Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
1a4ec6e4 by Salvatore Bonaccorso at 2023-08-10T10:23:48+02:00
Process more NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3,11 +3,11 @@ CVE-2023-4277 (The Realia plugin for WordPress is vulnerable
to Cross-Site Reque
CVE-2023-4276 (The Absolute Privacy plugin for WordPress is vulnerable to
Cross-Site ...)
NOT-FOR-US: Absolute Privacy plugin for WordPress
CVE-2023-36673 (An issue was discovered in Avira Phantom VPN through 2.23.1
for macOS. ...)
- TODO: check
+ NOT-FOR-US: Avira Phantom VPN
CVE-2023-36672 (An issue was discovered in the Clario VPN client through
5.9.1.1662 fo ...)
- TODO: check
+ NOT-FOR-US: Clario VPN client
CVE-2023-36671 (An issue was discovered in the Clario VPN client through
5.9.1.1662 fo ...)
- TODO: check
+ NOT-FOR-US: Clario VPN client
CVE-2023-35838 (The WireGuard client 0.5.3 on Windows insecurely configures
the operat ...)
TODO: check
CVE-2023-33242 (Crypto wallets implementing the Lindell17 TSS protocol might
allow an ...)
@@ -109,9 +109,9 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS
1.3.0 allows remote atta
CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table
accounting error ...)
TODO: check
CVE-2023-33469 (In instances where the screen is visible and remote mouse
connection i ...)
- TODO: check
+ NOT-FOR-US: KramerAV
CVE-2023-33468 (KramerAV VIA Connect (2) and VIA Go (2) devices with a version
prior t ...)
- TODO: check
+ NOT-FOR-US: KramerAV
CVE-2023-32782 (An issue was discovered in Paessler PRTG Network Monitor
23.2.83.1760. ...)
NOT-FOR-US: PRTG Network Monitor
CVE-2023-32781 (An issue was discovered in Paessler PRTG Network Monitor
23.2.83.1760. ...)
@@ -125,55 +125,55 @@ CVE-2023-31449 (An issue was discovered in Paessler PRTG
Network Monitor 23.2.83
CVE-2023-31448 (An issue was discovered in Paessler PRTG Network Monitor
23.2.83.1760 ...)
NOT-FOR-US: PRTG Network Monitor
CVE-2022-48604 (A SQL injection vulnerability exists in the \u201clogging
export\u201d ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48603 (A SQL injection vulnerability exists in the \u201cmessage
viewer ifram ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48602 (A SQL injection vulnerability exists in the \u201cmessage
viewer print ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48601 (A SQL injection vulnerability exists in the \u201cnetwork
print report ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48600 (A SQL injection vulnerability exists in the \u201cnotes
view\u201d fea ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48599 (A SQL injection vulnerability exists in the \u201creporter
events type ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48598 (A SQL injection vulnerability exists in the \u201creporter
events type ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48597 (A SQL injection vulnerability exists in the \u201cticket event
report\ ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48596 (A SQL injection vulnerability exists in the \u201cticket queue
watcher ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48595 (A SQL injection vulnerability exists in the \u201cticket
template watc ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48594 (A SQL injection vulnerability exists in the \u201cticket
watchers emai ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48593 (A SQL injection vulnerability exists in the \u201ctopology
data servic ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48592 (A SQL injection vulnerability exists in the vendor_country
parameter o ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48591 (A SQL injection vulnerability exists in the vendor_state
parameter of ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48590 (A SQL injection vulnerability exists in the \u201cadmin
dynamic app mi ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48589 (A SQL injection vulnerability exists in the \u201creporting
job editor ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48588 (A SQL injection vulnerability exists in the \u201cschedule
editor deco ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48587 (A SQL injection vulnerability exists in the \u201cschedule
editor\u201 ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48586 (A SQL injection vulnerability exists in the \u201cjson
walker\u201d fe ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48585 (A SQL injection vulnerability exists in the \u201cadmin brand
portal\u ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48584 (A command injection vulnerability exists in the download and
convert r ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48583 (A command injection vulnerability exists in the dashboard
scheduler fe ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48582 (A command injection vulnerability exists in the ticket report
generate ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48581 (A command injection vulnerability exists in the \u201cdash
export\u201 ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2022-48580 (A command injection vulnerability exists in the ARP ping
device tool f ...)
- TODO: check
+ NOT-FOR-US: ScienceLogic SL1
CVE-2023-4243 (The FULL - Customer plugin for WordPress is vulnerable to
Arbitrary Fi ...)
NOT-FOR-US: WordPress plugin
CVE-2023-4242 (The FULL - Customer plugin for WordPress is vulnerable to
Information ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits