Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1a4ec6e4 by Salvatore Bonaccorso at 2023-08-10T10:23:48+02:00
Process more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3,11 +3,11 @@ CVE-2023-4277 (The Realia plugin for WordPress is vulnerable 
to Cross-Site Reque
 CVE-2023-4276 (The Absolute Privacy plugin for WordPress is vulnerable to 
Cross-Site  ...)
        NOT-FOR-US: Absolute Privacy plugin for WordPress
 CVE-2023-36673 (An issue was discovered in Avira Phantom VPN through 2.23.1 
for macOS. ...)
-       TODO: check
+       NOT-FOR-US: Avira Phantom VPN
 CVE-2023-36672 (An issue was discovered in the Clario VPN client through 
5.9.1.1662 fo ...)
-       TODO: check
+       NOT-FOR-US: Clario VPN client
 CVE-2023-36671 (An issue was discovered in the Clario VPN client through 
5.9.1.1662 fo ...)
-       TODO: check
+       NOT-FOR-US: Clario VPN client
 CVE-2023-35838 (The WireGuard client 0.5.3 on Windows insecurely configures 
the operat ...)
        TODO: check
 CVE-2023-33242 (Crypto wallets implementing the Lindell17 TSS protocol might 
allow an  ...)
@@ -109,9 +109,9 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 
1.3.0 allows remote atta
 CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table 
accounting error ...)
        TODO: check
 CVE-2023-33469 (In instances where the screen is visible and remote mouse 
connection i ...)
-       TODO: check
+       NOT-FOR-US: KramerAV
 CVE-2023-33468 (KramerAV VIA Connect (2) and VIA Go (2) devices with a version 
prior t ...)
-       TODO: check
+       NOT-FOR-US: KramerAV
 CVE-2023-32782 (An issue was discovered in Paessler PRTG Network Monitor 
23.2.83.1760. ...)
        NOT-FOR-US: PRTG Network Monitor
 CVE-2023-32781 (An issue was discovered in Paessler PRTG Network Monitor 
23.2.83.1760. ...)
@@ -125,55 +125,55 @@ CVE-2023-31449 (An issue was discovered in Paessler PRTG 
Network Monitor 23.2.83
 CVE-2023-31448 (An issue was discovered in Paessler PRTG Network Monitor 
23.2.83.1760  ...)
        NOT-FOR-US: PRTG Network Monitor
 CVE-2022-48604 (A SQL injection vulnerability exists in the \u201clogging 
export\u201d ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48603 (A SQL injection vulnerability exists in the \u201cmessage 
viewer ifram ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48602 (A SQL injection vulnerability exists in the \u201cmessage 
viewer print ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48601 (A SQL injection vulnerability exists in the \u201cnetwork 
print report ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48600 (A SQL injection vulnerability exists in the \u201cnotes 
view\u201d fea ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48599 (A SQL injection vulnerability exists in the \u201creporter 
events type ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48598 (A SQL injection vulnerability exists in the \u201creporter 
events type ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48597 (A SQL injection vulnerability exists in the \u201cticket event 
report\ ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48596 (A SQL injection vulnerability exists in the \u201cticket queue 
watcher ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48595 (A SQL injection vulnerability exists in the \u201cticket 
template watc ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48594 (A SQL injection vulnerability exists in the \u201cticket 
watchers emai ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48593 (A SQL injection vulnerability exists in the \u201ctopology 
data servic ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48592 (A SQL injection vulnerability exists in the vendor_country 
parameter o ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48591 (A SQL injection vulnerability exists in the vendor_state 
parameter of  ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48590 (A SQL injection vulnerability exists in the \u201cadmin 
dynamic app mi ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48589 (A SQL injection vulnerability exists in the \u201creporting 
job editor ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48588 (A SQL injection vulnerability exists in the \u201cschedule 
editor deco ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48587 (A SQL injection vulnerability exists in the \u201cschedule 
editor\u201 ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48586 (A SQL injection vulnerability exists in the \u201cjson 
walker\u201d fe ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48585 (A SQL injection vulnerability exists in the \u201cadmin brand 
portal\u ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48584 (A command injection vulnerability exists in the download and 
convert r ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48583 (A command injection vulnerability exists in the dashboard 
scheduler fe ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48582 (A command injection vulnerability exists in the ticket report 
generate ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48581 (A command injection vulnerability exists in the \u201cdash 
export\u201 ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2022-48580 (A command injection vulnerability exists in the ARP ping 
device tool f ...)
-       TODO: check
+       NOT-FOR-US: ScienceLogic SL1
 CVE-2023-4243 (The FULL - Customer plugin for WordPress is vulnerable to 
Arbitrary Fi ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-4242 (The FULL - Customer plugin for WordPress is vulnerable to 
Information  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a4ec6e4b2b2226bae2c5d2d8fb8870e3b60ee23
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to