Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a4541d6f by Moritz Muehlenhoff at 2023-10-10T23:17:56+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,409 +1,409 @@
 CVE-2023-5499 (Information exposure vulnerability in Shenzhen Reachfar v28, 
the explo ...)
-       TODO: check
+       NOT-FOR-US: Shenzhen Reachfar
 CVE-2023-5498 (Cross-Site Request Forgery (CSRF) in GitHub repository 
chiefonboarding ...)
-       TODO: check
+       NOT-FOR-US: chiefonboarding
 CVE-2023-5497 (A vulnerability classified as critical has been found in Tongda 
OA 201 ...)
-       TODO: check
+       NOT-FOR-US: Tongda OA
 CVE-2023-5496 (A vulnerability was found in Translator PoqDev Add-On 1.0.11 on 
Firefo ...)
-       TODO: check
+       NOT-FOR-US: Translator PoqDev
 CVE-2023-5495 (A vulnerability was found in QDocs Smart School 6.4.1. It has 
been cla ...)
-       TODO: check
+       NOT-FOR-US: QDocs Smart School
 CVE-2023-5494 (A vulnerability was found in Beijing Baichuo Smart S45F 
Multi-Service  ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5493 (A vulnerability has been found in Beijing Baichuo Smart S45F 
Multi-Ser ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5492 (A vulnerability, which was classified as critical, was found in 
Beijin ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5491 (A vulnerability, which was classified as critical, has been 
found in B ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5490 (A vulnerability classified as critical was found in Beijing 
Baichuo Sm ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5489 (A vulnerability classified as critical has been found in 
Beijing Baich ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5488 (A vulnerability was found in Beijing Baichuo Smart S45F 
Multi-Service  ...)
-       TODO: check
+       NOT-FOR-US: Beijing Baichuo Smart
 CVE-2023-5450 (An insufficient verification of data vulnerability exists in 
BIG-IP Ed ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-4966 (Sensitive information disclosurein NetScaler ADC and NetScaler 
Gateway ...)
-       TODO: check
+       NOT-FOR-US: Citrix
 CVE-2023-4837 (SmodBIP is vulnerable to Cross-Site Request Forgery, that could 
be use ...)
-       TODO: check
+       NOT-FOR-US: SmodBIPx
 CVE-2023-4309 (Election Services Co. (ESC) Internet Election Service is 
vulnerable to ...)
-       TODO: check
+       NOT-FOR-US: Election Services Co. (ESC) Internet Election Service
 CVE-2023-45648 (Improper Input Validation vulnerability in Apache 
Tomcat.Tomcatfrom 11 ...)
        TODO: check
 CVE-2023-45601 (A vulnerability has been identified in Parasolid V35.0 (All 
versions < ...)
-       TODO: check
+       NOT-FOR-US: Parasolid
 CVE-2023-45226 (The BIG-IP SPK TMM (Traffic Management Module) 
f5-debug-sidecar and f5 ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-45219 (Exposure of Sensitive Information vulnerability exist in an 
undisclose ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-45205 (A vulnerability has been identified in SICAM PAS/PQS (All 
versions >=  ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-45204 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-45129 (Synapse is an open-source Matrix homeserver written and 
maintained by  ...)
        TODO: check
 CVE-2023-44996 (Cross-Site Request Forgery (CSRF) vulnerability in Naresh 
Parmar Post  ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44995 (Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor 
WooCommer ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44994 (Cross-Site Request Forgery (CSRF) vulnerability in Bainternet 
ShortCod ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44763 (Concrete CMS v9.2.1 is affected by Arbitrary File Upload 
vulnerability ...)
-       TODO: check
+       NOT-FOR-US: Concrete CMS
 CVE-2023-44476 (Cross-Site Request Forgery (CSRF) vulnerability in Andres 
Felipe Perea ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44475 (Cross-Site Request Forgery (CSRF) vulnerability in Michael 
Simpson Add ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44471 (Cross-Site Request Forgery (CSRF) vulnerability in Bernhard 
Kau Backen ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44470 (Cross-Site Request Forgery (CSRF) vulnerability in Kvvaradha 
Kv TinyMC ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44399 (ZITADEL provides identity infrastructure. In versions 2.37.2 
and prior ...)
        TODO: check
 CVE-2023-44315 (A vulnerability has been identified in SINEC NMS (All versions 
< V2.0) ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-44261 (Cross-Site Request Forgery (CSRF) vulnerability in Dinesh 
Karki Block  ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44259 (Cross-Site Request Forgery (CSRF) vulnerability in Mediavine 
Mediavine ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44257 (Cross-Site Request Forgery (CSRF) vulnerability in Hometory 
Mang Board ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44249 (An authorization bypass through user-controlled key[CWE-639] 
vulnerabi ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-44241 (Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap 
Landing P ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-44087 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44086 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44085 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44084 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44083 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44082 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-44081 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V22 ...)
