[Git][security-tracker-team/security-tracker][master] Process several NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jun 27 09:33:32 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
00c6a61d by Salvatore Bonaccorso at 2023-06-27T10:33:08+02:00
Process several NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,15 +1,15 @@
CVE-2023-3423 (Weak Password Requirements in GitHub repository cloudexplorer-dev/clou ...)
TODO: check
CVE-2023-3412 (The Image Map Pro \u2013 Drag-and-drop Builder for Interactive Images ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-3411 (The Image Map Pro \u2013 Drag-and-drop Builder for Interactive Images ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-3371 (The User Registration plugin for WordPress is vulnerable to Sensitive ...)
- TODO: check
+ NOT-FOR-US: User Registration plugin for WordPress
CVE-2023-3132 (The MainWP Child plugin for WordPress is vulnerable to Sensitive Infor ...)
- TODO: check
+ NOT-FOR-US: MainWP Child plugin for WordPress
CVE-2023-35695 (A remote attacker could leverage a vulnerability in Trend Micro Mobile ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-35168 (DataEase is an open source data visualization analysis tool to analyze ...)
TODO: check
CVE-2023-35164 (DataEase is an open source data visualization analysis tool to analyze ...)
@@ -19,65 +19,65 @@ CVE-2023-34924 (H3C Magic B1STW B1STV100R012 was discovered to contain a stack o
CVE-2023-34463 (DataEase is an open source data visualization analysis tool to analyze ...)
TODO: check
CVE-2023-34148 (An exposed dangerous function vulnerability in the Trend Micro Apex On ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-34147 (An exposed dangerous function vulnerability in the Trend Micro Apex On ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-34146 (An exposed dangerous function vulnerability in the Trend Micro Apex On ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-34145 (An untrusted search path vulnerability in the Trend Micro Apex One and ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-34144 (An untrusted search path vulnerability in the Trend Micro Apex One and ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32605 (Affected versions Trend Micro Apex Central (on-premise) are vulnerable ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32604 (Affected versions Trend Micro Apex Central (on-premise) are vulnerable ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32557 (A path traversal vulnerability in the Trend Micro Apex One and Apex On ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32556 (A link following vulnerability in the Trend Micro Apex One and Apex On ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32555 (A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32554 (A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32553 (An Improper access control vulnerability in Trend Micro Apex One and A ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32552 (An Improper access control vulnerability in Trend Micro Apex One and A ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32537 (Affected versions Trend Micro Apex Central (on-premise) are vulnerable ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32536 (Affected versions Trend Micro Apex Central (on-premise) are vulnerable ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32535 (Certain dashboard widgets on Trend Micro Apex Central (on-premise) are ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32534 (Certain dashboard widgets on Trend Micro Apex Central (on-premise) are ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32533 (Certain dashboard widgets on Trend Micro Apex Central (on-premise) are ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32532 (Certain dashboard widgets on Trend Micro Apex Central (on-premise) are ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32531 (Certain dashboard widgets on Trend Micro Apex Central (on-premise) are ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32530 (Vulnerable modules of Trend Micro Apex Central (on-premise) contain vu ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32529 (Vulnerable modules of Trend Micro Apex Central (on-premise) contain vu ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32528 (Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable . ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32527 (Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable . ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32526 (Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulne ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32525 (Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulne ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32524 (Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32523 (Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32522 (A path traversal exists in a specific dll of Trend Micro Mobile Securi ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-32521 (A path traversal exists in a specific service dll of Trend Micro Mobil ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-3361
NOT-FOR-US: OpenShift Data
CVE-2023-3422 (Use after free in Guest View in Google Chrome prior to 114.0.5735.198 ...)
@@ -6413,7 +6413,7 @@ CVE-2023-30904 (A security vulnerability in HPE Insight Remote Support may resul
CVE-2023-30903 (HP-UX could be exploited locally to create a Denial of Service (DoS) w ...)
NOT-FOR-US: HPE
CVE-2023-30902 (A privilege escalation vulnerability in the Trend Micro Apex One and A ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-30901 (A vulnerability has been identified in POWER METER SICAM Q200 family ( ...)
NOT-FOR-US: Siemens
CVE-2023-30900
@@ -12255,7 +12255,7 @@ CVE-2023-28931
CVE-2023-28930
RESERVED
CVE-2023-28929 (Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2023-28928
RESERVED
CVE-2023-1668 (A flaw was found in openvswitch (OVS). When processing an IP packet wi ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00c6a61dc1e015f7427bcba86b537610b5bd5944
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00c6a61dc1e015f7427bcba86b537610b5bd5944
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230627/3efeaabd/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list