsTicker v.1.0.5 allows a remote attacker to ...)
+	TODO: check
+CVE-2023-41448 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41447 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41446 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41445 (Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 al ...)
+	TODO: check
+CVE-2023-41444 (An issue in Binalyze IREC.sys v.3.11.0 and before allows a local attac ...)
+	TODO: check
+CVE-2023-40026 (Argo CD is a declarative continuous deployment framework for Kubernete ...)
+	TODO: check
+CVE-2023-38877 (A host header injection vulnerability exists in gugoan's Economizzer v ...)
+	TODO: check
+CVE-2023-38874 (A remote code execution (RCE) vulnerability via an insecure file uploa ...)
+	TODO: check
+CVE-2023-38873 (The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer  ...)
+	TODO: check
+CVE-2023-38872 (An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Eco ...)
+	TODO: check
+CVE-2023-38871 (The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer  ...)
+	TODO: check
+CVE-2023-38870 (A SQL injection vulnerability exists in gugoan Economizzer commit 3730 ...)
+	TODO: check
 CVE-2023-42119 [Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability]
 	- exim4 <unfixed>
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1473/
@@ -56,7 +126,7 @@ CVE-2023-5184 (Two potential signed to unsigned conversion errors and buffer ove
 	NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
 CVE-2023-4523 (Real Time Automation 460 Series products with versions prior to v8.9.8 ...)
 	NOT-FOR-US: Real Time Automation 460 Series products
-CVE-2023-4066
+CVE-2023-4066 (A flaw was found in Red Hat's AMQ Broker, which stores certain passwor ...)
 	NOT-FOR-US: Red Hat AMQ Broker
 CVE-2023-4129 (Dell Data Protection Central, version 19.9, contains an Inadequate Enc ...)
 	NOT-FOR-US: Dell
@@ -598,7 +668,8 @@ CVE-2023-5161 (The Modal Window plugin for WordPress is vulnerable to Stored Cro
 	NOT-FOR-US: Modal Window plugin for WordPress
 CVE-2023-5135 (The Simple Cloudflare Turnstile plugin for WordPress is vulnerable to  ...)
 	NOT-FOR-US: Simple Cloudflare Turnstile plugin for WordPress
-CVE-2023-5129 (With a specially crafted WebP lossless file, libwebp may write data ou ...)
+CVE-2023-5129
+	REJECTED
 	- libwebp 1.2.4-0.3
 	[bookworm] - libwebp 1.2.4-0.2+deb12u1
 	[bullseye] - libwebp 0.6.1-2.1+deb11u2
@@ -33670,16 +33741,16 @@ CVE-2023-26151
 	RESERVED
 CVE-2023-26150
 	RESERVED
-CVE-2023-26149
-	RESERVED
+CVE-2023-26149 (Versions of the package quill-mention before 4.0.0 are vulnerable to C ...)
+	TODO: check
 CVE-2023-26148
 	RESERVED
 CVE-2023-26147
 	RESERVED
 CVE-2023-26146
 	RESERVED
-CVE-2023-26145
-	RESERVED
+CVE-2023-26145 (This affects versions of the package pydash before 6.0.0. A number of  ...)
+	TODO: check
 CVE-2023-26144 (Versions of the package graphql from 16.3.0 and before 16.8.1 are vuln ...)
 	- node-graphql <unfixed>
 	[bookworm] - node-graphql <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9acddbd3f1d0549f077cd1cb4f9109682375f13d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9acddbd3f1d0549f077cd1cb4f9109682375f13d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230928/b345045b/attachment.htm>


More information about the debian-security-tracker-commits mailing list