[Git][security-tracker-team/security-tracker][master] Process more NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Aug 10 09:24:14 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1a4ec6e4 by Salvatore Bonaccorso at 2023-08-10T10:23:48+02:00
Process more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3,11 +3,11 @@ CVE-2023-4277 (The Realia plugin for WordPress is vulnerable to Cross-Site Reque
 CVE-2023-4276 (The Absolute Privacy plugin for WordPress is vulnerable to Cross-Site  ...)
 	NOT-FOR-US: Absolute Privacy plugin for WordPress
 CVE-2023-36673 (An issue was discovered in Avira Phantom VPN through 2.23.1 for macOS. ...)
-	TODO: check
+	NOT-FOR-US: Avira Phantom VPN
 CVE-2023-36672 (An issue was discovered in the Clario VPN client through 5.9.1.1662 fo ...)
-	TODO: check
+	NOT-FOR-US: Clario VPN client
 CVE-2023-36671 (An issue was discovered in the Clario VPN client through 5.9.1.1662 fo ...)
-	TODO: check
+	NOT-FOR-US: Clario VPN client
 CVE-2023-35838 (The WireGuard client 0.5.3 on Windows insecurely configures the operat ...)
 	TODO: check
 CVE-2023-33242 (Crypto wallets implementing the Lindell17 TSS protocol might allow an  ...)
@@ -109,9 +109,9 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 1.3.0 allows remote atta
 CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table accounting error ...)
 	TODO: check
 CVE-2023-33469 (In instances where the screen is visible and remote mouse connection i ...)
-	TODO: check
+	NOT-FOR-US: KramerAV
 CVE-2023-33468 (KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior t ...)
-	TODO: check
+	NOT-FOR-US: KramerAV
 CVE-2023-32782 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
 	NOT-FOR-US: PRTG Network Monitor
 CVE-2023-32781 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. ...)
@@ -125,55 +125,55 @@ CVE-2023-31449 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83
 CVE-2023-31448 (An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760  ...)
 	NOT-FOR-US: PRTG Network Monitor
 CVE-2022-48604 (A SQL injection vulnerability exists in the \u201clogging export\u201d ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48603 (A SQL injection vulnerability exists in the \u201cmessage viewer ifram ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48602 (A SQL injection vulnerability exists in the \u201cmessage viewer print ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48601 (A SQL injection vulnerability exists in the \u201cnetwork print report ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48600 (A SQL injection vulnerability exists in the \u201cnotes view\u201d fea ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48599 (A SQL injection vulnerability exists in the \u201creporter events type ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48598 (A SQL injection vulnerability exists in the \u201creporter events type ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48597 (A SQL injection vulnerability exists in the \u201cticket event report\ ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48596 (A SQL injection vulnerability exists in the \u201cticket queue watcher ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48595 (A SQL injection vulnerability exists in the \u201cticket template watc ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48594 (A SQL injection vulnerability exists in the \u201cticket watchers emai ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48593 (A SQL injection vulnerability exists in the \u201ctopology data servic ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48592 (A SQL injection vulnerability exists in the vendor_country parameter o ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48591 (A SQL injection vulnerability exists in the vendor_state parameter of  ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48590 (A SQL injection vulnerability exists in the \u201cadmin dynamic app mi ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48589 (A SQL injection vulnerability exists in the \u201creporting job editor ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48588 (A SQL injection vulnerability exists in the \u201cschedule editor deco ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48587 (A SQL injection vulnerability exists in the \u201cschedule editor\u201 ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48586 (A SQL injection vulnerability exists in the \u201cjson walker\u201d fe ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48585 (A SQL injection vulnerability exists in the \u201cadmin brand portal\u ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48584 (A command injection vulnerability exists in the download and convert r ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48583 (A command injection vulnerability exists in the dashboard scheduler fe ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48582 (A command injection vulnerability exists in the ticket report generate ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48581 (A command injection vulnerability exists in the \u201cdash export\u201 ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48580 (A command injection vulnerability exists in the ARP ping device tool f ...)
-	TODO: check
+	NOT-FOR-US: ScienceLogic SL1
 CVE-2023-4243 (The FULL - Customer plugin for WordPress is vulnerable to Arbitrary Fi ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2023-4242 (The FULL - Customer plugin for WordPress is vulnerable to Information  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230810/3f6ba446/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list