Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
34f1b9e3 by Moritz Muehlenhoff at 2023-07-17T10:37:59+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,29 +1,29 @@
 CVE-2023-3700 (Improper Access Control in GitHub repository 
alextselegidis/easyappoin ...)
-       TODO: check
+       NOT-FOR-US: easyappointments
 CVE-2023-3696 (Prototype Pollution in GitHub repository automattic/mongoose 
prior to  ...)
-       TODO: check
+       NOT-FOR-US: Mongoose
 CVE-2023-3695 (A vulnerability classified as critical has been found in 
Campcodes Bea ...)
-       TODO: check
+       NOT-FOR-US: Campcodes Beauty Salon Management System
 CVE-2023-3694 (A vulnerability, which was classified as critical, has been 
found in S ...)
-       TODO: check
+       NOT-FOR-US: SourceCodester
 CVE-2023-3693 (A vulnerability classified as critical was found in 
SourceCodester Lif ...)
-       TODO: check
+       NOT-FOR-US: SourceCodester
 CVE-2023-3496
        REJECTED
 CVE-2023-35901 (IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 
23.0.0 thro ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2023-35012 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect 
Server) 11.5 ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2023-33857 (IBM InfoSphere Information Server 11.7 could allow a remote 
attacker t ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2023-2760 (An SQL injection vulnerability exists in TapHome core 
HandleMessageUpd ...)
-       TODO: check
+       NOT-FOR-US: TapHome
 CVE-2023-2759 (A hidden API exists in TapHome's core platform before version 
2023.2 t ...)
-       TODO: check
+       NOT-FOR-US: TapHome
 CVE-2022-4952 (A vulnerability has been found in OmniSharp 
csharp-language-server-pro ...)
-       TODO: check
+       NOT-FOR-US: OmniSharp
 CVE-2023-3691 (A vulnerability, which was classified as problematic, was found 
in lay ...)
-       TODO: check
+       NOT-FOR-US: layui
 CVE-2023-3690 (A vulnerability, which was classified as critical, has been 
found in B ...)
        NOT-FOR-US: Bylancer QuickOrder
 CVE-2023-3689 (A vulnerability classified as critical was found in Bylancer 
QuickQR 6 ...)
@@ -35,7 +35,7 @@ CVE-2023-3687 (A vulnerability was found in Bylancer 
QuickVCard 2.1. It has been
 CVE-2023-3686 (A vulnerability was found in Bylancer QuickAI OpenAI 3.8.1. It 
has bee ...)
        NOT-FOR-US: Bylancer QuickAI
 CVE-2023-3685 (A vulnerability was found in Nesote Inout Search Engine AI 
Edition 1.1 ...)
-       TODO: check
+       NOT-FOR-US: Nesote Inout Search Engine AI Edition
 CVE-2023-3684 (A vulnerability was found in LivelyWorks Articart 2.0.1 and 
classified ...)
        NOT-FOR-US: LivelyWorks Articart
 CVE-2023-3674
@@ -8919,9 +8919,9 @@ CVE-2023-30991
 CVE-2023-30990 (IBM i 7.2, 7.3, 7.4, and 7.5 could allow a remote attacker to 
execute  ...)
        NOT-FOR-US: IBM
 CVE-2023-30989 (IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 contains a 
local pr ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2023-30988 (The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for 
i conta ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2023-30987
        RESERVED
 CVE-2023-30986 (A vulnerability has been identified in Solid Edge SE2023 (All 
versions ...)
@@ -22486,7 +22486,7 @@ CVE-2023-26514
 CVE-2023-26513 (Excessive Iteration vulnerability in Apache Software 
Foundation Apache ...)
        NOT-FOR-US: Apache Sling
 CVE-2023-26512 (CWE-502 Deserialization of Untrusted Dataat 
therabbitmq-connector plug ...)
-       TODO: check
+       NOT-FOR-US: Apache EventMesh
 CVE-2023-1025 (The Simple File List WordPress plugin before 6.0.10 does not 
sanitise  ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-1024 (The WP Meta SEO plugin for WordPress is vulnerable to 
unauthorized sit ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34f1b9e3f8b4746ebc927f990aad8cf841eb0628

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34f1b9e3f8b4746ebc927f990aad8cf841eb0628
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to