Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c7dbd5c3 by security tracker role at 2023-07-21T08:12:04+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,59 @@
+CVE-2023-3815 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2023-3813 (The Jupiter X Core plugin for WordPress is vulnerable to 
arbitrary fil ...)
+       TODO: check
+CVE-2023-3811 (A vulnerability was found in Hospital Management System 1.0. It 
has be ...)
+       TODO: check
+CVE-2023-3810 (A vulnerability was found in Hospital Management System 1.0. It 
has be ...)
+       TODO: check
+CVE-2023-3809 (A vulnerability was found in Hospital Management System 1.0. It 
has be ...)
+       TODO: check
+CVE-2023-3808 (A vulnerability was found in Hospital Management System 1.0 and 
classi ...)
+       TODO: check
+CVE-2023-3807 (A vulnerability has been found in Campcodes Beauty Salon 
Management Sy ...)
+       TODO: check
+CVE-2023-3806 (A vulnerability, which was classified as critical, was found in 
Source ...)
+       TODO: check
+CVE-2023-3805 (A vulnerability, which was classified as critical, has been 
found in X ...)
+       TODO: check
+CVE-2023-3804 (A vulnerability classified as problematic was found in Chengdu 
Flash F ...)
+       TODO: check
+CVE-2023-3803 (A vulnerability classified as problematic has been found in 
Chengdu Fl ...)
+       TODO: check
+CVE-2023-3802 (A vulnerability was found in Chengdu Flash Flood Disaster 
Monitoring a ...)
+       TODO: check
+CVE-2023-3801 (A vulnerability was found in IBOS OA 4.5.5. It has been 
declared as cr ...)
+       TODO: check
+CVE-2023-3800 (A vulnerability was found in EasyAdmin8 2.0.2.2. It has been 
classifie ...)
+       TODO: check
+CVE-2023-3799 (A vulnerability was found in IBOS OA 4.5.5 and classified as 
critical. ...)
+       TODO: check
+CVE-2023-3798 (A vulnerability has been found in Chengdu Flash Flood Disaster 
Monitor ...)
+       TODO: check
+CVE-2023-3797 (A vulnerability, which was classified as critical, was found in 
Gen Te ...)
+       TODO: check
+CVE-2023-3796 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2023-3795 (A vulnerability classified as critical was found in Bug Finder 
ChainCi ...)
+       TODO: check
+CVE-2023-38632 (async-sockets-cpp through 0.3.1 has a stack-based buffer 
overflow in t ...)
+       TODO: check
+CVE-2023-37645 (eyoucms v1.6.3 was discovered to contain an information 
disclosure vul ...)
+       TODO: check
+CVE-2023-37292 (Improper Neutralization of Special Elements used in an OS 
Command ('OS ...)
+       TODO: check
+CVE-2023-37291 (Galaxy Software Services Vitals ESP is vulnerable to using a 
hard-code ...)
+       TODO: check
+CVE-2023-35087 (It is identified a format string vulnerability in ASUS 
RT-AX56U V2 & R ...)
+       TODO: check
+CVE-2023-35086 (It is identified a format string vulnerability in ASUS 
RT-AX56U V2 & R ...)
+       TODO: check
+CVE-2023-32625 (Cross-site request forgery (CSRF) vulnerability in TS Webfonts 
for SAK ...)
+       TODO: check
+CVE-2023-32624 (Cross-site scripting vulnerability in TS Webfonts for SAKURA 
3.1.0 and ...)
+       TODO: check
+CVE-2023-32478 (Dell PowerStore versions prior to 3.5.0.1 contain an insertion 
of sens ...)
+       TODO: check
 CVE-2023-3812 [net: tun: fix bugs for oversize packet when napi frags enabled]
        - linux 6.0.8-1
        [bullseye] - linux 5.10.158-1
@@ -16204,9 +16260,9 @@ CVE-2023-28767 (The configuration parser fails to 
sanitize user-controlled input
 CVE-2023-28766 (A vulnerability has been identified in SIPROTEC 5 6MD85 
(CP300) (All v ...)
        NOT-FOR-US: Siemens
 CVE-2023-25180
-       RESERVED
+       REJECTED
 CVE-2023-24593
-       RESERVED
+       REJECTED
 CVE-2023-1613 (A vulnerability has been found in Rebuild up to 3.2.3 and 
classified a ...)
        NOT-FOR-US: Rebuild
 CVE-2023-1612 (A vulnerability, which was classified as critical, was found in 
Rebuil ...)
@@ -16413,12 +16469,12 @@ CVE-2023-1555
        RESERVED
 CVE-2013-10022 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: WordPress plugin
-CVE-2023-28730
-       RESERVED
-CVE-2023-28729
-       RESERVED
-CVE-2023-28728
-       RESERVED
+CVE-2023-28730 (A memory corruption vulnerability Panasonic Control FPWIN Pro 
versions ...)
+       TODO: check
+CVE-2023-28729 (A type confusion vulnerability in Panasonic Control FPWIN Pro 
versions ...)
+       TODO: check
+CVE-2023-28728 (A stack-based buffer overflow in Panasonic Control FPWIN Pro 
versions  ...)
+       TODO: check
 CVE-2023-28727 (Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent 
attacker ...)
        NOT-FOR-US: Panasonic AiSEG2
 CVE-2023-28726 (Panasonic AiSEG2 versions 2.80F through 2.93A allows remote 
attackers  ...)
@@ -25053,12 +25109,12 @@ CVE-2023-25839 (There is SQL injection vulnerability 
in Esri ArcGIS Insights Des
        TODO: check
 CVE-2023-25838 (There is SQL injection vulnerabilityin Esri ArcGIS Insights 
2022.1 for ...)
        TODO: check
-CVE-2023-25837
-       RESERVED
-CVE-2023-25836
-       RESERVED
-CVE-2023-25835
-       RESERVED
+CVE-2023-25837 (There is a Cross-site Scripting vulnerabilityin Esri Portal 
Sites in v ...)
+       TODO: check
+CVE-2023-25836 (There is a Cross-site Scripting vulnerabilityin Esri Portal 
Sites in v ...)
+       TODO: check
+CVE-2023-25835 (There is a Cross-site Scripting vulnerabilityin Esri Portal 
Sites in v ...)
+       TODO: check
 CVE-2023-25834 (Changes to user permissions in Portal for ArcGIS 10.9.1 and 
below are  ...)
        NOT-FOR-US: Esri
 CVE-2023-25833 (There is an HTML injection vulnerability in Esri Portal for 
ArcGIS ver ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7dbd5c3c8f6072ba6703b54c90bdae4729cf65b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7dbd5c3c8f6072ba6703b54c90bdae4729cf65b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to