[Git][security-tracker-team/security-tracker][master] Process more NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Aug 10 09:24:14 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1a4ec6e4 by Salvatore Bonaccorso at 2023-08-10T10:23:48+02:00
Process more NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3,11 +3,11 @@ CVE-2023-4277 (The Realia plugin for WordPress is vulnerable to Cross-Site Reque
CVE-2023-4276 (The Absolute Privacy plugin for WordPress is vulnerable to Cross-Site ...)
NOT-FOR-US: Absolute Privacy plugin for WordPress
CVE-2023-36673 (An issue was discovered in Avira Phantom VPN through 2.23.1 for macOS. ...)
- TODO: check
+ NOT-FOR-US: Avira Phantom VPN
CVE-2023-36672 (An issue was discovered in the Clario VPN client through 5.9.1.1662 fo ...)
- TODO: check
+ NOT-FOR-US: Clario VPN client
CVE-2023-36671 (An issue was discovered in the Clario VPN client through 5.9.1.1662 fo ...)
- TODO: check
+ NOT-FOR-US: Clario VPN client
CVE-2023-35838 (The WireGuard client 0.5.3 on Windows insecurely configures the operat ...)
TODO: check
CVE-2023-33242 (Crypto wallets implementing the Lindell17 TSS protocol might allow an ...)
@@ -109,9 +109,9 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 1.3.0 allows remote atta
CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table accounting error ...)
TODO: check
CVE-2023-33469 (In instances where the screen is visible and remote mouse connection i ...)
- TODO: check
+ NOT-FOR-US: KramerAV
CVE-2023-33468 (KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior t ...)
- TODO: check
+ NOT-FOR-US: KramerAV
CVE-2023-32782 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
NOT-FOR-US: PRTG Network Monitor
CVE-2023-32781 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
@@ -125,55 +125,55 @@ CVE-2023-31449 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83
CVE-2023-31448 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 ...)
NOT-FOR-US: PRTG Network Monitor
CVE-2022-48604 (A SQL injection vulnerability exists in the \u201clogging export\u201d ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48603 (A SQL injection vulnerability exists in the \u201cmessage viewer ifram ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48602 (A SQL injection vulnerability exists in the \u201cmessage viewer print ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48601 (A SQL injection vulnerability exists in the \u201cnetwork print report ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48600 (A SQL injection vulnerability exists in the \u201cnotes view\u201d fea ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48599 (A SQL injection vulnerability exists in the \u201creporter events type ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48598 (A SQL injection vulnerability exists in the \u201creporter events type ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48597 (A SQL injection vulnerability exists in the \u201cticket event report\ ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48596 (A SQL injection vulnerability exists in the \u201cticket queue watcher ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48595 (A SQL injection vulnerability exists in the \u201cticket template watc ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48594 (A SQL injection vulnerability exists in the \u201cticket watchers emai ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48593 (A SQL injection vulnerability exists in the \u201ctopology data servic ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48592 (A SQL injection vulnerability exists in the vendor_country parameter o ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48591 (A SQL injection vulnerability exists in the vendor_state parameter of ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48590 (A SQL injection vulnerability exists in the \u201cadmin dynamic app mi ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48589 (A SQL injection vulnerability exists in the \u201creporting job editor ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48588 (A SQL injection vulnerability exists in the \u201cschedule editor deco ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48587 (A SQL injection vulnerability exists in the \u201cschedule editor\u201 ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48586 (A SQL injection vulnerability exists in the \u201cjson walker\u201d fe ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48585 (A SQL injection vulnerability exists in the \u201cadmin brand portal\u ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48584 (A command injection vulnerability exists in the download and convert r ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48583 (A command injection vulnerability exists in the dashboard scheduler fe ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48582 (A command injection vulnerability exists in the ticket report generate ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48581 (A command injection vulnerability exists in the \u201cdash export\u201 ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48580 (A command injection vulnerability exists in the ARP ping device tool f ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2023-4243 (The FULL - Customer plugin for WordPress is vulnerable to Arbitrary Fi ...)
NOT-FOR-US: WordPress plugin
CVE-2023-4242 (The FULL - Customer plugin for WordPress is vulnerable to Information ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230810/3f6ba446/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list