Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b9ed0dc9 by Moritz Muehlenhoff at 2023-08-16T16:00:36+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,39 @@
+CVE-2023-4302
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-4301
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40351
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40350
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40349
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40348
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40347
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40346
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40345
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40344
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40343
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40342
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40341
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40340
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40339
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40338
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40337
+       NOT-FOR-US: Jenkins plugin
+CVE-2023-40336
+       NOT-FOR-US: Jenkins plugin
 CVE-2023-4374 (The WP Remote Users Sync plugin for WordPress is vulnerable to 
unautho ...)
        NOT-FOR-US: WP Remote Users Sync plugin for WordPress
 CVE-2023-3958 (The WP Remote Users Sync plugin for WordPress is vulnerable to 
Server  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b9ed0dc95a5e600e8da5c24db2e8c3a71124d1b7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b9ed0dc95a5e600e8da5c24db2e8c3a71124d1b7
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to