[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Oct 10 11:40:09 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e5f5d42a by Moritz Muehlenhoff at 2023-10-10T12:39:45+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,55 +1,55 @@
 CVE-2023-5471 (A vulnerability, which was classified as critical, was found in codepr ...)
-	TODO: check
+	NOT-FOR-US: codeprojects Farmacia
 CVE-2023-5468 (The Slick Contact Forms plugin for WordPress is vulnerable to Stored C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-5467 (The GEO my WordPress plugin for WordPress is vulnerable to Stored Cros ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-5463 (A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been r ...)
-	TODO: check
+	NOT-FOR-US: XINJE
 CVE-2023-5462 (A vulnerability was found in XINJE XD5E-30R-E 3.5.3b. It has been decl ...)
-	TODO: check
+	NOT-FOR-US: XINJE
 CVE-2023-45208 (A command injection in the parsing_xml_stasurvey function inside libcg ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2023-44959 (An issue found in D-Link DSL-3782 v.1.03 and before allows remote auth ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2023-44848 (An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code ...)
-	TODO: check
+	NOT-FOR-US: SeaCMS
 CVE-2023-44847 (An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code ...)
-	TODO: check
+	NOT-FOR-US: SeaCMS
 CVE-2023-44846 (An issue in SeaCMS v.12.8 allows an attacker to execute arbitrary code ...)
-	TODO: check
+	NOT-FOR-US: SeaCMS
 CVE-2023-44827 (An issue in ZenTao Community Edition v.18.6 and before, ZenTao Biz v.8 ...)
-	TODO: check
+	NOT-FOR-US: ZenTao
 CVE-2023-44826 (Cross Site Scripting vulnerability in ZenTaoPMS v.18.6 allows a local  ...)
-	TODO: check
+	NOT-FOR-US: ZenTao
 CVE-2023-44813 (Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a ...)
-	TODO: check
+	NOT-FOR-US: mooSocial
 CVE-2023-43899 (hansun CMS v1.0 was discovered to contain a SQL injection vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: hansun CMS
 CVE-2023-43271 (Incorrect access control in 70mai a500s v1.2.119 allows attackers to d ...)
-	TODO: check
+	NOT-FOR-US: 70mai a500s
 CVE-2023-42477 (SAP NetWeaver AS Java (GRMG Heartbeat application) - version 7.50,allo ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-42475 (The Statutory Reporting application has a vulnerable file storage loca ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-42474 (SAP BusinessObjects Web Intelligence - version 420, has a URL with par ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-42473 (S/4HANA Manage (Withholding Tax Items) - version 106,does not perform  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-42189 (Insecure Permissions vulnerability in Connectivity Standards Alliance  ...)
-	TODO: check
+	NOT-FOR-US: Connectivity Standards Alliance Matter Official SDK
 CVE-2023-41730 (Cross-Site Request Forgery (CSRF) vulnerability in SendPress Newslette ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41697 (Cross-Site Request Forgery (CSRF) vulnerability in Nikunj Soni Easy WP ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41694 (Cross-Site Request Forgery (CSRF) vulnerability in Realbig Team Realbi ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41684 (Cross-Site Request Forgery (CSRF) vulnerability in Felix Welberg SIS H ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41365 (SAP Business One (B1i) - version 10.0, allows an authorized attacker t ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-40310 (SAP PowerDesignerClient- version 16.7, does not sufficiently validate  ...)
-	TODO: check
+	NOT-FOR-US: SAP
 CVE-2023-45360
 	- mediawiki 1:1.39.5-1
 	NOTE: https://phabricator.wikimedia.org/T340221



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e5f5d42a77cde6759aae895bf082870520acccbc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e5f5d42a77cde6759aae895bf082870520acccbc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231010/976078bd/attachment.htm>


More information about the debian-security-tracker-commits mailing list