[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jul 11 21:36:07 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d4139b9c by Salvatore Bonaccorso at 2023-07-11T22:35:37+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -106,85 +106,85 @@ CVE-2023-36386 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All
CVE-2023-36293 (SQL injection vulnerability in wmanager v.1.0.7 and before allows a re ...)
TODO: check
CVE-2023-36167 (An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute a ...)
- TODO: check
+ NOT-FOR-US: AVG Anti-Spyware
CVE-2023-36164 (An issue in MiniTool Partition Wizard ShadowMaker v.12.7 allows an att ...)
TODO: check
CVE-2023-36163 (Cross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 ...)
TODO: check
CVE-2023-35921 (A vulnerability has been identified in SIMATIC MV540 H (All versions < ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-35920 (A vulnerability has been identified in SIMATIC MV540 H (All versions < ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-35913 (Cross-Site Request Forgery (CSRF) vulnerability in OOPSpam OOPSpam Ant ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-35780 (Cross-Site Request Forgery (CSRF) vulnerability in Andy Whalen Galleri ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-35778 (Cross-Site Request Forgery (CSRF) vulnerability in Neha Goel Recent Po ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-35773 (Cross-Site Request Forgery (CSRF) vulnerability in Danny Hearnah - Chu ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-35374 (Paint 3D Remote Code Execution Vulnerability)
TODO: check
CVE-2023-35373 (Mono Authenticode Validation Spoofing Vulnerability)
TODO: check
CVE-2023-35367 (Windows Routing and Remote Access Service (RRAS) Remote Code Execution ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35366 (Windows Routing and Remote Access Service (RRAS) Remote Code Execution ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35365 (Windows Routing and Remote Access Service (RRAS) Remote Code Execution ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35364 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35363 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35362 (Windows Clip Service Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35361 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35360 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35358 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35357 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35356 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35353 (Connected User Experiences and Telemetry Elevation of Privilege Vulner ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35352 (Windows Remote Desktop Security Feature Bypass Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35351 (Windows Active Directory Certificate Services (AD CS) Remote Code Exec ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35350 (Windows Active Directory Certificate Services (AD CS) Remote Code Exec ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35348 (Active Directory Federation Service Security Feature Bypass Vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35347 (Microsoft Install Service Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35346 (Windows DNS Server Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35345 (Windows DNS Server Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35344 (Windows DNS Server Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35343 (Windows Geolocation Service Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35342 (Windows Image Acquisition Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35341 (Microsoft DirectMusic Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35340 (Windows CNG Key Isolation Service Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35339 (Windows CryptoAPI Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35338 (Windows Peer Name Resolution Protocol Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35337 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35336 (Windows MSHTML Platform Security Feature Bypass Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35335 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35333 (MediaWiki PandocUpload Extension Remote Code Execution Vulnerability)
TODO: check
CVE-2023-35332 (Windows Remote Desktop Protocol Security Feature Bypass)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4139b9cc94e1aea0f77dc9cd9fc5be6584d948c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4139b9cc94e1aea0f77dc9cd9fc5be6584d948c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230711/a791ae5f/attachment.htm>
More information about the debian-security-tracker-commits
mailing list