[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Oct 10 22:18:34 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a4541d6f by Moritz Muehlenhoff at 2023-10-10T23:17:56+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,409 +1,409 @@
 CVE-2023-5499 (Information exposure vulnerability in Shenzhen Reachfar v28, the explo ...)
-	TODO: check
+	NOT-FOR-US: Shenzhen Reachfar
 CVE-2023-5498 (Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding ...)
-	TODO: check
+	NOT-FOR-US: chiefonboarding
 CVE-2023-5497 (A vulnerability classified as critical has been found in Tongda OA 201 ...)
-	TODO: check
+	NOT-FOR-US: Tongda OA
 CVE-2023-5496 (A vulnerability was found in Translator PoqDev Add-On 1.0.11 on Firefo ...)
-	TODO: check
+	NOT-FOR-US: Translator PoqDev
 CVE-2023-5495 (A vulnerability was found in QDocs Smart School 6.4.1. It has been cla ...)
-	TODO: check
+	NOT-FOR-US: QDocs Smart School
 CVE-2023-5494 (A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service  ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5493 (A vulnerability has been found in Beijing Baichuo Smart S45F Multi-Ser ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5492 (A vulnerability, which was classified as critical, was found in Beijin ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5491 (A vulnerability, which was classified as critical, has been found in B ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5490 (A vulnerability classified as critical was found in Beijing Baichuo Sm ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5489 (A vulnerability classified as critical has been found in Beijing Baich ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5488 (A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service  ...)
-	TODO: check
+	NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5450 (An insufficient verification of data vulnerability exists in BIG-IP Ed ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-4966 (Sensitive information disclosurein NetScaler ADC and NetScaler Gateway ...)
-	TODO: check
+	NOT-FOR-US: Citrix
 CVE-2023-4837 (SmodBIP is vulnerable to Cross-Site Request Forgery, that could be use ...)
-	TODO: check
+	NOT-FOR-US: SmodBIPx
 CVE-2023-4309 (Election Services Co. (ESC) Internet Election Service is vulnerable to ...)
-	TODO: check
+	NOT-FOR-US: Election Services Co. (ESC) Internet Election Service
 CVE-2023-45648 (Improper Input Validation vulnerability in Apache Tomcat.Tomcatfrom 11 ...)
 	TODO: check
 CVE-2023-45601 (A vulnerability has been identified in Parasolid V35.0 (All versions < ...)
-	TODO: check
+	NOT-FOR-US: Parasolid
 CVE-2023-45226 (The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5 ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-45219 (Exposure of Sensitive Information vulnerability exist in an undisclose ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-45205 (A vulnerability has been identified in SICAM PAS/PQS (All versions >=  ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-45204 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-45129 (Synapse is an open-source Matrix homeserver written and maintained by  ...)
 	TODO: check
 CVE-2023-44996 (Cross-Site Request Forgery (CSRF) vulnerability in Naresh Parmar Post  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44995 (Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor WooCommer ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44994 (Cross-Site Request Forgery (CSRF) vulnerability in Bainternet ShortCod ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44763 (Concrete CMS v9.2.1 is affected by Arbitrary File Upload vulnerability ...)
-	TODO: check
+	NOT-FOR-US: Concrete CMS
 CVE-2023-44476 (Cross-Site Request Forgery (CSRF) vulnerability in Andres Felipe Perea ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44475 (Cross-Site Request Forgery (CSRF) vulnerability in Michael Simpson Add ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44471 (Cross-Site Request Forgery (CSRF) vulnerability in Bernhard Kau Backen ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44470 (Cross-Site Request Forgery (CSRF) vulnerability in Kvvaradha Kv TinyMC ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44399 (ZITADEL provides identity infrastructure. In versions 2.37.2 and prior ...)
