Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: c4a307bf by Moritz Muehlenhoff at 2023-07-20T10:49:06+02:00 NFUs - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,11 +1,11 @@ CVE-2023-3784 (A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has ...) - TODO: check + NOT-FOR-US: Dooblou WiFi File Explorer CVE-2023-3783 (A vulnerability was found in Webile 1.0.1. It has been classified as p ...) - TODO: check + NOT-FOR-US: Webile CVE-2023-3782 (DoS of the OkHttp client when using a BrotliInterceptor and surfing to ...) - TODO: check + NOT-FOR-US: BrotliInterceptor CVE-2023-3779 (The Essential Addons For Elementor plugin for WordPress is vulnerable ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-3300 (HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP ...) TODO: check CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies ...) @@ -13,19 +13,19 @@ CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL pol CVE-2023-3072 (HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL ...) TODO: check CVE-2023-37362 (Weintek Weincloud v0.13.6 could allow an attacker to abuse the reg ...) - TODO: check + NOT-FOR-US: Weincloud CVE-2023-37289 (It is identified a vulnerability of Unrestricted Upload of File with D ...) - TODO: check + NOT-FOR-US: InfoDoc CVE-2023-36853 (In Keysight Geolocation Server v2.4.2 and prior, a low privileged atta ...) - TODO: check + NOT-FOR-US: Keysight Geolocation Server CVE-2023-35134 (Weintek Weincloud v0.13.6 could allow an attacker to reset a passwor ...) - TODO: check + NOT-FOR-US: Weincloud CVE-2023-34429 (Weintek Weincloud v0.13.6 could allow an attacker to cause a denia ...) - TODO: check + NOT-FOR-US: Weincloud CVE-2023-34394 (In Keysight Geolocation Server v2.4.2 and prior, an attacker could upl ...) - TODO: check + NOT-FOR-US: Keysight Geolocation Server CVE-2023-32657 (Weintek Weincloud v0.13.6 could allow an attacker to efficiently d ...) - TODO: check + NOT-FOR-US: Weincloud CVE-2023-38408 (The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insuff ...) - openssh 1:9.3p2-1 NOTE: https://www.openwall.com/lists/oss-security/2023/07/19/9 @@ -77,13 +77,13 @@ CVE-2023-3466 (Reflected Cross-Site Scripting (XSS)) CVE-2023-3463 (All versions of GE Digital CIMPLICITY that are not adhering to SDG gui ...) NOT-FOR-US: GE Digital CIMPLICITY CVE-2023-37899 (Feathersjs is a framework for creating web APIs and real-time applicat ...) - TODO: check + NOT-FOR-US: Feathersjs CVE-2023-37897 (Grav is a file-based Web-platform built in PHP. Grav is subject to a s ...) - TODO: check + NOT-FOR-US: Grav CMS CVE-2023-37748 (ngiflib commit 5e7292 was discovered to contain an infinite loop via t ...) - TODO: check + NOT-FOR-US: ngiflib CVE-2023-37733 (An arbitrary file upload vulnerability in tduck-platform v4.0 allows a ...) - TODO: check + NOT-FOR-US: Grav CMStduck-platform CVE-2023-37276 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) TODO: check CVE-2023-35900 (IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 a ...) @@ -91,11 +91,11 @@ CVE-2023-35900 (IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0 CVE-2023-35898 (IBM InfoSphere Information Server 11.7 could allow an authenticated us ...) NOT-FOR-US: IBM CVE-2023-34034 (Using "**" as a pattern in Spring Security configuration for WebFlux ...) - TODO: check + - libspring-security-2.0-java <removed> CVE-2023-33876 (A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.1 ...) NOT-FOR-US: Foxit Reader CVE-2023-33866 (A use-after-free vulnerability exists in the JavaScript engine of Foxi ...) - TODO: check + NOT-FOR-US: Foxit Reader CVE-2023-33832 (IBM Spectrum Protect 8.1.0.0 through 8.1.17.0 could allow a local user ...) NOT-FOR-US: IBM CVE-2023-32664 (A type confusion vulnerability exists in the Javascript checkThisBox m ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4a307bfa9a4060194da994a261be5168f7dbdb3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4a307bfa9a4060194da994a261be5168f7dbdb3 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits