Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
a4541d6f by Moritz Muehlenhoff at 2023-10-10T23:17:56+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,409 +1,409 @@
CVE-2023-5499 (Information exposure vulnerability in Shenzhen Reachfar v28,
the explo ...)
- TODO: check
+ NOT-FOR-US: Shenzhen Reachfar
CVE-2023-5498 (Cross-Site Request Forgery (CSRF) in GitHub repository
chiefonboarding ...)
- TODO: check
+ NOT-FOR-US: chiefonboarding
CVE-2023-5497 (A vulnerability classified as critical has been found in Tongda
OA 201 ...)
- TODO: check
+ NOT-FOR-US: Tongda OA
CVE-2023-5496 (A vulnerability was found in Translator PoqDev Add-On 1.0.11 on
Firefo ...)
- TODO: check
+ NOT-FOR-US: Translator PoqDev
CVE-2023-5495 (A vulnerability was found in QDocs Smart School 6.4.1. It has
been cla ...)
- TODO: check
+ NOT-FOR-US: QDocs Smart School
CVE-2023-5494 (A vulnerability was found in Beijing Baichuo Smart S45F
Multi-Service ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5493 (A vulnerability has been found in Beijing Baichuo Smart S45F
Multi-Ser ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5492 (A vulnerability, which was classified as critical, was found in
Beijin ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5491 (A vulnerability, which was classified as critical, has been
found in B ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5490 (A vulnerability classified as critical was found in Beijing
Baichuo Sm ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5489 (A vulnerability classified as critical has been found in
Beijing Baich ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5488 (A vulnerability was found in Beijing Baichuo Smart S45F
Multi-Service ...)
- TODO: check
+ NOT-FOR-US: Beijing Baichuo Smart
CVE-2023-5450 (An insufficient verification of data vulnerability exists in
BIG-IP Ed ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-4966 (Sensitive information disclosurein NetScaler ADC and NetScaler
Gateway ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2023-4837 (SmodBIP is vulnerable to Cross-Site Request Forgery, that could
be use ...)
- TODO: check
+ NOT-FOR-US: SmodBIPx
CVE-2023-4309 (Election Services Co. (ESC) Internet Election Service is
vulnerable to ...)
- TODO: check
+ NOT-FOR-US: Election Services Co. (ESC) Internet Election Service
CVE-2023-45648 (Improper Input Validation vulnerability in Apache
Tomcat.Tomcatfrom 11 ...)
TODO: check
CVE-2023-45601 (A vulnerability has been identified in Parasolid V35.0 (All
versions < ...)
- TODO: check
+ NOT-FOR-US: Parasolid
CVE-2023-45226 (The BIG-IP SPK TMM (Traffic Management Module)
f5-debug-sidecar and f5 ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-45219 (Exposure of Sensitive Information vulnerability exist in an
undisclose ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-45205 (A vulnerability has been identified in SICAM PAS/PQS (All
versions >= ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-45204 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-45129 (Synapse is an open-source Matrix homeserver written and
maintained by ...)
TODO: check
CVE-2023-44996 (Cross-Site Request Forgery (CSRF) vulnerability in Naresh
Parmar Post ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44995 (Cross-Site Request Forgery (CSRF) vulnerability in WP Doctor
WooCommer ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44994 (Cross-Site Request Forgery (CSRF) vulnerability in Bainternet
ShortCod ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44763 (Concrete CMS v9.2.1 is affected by Arbitrary File Upload
vulnerability ...)
- TODO: check
+ NOT-FOR-US: Concrete CMS
CVE-2023-44476 (Cross-Site Request Forgery (CSRF) vulnerability in Andres
Felipe Perea ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44475 (Cross-Site Request Forgery (CSRF) vulnerability in Michael
Simpson Add ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44471 (Cross-Site Request Forgery (CSRF) vulnerability in Bernhard
Kau Backen ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44470 (Cross-Site Request Forgery (CSRF) vulnerability in Kvvaradha
Kv TinyMC ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44399 (ZITADEL provides identity infrastructure. In versions 2.37.2
and prior ...)
TODO: check
CVE-2023-44315 (A vulnerability has been identified in SINEC NMS (All versions
< V2.0) ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-44261 (Cross-Site Request Forgery (CSRF) vulnerability in Dinesh
Karki Block ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44259 (Cross-Site Request Forgery (CSRF) vulnerability in Mediavine
Mediavine ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44257 (Cross-Site Request Forgery (CSRF) vulnerability in Hometory
Mang Board ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44249 (An authorization bypass through user-controlled key[CWE-639]
vulnerabi ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-44241 (Cross-Site Request Forgery (CSRF) vulnerability in Keap Keap
Landing P ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-44087 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44086 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44085 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44084 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44083 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44082 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-44081 (A vulnerability has been identified in Tecnomatix Plant
Simulation V22 ...)