 	TODO: check
 CVE-2023-44315 (A vulnerability has been identified in SINEC NMS (All versions < V2.0) ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-44261 (Cross-Site Request Forgery (CSRF) vulnerability in Dinesh Karki Block  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44259 (Cross-Site Request Forgery (CSRF) vulnerability in Mediavine Mediavine ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44257 (Cross-Site Request Forgery (CSRF) vulnerability in Hometory Mang Board ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44249 (An authorization bypass through user-controlled key[CWE-639] vulnerabi ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-44241 (Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap Landing P ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-44087 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44086 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44085 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44084 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44083 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44082 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44081 (A vulnerability has been identified in Tecnomatix Plant Simulation V22 ...)
-	TODO: check
+	NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-43896 (A buffer overflow in Macrium Reflect 8.1.7544 and below allows attacke ...)
-	TODO: check
+	NOT-FOR-US: Macrium Reflect
 CVE-2023-43746 (When running in Appliance mode, an authenticated user assigned the Adm ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-43625 (A vulnerability has been identified in Simcenter Amesim (All versions  ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-43623 (A vulnerability has been identified in Mendix Forgot Password (Mendix  ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-43611 (The BIG-IP Edge Client Installer on macOS does not follow best practic ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-43485 (When TACACS+ audit forwarding is configured on BIG-IP or BIG-IQ system ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-42796 (A vulnerability has been identified in CP-8031 MASTER MODULE (All vers ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-42795 (Incomplete Cleanup vulnerability in Apache Tomcat.When recycling vario ...)
 	TODO: check
 CVE-2023-42794 (Incomplete Cleanup vulnerability in Apache Tomcat.  The internal fork  ...)
 	TODO: check
 CVE-2023-42788 (An improper neutralization of special elements used in an os command ( ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-42787 (A client-side enforcement of server-side security [CWE-602] vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-42782 (A insufficient verification of data authenticity vulnerability [CWE-34 ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-42768 (When a non-admin user has been assigned an administrator role via an i ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-41964 (The BIG-IP and BIG-IQ systems do not encrypt some sensitive informatio ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-41876 (Cross-Site Request Forgery (CSRF) vulnerability in Hardik Kalathiya WP ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41858 (Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane Order De ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41854 (Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Ltd. Wp ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41853 (Cross-Site Request Forgery (CSRF) vulnerability in WP iCal Availabilit ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41852 (Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailMunch ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41851 (Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares WP Custo ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41850 (Cross-Site Request Forgery (CSRF) vulnerability in Morris Bryant, Rube ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-41841 (An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7. ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-41838 (An improper neutralization of special elements used in an os command ( ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-41774 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41773 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41772 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41771 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41770 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41769 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41768 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41767 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41766 (Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privileg ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41765 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41763 (Skype for Business Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-41679 (An improper access control vulnerability [CWE-284] in FortiManager man ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-41675 (A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 thro ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-41373 (A directory traversal vulnerability exists in the BIG-IP Configuration ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-41253 (When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services License, an ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-41085 (When IPSec is configured on a Virtual Server, undisclosed traffic can  ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-40718 (A interpretation conflict in Fortinet IPS Engine versions 7.321, 7.166 ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-40542 (When TCP Verified Accept is enabled on a TCP profile that is configure ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-40537 (An authenticated user's session cookie may remain valid for a limited  ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-40534 (When a client-side HTTP/2 profile and the HTTP MRF Router option are e ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-39447 (When BIG-IP APM Guided Configurations are configured, undisclosed sens ...)
