[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Dec 12 20:25:20 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
df59f82d by Salvatore Bonaccorso at 2023-12-12T21:24:53+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7,91 +7,91 @@ CVE-2023-49923 (An issue was discovered by Elastic whereby the Documents API of
 CVE-2023-49922 (An issue was discovered by Elastic whereby Beats and Elastic Agent wou ...)
 	TODO: check
 CVE-2023-49279 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-49278 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-49274 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-49273 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-49089 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-48313 (Umbraco is an ASP.NET content management system (CMS).  Starting in 10 ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-48227 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-43364 (main.py in Searchor before 2.4.2 uses eval on CLI input, which may cau ...)
 	TODO: check
 CVE-2023-41337 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. In ...)
 	TODO: check
 CVE-2023-38694 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...)
-	TODO: check
+	NOT-FOR-US: Umbraco
 CVE-2023-36696 (Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerab ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36391 (Local Security Authority Subsystem Service Elevation of Privilege Vuln ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36020 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36019 (Microsoft Power Platform Connector Spoofing Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36012 (DHCP Server Service Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36011 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36010 (Microsoft Defender Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36009 (Microsoft Word Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36006 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36005 (Windows Telephony Server Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36004 (Windows DPAPI (Data Protection Application Programming Interface) Spoo ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36003 (XAML Diagnostics Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35644 (Windows Sysmain Service Elevation of Privilege)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35643 (DHCP Server Service Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35642 (Internet Connection Sharing (ICS) Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35641 (Internet Connection Sharing (ICS) Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35639 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35638 (DHCP Server Service Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35636 (Microsoft Outlook Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35635 (Windows Kernel Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35634 (Windows Bluetooth Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35633 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35632 (Windows Ancillary Function Driver for WinSock Elevation of Privilege V ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35631 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35630 (Internet Connection Sharing (ICS) Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35629 (Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35628 (Windows MSHTML Platform Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35625 (Azure Machine Learning Compute Instance for SDK Users Information Disc ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35624 (Azure Connected Machine Agent Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35622 (Windows DNS Spoofing Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35621 (Microsoft Dynamics 365 Finance and Operations Denial of Service Vulner ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-35619 (Microsoft Outlook for Mac Spoofing Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-34064 (Workspace ONE Launcher contains a Privilege Escalation Vulnerability.A ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2023-6727 (Mattermost fails to perform correct authorization checks when creating ...)
 	- mattermost-server <itp> (bug #823556)
 CVE-2023-6593 (Client side permission bypass in Devolutions Remote Desktop Manager 20 ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231212/dada96d2/attachment.htm>


More information about the debian-security-tracker-commits mailing list