[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jun 30 18:11:09 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
989661e5 by Salvatore Bonaccorso at 2023-06-30T19:10:44+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -19,9 +19,9 @@ CVE-2023-3249 (The Web3 \u2013 Crypto wallet Login & NFT token gating plugin for
CVE-2023-3063 (The SP Project & Document Manager plugin for WordPress is vulnerable t ...)
NOT-FOR-US: SP Project & Document Manager plugin for WordPress
CVE-2023-36607 (The affected TBox RTUs are missing authorization for running some API ...)
- TODO: check
+ NOT-FOR-US: Ovarro
CVE-2023-36539 (Exposure of information intended to be encrypted by some Zoom clients ...)
- TODO: check
+ NOT-FOR-US: Zoom
CVE-2023-36470 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
NOT-FOR-US: XWiki
CVE-2023-36469 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
@@ -31,7 +31,7 @@ CVE-2023-36468 (XWiki Platform is a generic wiki platform offering runtime servi
CVE-2023-36347 (A broken authentication mechanism in the endpoint excel.php of POS Cod ...)
NOT-FOR-US: POS Codekop
CVE-2023-36146 (A Stored Cross-Site Scripting (XSS) vulnerability was found in Multila ...)
- TODO: check
+ NOT-FOR-US: Multilaser RE 170
CVE-2023-36143 (Maxprint Maxlink 1200G v3.4.11E has an OS command injection vulnerabil ...)
NOT-FOR-US: Maxprint Maxlink 1200G
CVE-2023-33336 (Reflected cross site scripting (XSS) vulnerability was discovered in S ...)
@@ -81,9 +81,9 @@ CVE-2023-36471 (Xwiki commons is the common modules used by other XWiki top leve
CVE-2023-35938 (Tuleap is a Free & Open Source Suite to improve management of software ...)
NOT-FOR-US: Tuleap
CVE-2023-35830 (STW (aka Sensor-Technik Wiedemann) TCG-4 Connectivity Module Deploymen ...)
- TODO: check
+ NOT-FOR-US: STW (aka Sensor-Technik Wiedemann) TCG-4 Connectivity
CVE-2023-34849 (An unauthorized command injection vulnerability exists in the ActionLo ...)
- TODO: check
+ NOT-FOR-US: Ikuai router OS
CVE-2023-34844 (Play With Docker < 0.0.2 has an insecure CAP_SYS_ADMIN privileged mode ...)
TODO: check
CVE-2023-34735 (Property Cloud Platform Management Center 1.0 is vulnerable to error-b ...)
@@ -93,9 +93,9 @@ CVE-2023-34658 (Telegram v9.6.3 on iOS allows attackers to hide critical informa
CVE-2023-34656 (An issue was discovered with the JSESSION IDs in Xiamen Si Xin Communi ...)
NOT-FOR-US: Xiamen Si Xin Communication Technology Video management system
CVE-2023-34599 (Multiple Cross-Site Scripting (XSS) vulnerabilities have been identifi ...)
- TODO: check
+ NOT-FOR-US: Gibbon CMS
CVE-2023-34598 (Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it' ...)
- TODO: check
+ NOT-FOR-US: Gibbon CMS
CVE-2023-34487 (itsourcecode Online Hotel Management System Project In PHP v1.0.0 is v ...)
NOT-FOR-US: itsourcecode Online Hotel Management System Project
CVE-2023-34486 (itsourcecode Online Hotel Management System Project In PHP v1.0.0 is v ...)
@@ -141,9 +141,9 @@ CVE-2023-34843 (Traggo Server 0.3.0 is vulnerable to directory traversal via a c
CVE-2023-34834 (A Directory Browsing vulnerability in MCL-Net version 4.3.5.8788 webse ...)
NOT-FOR-US: MCL-Net
CVE-2023-34831 (The "Submission Web Form" of Turnitin LTI tool/plugin version 1.3 is a ...)
- TODO: check
+ NOT-FOR-US: "Submission Web Form" of Turnitin LTI tool/plugin
CVE-2023-34738 (Chemex through 3.7.1 is vulnerable to arbitrary file upload.)
- TODO: check
+ NOT-FOR-US: Chemex
CVE-2023-34736 (Guantang Equipment Management System version 4.12 is vulnerable to Arb ...)
NOT-FOR-US: Guantang Equipment Management System
CVE-2023-34734 (Annet AC Centralized Management Platform 1.02.040 is vulnerable to Sto ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/989661e5c4e5a6207ea949a808ba27e2119acf33
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/989661e5c4e5a6207ea949a808ba27e2119acf33
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230630/060ab5d7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list