-       TODO: check
+       NOT-FOR-US: Tecnomatix Plant Simulation
 CVE-2023-43896 (A buffer overflow in Macrium Reflect 8.1.7544 and below allows 
attacke ...)
-       TODO: check
+       NOT-FOR-US: Macrium Reflect
 CVE-2023-43746 (When running in Appliance mode, an authenticated user assigned 
the Adm ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-43625 (A vulnerability has been identified in Simcenter Amesim (All 
versions  ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-43623 (A vulnerability has been identified in Mendix Forgot Password 
(Mendix  ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-43611 (The BIG-IP Edge Client Installer on macOS does not follow best 
practic ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-43485 (When TACACS+ audit forwarding is configured on BIG-IP or 
BIG-IQ system ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-42796 (A vulnerability has been identified in CP-8031 MASTER MODULE 
(All vers ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-42795 (Incomplete Cleanup vulnerability in Apache Tomcat.When 
recycling vario ...)
        TODO: check
 CVE-2023-42794 (Incomplete Cleanup vulnerability in Apache Tomcat.  The 
internal fork  ...)
        TODO: check
 CVE-2023-42788 (An improper neutralization of special elements used in an os 
command ( ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-42787 (A client-side enforcement of server-side security [CWE-602] 
vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-42782 (A insufficient verification of data authenticity vulnerability 
[CWE-34 ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-42768 (When a non-admin user has been assigned an administrator role 
via an i ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-41964 (The BIG-IP and BIG-IQ systems do not encrypt some sensitive 
informatio ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-41876 (Cross-Site Request Forgery (CSRF) vulnerability in Hardik 
Kalathiya WP ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41858 (Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane 
Order De ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41854 (Cross-Site Request Forgery (CSRF) vulnerability in Softaculous 
Ltd. Wp ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41853 (Cross-Site Request Forgery (CSRF) vulnerability in WP iCal 
Availabilit ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41852 (Cross-Site Request Forgery (CSRF) vulnerability in MailMunch 
MailMunch ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41851 (Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares 
WP Custo ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41850 (Cross-Site Request Forgery (CSRF) vulnerability in Morris 
Bryant, Rube ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2023-41841 (An improper authorization vulnerability in Fortinet FortiOS 
7.0.0 - 7. ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-41838 (An improper neutralization of special elements used in an os 
command ( ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-41774 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41773 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41772 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41771 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41770 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41769 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41768 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41767 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41766 (Windows Client Server Run-time Subsystem (CSRSS) Elevation of 
Privileg ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41765 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41763 (Skype for Business Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-41679 (An improper access control vulnerability [CWE-284] in 
FortiManager man ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-41675 (A use after free vulnerability [CWE-416] in FortiOS version 
7.2.0 thro ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-41373 (A directory traversal vulnerability exists in the BIG-IP 
Configuration ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-41253 (When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services 
License, an ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-41085 (When IPSec is configured on a Virtual Server, undisclosed 
traffic can  ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-40718 (A interpretation conflict in Fortinet IPS Engine versions 
7.321, 7.166 ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-40542 (When TCP Verified Accept is enabled on a TCP profile that is 
configure ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-40537 (An authenticated user's session cookie may remain valid for a 
limited  ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-40534 (When a client-side HTTP/2 profile and the HTTP MRF Router 
option are e ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-39447 (When BIG-IP APM Guided Configurations are configured, 
undisclosed sens ...)
