Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d4139b9c by Salvatore Bonaccorso at 2023-07-11T22:35:37+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -106,85 +106,85 @@ CVE-2023-36386 (A vulnerability has been identified in 
RUGGEDCOM ROX MX5000 (All
 CVE-2023-36293 (SQL injection vulnerability in wmanager v.1.0.7 and before 
allows a re ...)
        TODO: check
 CVE-2023-36167 (An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to 
execute a ...)
-       TODO: check
+       NOT-FOR-US: AVG Anti-Spyware
 CVE-2023-36164 (An issue in MiniTool Partition Wizard ShadowMaker v.12.7 
allows an att ...)
        TODO: check
 CVE-2023-36163 (Cross Site Scripting vulnerability in IP-DOT BuildaGate 
v.BuildaGate5  ...)
        TODO: check
 CVE-2023-35921 (A vulnerability has been identified in SIMATIC MV540 H (All 
versions < ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-35920 (A vulnerability has been identified in SIMATIC MV540 H (All 
versions < ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-35913 (Cross-Site Request Forgery (CSRF) vulnerability in OOPSpam 
OOPSpam Ant ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-35780 (Cross-Site Request Forgery (CSRF) vulnerability in Andy Whalen 
Galleri ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-35778 (Cross-Site Request Forgery (CSRF) vulnerability in Neha Goel 
Recent Po ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-35773 (Cross-Site Request Forgery (CSRF) vulnerability in Danny 
Hearnah - Chu ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-35374 (Paint 3D Remote Code Execution Vulnerability)
        TODO: check
 CVE-2023-35373 (Mono Authenticode Validation Spoofing Vulnerability)
        TODO: check
 CVE-2023-35367 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35366 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35365 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35364 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35363 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35362 (Windows Clip Service Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35361 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35360 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35358 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35357 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35356 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35353 (Connected User Experiences and Telemetry Elevation of 
Privilege Vulner ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35352 (Windows Remote Desktop Security Feature Bypass Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35351 (Windows Active Directory Certificate Services (AD CS) Remote 
Code Exec ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35350 (Windows Active Directory Certificate Services (AD CS) Remote 
Code Exec ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35348 (Active Directory Federation Service Security Feature Bypass 
Vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35347 (Microsoft Install Service Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35346 (Windows DNS Server Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35345 (Windows DNS Server Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35344 (Windows DNS Server Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35343 (Windows Geolocation Service Remote Code Execution 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35342 (Windows Image Acquisition Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35341 (Microsoft DirectMusic Information Disclosure Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35340 (Windows CNG Key Isolation Service Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35339 (Windows CryptoAPI  Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35338 (Windows Peer Name Resolution Protocol Denial of Service 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35337 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35336 (Windows MSHTML Platform Security Feature Bypass Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35335 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-35333 (MediaWiki PandocUpload Extension Remote Code Execution 
Vulnerability)
        TODO: check
 CVE-2023-35332 (Windows Remote Desktop Protocol Security Feature Bypass)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4139b9cc94e1aea0f77dc9cd9fc5be6584d948c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4139b9cc94e1aea0f77dc9cd9fc5be6584d948c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to