-	TODO: check
+	NOT-FOR-US: F5
 CVE-2023-38640 (A vulnerability has been identified in SICAM PAS/PQS (All versions >=  ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-38171 (Microsoft QUIC Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-38166 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-38159 (Windows Graphics Component Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-37939 (An exposure of sensitive information to an unauthorized actor vulnerab ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-37935 (A use of GET request method with sensitive query strings vulnerability ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-37195 (A vulnerability has been identified in SIMATIC CP 1604 (All versions), ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-37194 (A vulnerability has been identified in SIMATIC CP 1604 (All versions), ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-36902 (Windows Runtime Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36790 (Windows RDP Encoder Mirror Driver Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36789 (Skype for Business Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36786 (Skype for Business Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36785 (Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerabili ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36780 (Skype for Business Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36778 (Microsoft Exchange Server Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36776 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36743 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36737 (Azure Network Watcher VM Agent Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36732 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36731 (Win32k Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36730 (Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerabili ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36729 (Named Pipe File System Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36728 (Microsoft SQL Server Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36726 (Windows Internet Key Exchange (IKE) Extension Elevation of Privilege   ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36725 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36724 (Windows Power Management Service Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36723 (Windows Container Manager Service Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36722 (Active Directory Domain Services Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36721 (Windows Error Reporting Service Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36720 (Windows Mixed Reality Developer Tools Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36718 (Microsoft Virtual Trusted Platform Module Remote Code Execution Vulner ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36717 (Windows Virtual Trusted Platform Module Denial of Service Vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36713 (Windows Common Log File System Driver Information Disclosure Vulnerabi ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36712 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36711 (Windows Runtime C++ Template Library Elevation of Privilege Vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36710 (Windows Media Foundation Core Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36709 (Microsoft AllJoyn API Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36707 (Windows Deployment Services Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36706 (Windows Deployment Services Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36704 (Windows Setup Files Cleanup Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36703 (DHCP Server Service Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36702 (Microsoft DirectMusic Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36701 (Microsoft Resilient File System (ReFS) Elevation of Privilege Vulnerab ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36698 (Windows Kernel Security Feature Bypass Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36697 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36637 (An improper neutralization of input during web page generation vulnera ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36606 (Microsoft Message Queuing Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36605 (Windows Named Pipe Filesystem Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36603 (Windows TCP/IP Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36602 (Windows TCP/IP Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36598 (Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36596 (Remote Procedure Call Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36594 (Windows Graphics Component Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36593 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36592 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36591 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36590 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36589 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36585 (Active Template Library Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36584 (Windows Mark of the Web Security Feature Bypass Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36583 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36582 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36581 (Microsoft Message Queuing Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36579 (Microsoft Message Queuing Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36578 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36577 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36576 (Windows Kernel Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36575 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36574 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36573 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36572 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36571 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36570 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36569 (Microsoft Office Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36568 (Microsoft Office Click-To-Run Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36567 (Windows Deployment Services Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36566 (Microsoft Common Data Model SDK Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36565 (Microsoft Office Graphics Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36564 (Windows Search Security Feature Bypass Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36563 (Microsoft WordPad Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36561 (Azure DevOps Server Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36557 (PrintHTML API Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36556 (An incorrect authorization vulnerability [CWE-863] in FortiMail webmai ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36555 (An improper neutralization of script-related html tags in a web page ( ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36550 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36549 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36548 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36547 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-36478 (Eclipse Jetty provides a web server and servlet container. In versions ...)
 	TODO: check
 CVE-2023-36438 (Windows TCP/IP Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36436 (Windows MSHTML Platform Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36435 (Microsoft QUIC Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36434 (Windows IIS Server Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36433 (Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36431 (Microsoft Message Queuing Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36429 (Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36420 (Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerabili ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36419 (Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36418 (Azure RTOS GUIX Studio Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36417 (Microsoft SQL ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36416 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36415 (Azure Identity SDK Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36414 (Azure Identity SDK Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-36380 (A vulnerability has been identified in CP-8031 MASTER MODULE (All vers ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-35796 (A vulnerability has been identified in SINEMA Server V14 (All versions ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2023-35349 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2023-34993 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34992 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34989 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34988 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34987 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34986 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-34985 (A improper neutralization of special elements used in an os command (' ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-33301 (An improper access control vulnerability in Fortinet FortiOS 7.2.0 - 7 ...)
-	TODO: check
+	NOT-FOR-US: Fortinet
 CVE-2023-42670 [Samba AD DC Busy RPC multiple listener DoS]
 	- samba 2:4.19.1+dfsg-1
 	[bullseye] - samba <ignored> (Domain controller functionality is EOLed, see DSA DSA-5477-1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231010/7e855d5e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list