-       TODO: check
+       NOT-FOR-US: F5
 CVE-2023-38640 (A vulnerability has been identified in SICAM PAS/PQS (All 
versions >=  ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-38171 (Microsoft QUIC Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-38166 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-38159 (Windows Graphics Component Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-37939 (An exposure of sensitive information to an unauthorized actor 
vulnerab ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-37935 (A use of GET request method with sensitive query strings 
vulnerability ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-37195 (A vulnerability has been identified in SIMATIC CP 1604 (All 
versions), ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-37194 (A vulnerability has been identified in SIMATIC CP 1604 (All 
versions), ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-36902 (Windows Runtime Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36790 (Windows RDP Encoder Mirror Driver Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36789 (Skype for Business Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36786 (Skype for Business Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36785 (Microsoft ODBC Driver for SQL Server Remote Code Execution 
Vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36780 (Skype for Business Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36778 (Microsoft Exchange Server Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36776 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36743 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36737 (Azure Network Watcher VM Agent Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36732 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36731 (Win32k Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36730 (Microsoft ODBC Driver for SQL Server Remote Code Execution 
Vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36729 (Named Pipe File System Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36728 (Microsoft SQL Server Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36726 (Windows Internet Key Exchange (IKE) Extension Elevation of 
Privilege   ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36725 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36724 (Windows Power Management Service Information Disclosure 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36723 (Windows Container Manager Service Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36722 (Active Directory Domain Services Information Disclosure 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36721 (Windows Error Reporting Service Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36720 (Windows Mixed Reality Developer Tools Denial of Service 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36718 (Microsoft Virtual Trusted Platform Module Remote Code 
Execution Vulner ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36717 (Windows Virtual Trusted Platform Module Denial of Service 
Vulnerabilit ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36713 (Windows Common Log File System Driver Information Disclosure 
Vulnerabi ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36712 (Windows Kernel Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36711 (Windows Runtime C++ Template Library Elevation of Privilege 
Vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36710 (Windows Media Foundation Core Remote Code Execution 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36709 (Microsoft AllJoyn API Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36707 (Windows Deployment Services Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36706 (Windows Deployment Services Information Disclosure 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36704 (Windows Setup Files Cleanup Remote Code Execution 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36703 (DHCP Server Service Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36702 (Microsoft DirectMusic Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36701 (Microsoft Resilient File System (ReFS) Elevation of Privilege 
Vulnerab ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36698 (Windows Kernel Security Feature Bypass Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36697 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36637 (An improper neutralization of input during web page generation 
vulnera ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36606 (Microsoft Message Queuing Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36605 (Windows Named Pipe Filesystem Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36603 (Windows TCP/IP Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36602 (Windows TCP/IP Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36598 (Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36596 (Remote Procedure Call Information Disclosure Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36594 (Windows Graphics Component Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36593 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36592 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36591 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36590 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36589 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36585 (Active Template Library Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36584 (Windows Mark of the Web Security Feature Bypass Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36583 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36582 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36581 (Microsoft Message Queuing Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36579 (Microsoft Message Queuing Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36578 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36577 (Microsoft WDAC OLE DB provider for SQL Server Remote Code 
Execution Vu ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36576 (Windows Kernel Information Disclosure Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36575 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36574 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36573 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36572 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36571 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36570 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36569 (Microsoft Office Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36568 (Microsoft Office Click-To-Run Elevation of Privilege 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36567 (Windows Deployment Services Information Disclosure 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36566 (Microsoft Common Data Model SDK Denial of Service 
Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36565 (Microsoft Office Graphics Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36564 (Windows Search Security Feature Bypass Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36563 (Microsoft WordPad Information Disclosure Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36561 (Azure DevOps Server Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36557 (PrintHTML API Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36556 (An incorrect authorization vulnerability [CWE-863] in 
FortiMail webmai ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36555 (An improper neutralization of script-related html tags in a 
web page ( ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36550 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36549 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36548 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36547 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-36478 (Eclipse Jetty provides a web server and servlet container. In 
versions ...)
        TODO: check
 CVE-2023-36438 (Windows TCP/IP Information Disclosure Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36436 (Windows MSHTML Platform Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36435 (Microsoft QUIC Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36434 (Windows IIS Server Elevation of Privilege Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36433 (Microsoft Dynamics 365 (On-Premises) Information Disclosure 
Vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36431 (Microsoft Message Queuing Denial of Service Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36429 (Microsoft Dynamics 365 (On-Premises) Information Disclosure 
Vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36420 (Microsoft ODBC Driver for SQL Server Remote Code Execution 
Vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36419 (Azure HDInsight Apache Oozie Workflow Scheduler Elevation of 
Privilege ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36418 (Azure RTOS GUIX Studio Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36417 (Microsoft SQL ODBC Driver Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36416 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36415 (Azure Identity SDK Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36414 (Azure Identity SDK Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-36380 (A vulnerability has been identified in CP-8031 MASTER MODULE 
(All vers ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-35796 (A vulnerability has been identified in SINEMA Server V14 (All 
versions ...)
-       TODO: check
+       NOT-FOR-US: Siemens
 CVE-2023-35349 (Microsoft Message Queuing Remote Code Execution Vulnerability)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2023-34993 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34992 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34989 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34988 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34987 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34986 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-34985 (A improper neutralization of special elements used in an os 
command (' ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-33301 (An improper access control vulnerability in Fortinet FortiOS 
7.2.0 - 7 ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-42670 [Samba AD DC Busy RPC multiple listener DoS]
        - samba 2:4.19.1+dfsg-1
        [bullseye] - samba <ignored> (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to