- TODO: check
+ NOT-FOR-US: Tecnomatix Plant Simulation
CVE-2023-43896 (A buffer overflow in Macrium Reflect 8.1.7544 and below allows
attacke ...)
- TODO: check
+ NOT-FOR-US: Macrium Reflect
CVE-2023-43746 (When running in Appliance mode, an authenticated user assigned
the Adm ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-43625 (A vulnerability has been identified in Simcenter Amesim (All
versions ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-43623 (A vulnerability has been identified in Mendix Forgot Password
(Mendix ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-43611 (The BIG-IP Edge Client Installer on macOS does not follow best
practic ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-43485 (When TACACS+ audit forwarding is configured on BIG-IP or
BIG-IQ system ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-42796 (A vulnerability has been identified in CP-8031 MASTER MODULE
(All vers ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-42795 (Incomplete Cleanup vulnerability in Apache Tomcat.When
recycling vario ...)
TODO: check
CVE-2023-42794 (Incomplete Cleanup vulnerability in Apache Tomcat. The
internal fork ...)
TODO: check
CVE-2023-42788 (An improper neutralization of special elements used in an os
command ( ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-42787 (A client-side enforcement of server-side security [CWE-602]
vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-42782 (A insufficient verification of data authenticity vulnerability
[CWE-34 ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-42768 (When a non-admin user has been assigned an administrator role
via an i ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-41964 (The BIG-IP and BIG-IQ systems do not encrypt some sensitive
informatio ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-41876 (Cross-Site Request Forgery (CSRF) vulnerability in Hardik
Kalathiya WP ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41858 (Cross-Site Request Forgery (CSRF) vulnerability in Ashok Rane
Order De ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41854 (Cross-Site Request Forgery (CSRF) vulnerability in Softaculous
Ltd. Wp ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41853 (Cross-Site Request Forgery (CSRF) vulnerability in WP iCal
Availabilit ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41852 (Cross-Site Request Forgery (CSRF) vulnerability in MailMunch
MailMunch ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41851 (Cross-Site Request Forgery (CSRF) vulnerability in Dotsquares
WP Custo ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41850 (Cross-Site Request Forgery (CSRF) vulnerability in Morris
Bryant, Rube ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-41841 (An improper authorization vulnerability in Fortinet FortiOS
7.0.0 - 7. ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-41838 (An improper neutralization of special elements used in an os
command ( ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-41774 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41773 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41772 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41771 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41770 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41769 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41768 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41767 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41766 (Windows Client Server Run-time Subsystem (CSRSS) Elevation of
Privileg ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41765 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41763 (Skype for Business Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-41679 (An improper access control vulnerability [CWE-284] in
FortiManager man ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-41675 (A use after free vulnerability [CWE-416] in FortiOS version
7.2.0 thro ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-41373 (A directory traversal vulnerability exists in the BIG-IP
Configuration ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-41253 (When on BIG-IP DNS or BIG-IP LTM enabled with DNS Services
License, an ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-41085 (When IPSec is configured on a Virtual Server, undisclosed
traffic can ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-40718 (A interpretation conflict in Fortinet IPS Engine versions
7.321, 7.166 ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-40542 (When TCP Verified Accept is enabled on a TCP profile that is
configure ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-40537 (An authenticated user's session cookie may remain valid for a
limited ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-40534 (When a client-side HTTP/2 profile and the HTTP MRF Router
option are e ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-39447 (When BIG-IP APM Guided Configurations are configured,
undisclosed sens ...)
- TODO: check
+ NOT-FOR-US: F5
CVE-2023-38640 (A vulnerability has been identified in SICAM PAS/PQS (All
versions >= ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-38171 (Microsoft QUIC Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-38166 (Layer 2 Tunneling Protocol Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-38159 (Windows Graphics Component Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-37939 (An exposure of sensitive information to an unauthorized actor
vulnerab ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-37935 (A use of GET request method with sensitive query strings
vulnerability ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-37195 (A vulnerability has been identified in SIMATIC CP 1604 (All
versions), ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-37194 (A vulnerability has been identified in SIMATIC CP 1604 (All
versions), ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-36902 (Windows Runtime Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36790 (Windows RDP Encoder Mirror Driver Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36789 (Skype for Business Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36786 (Skype for Business Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36785 (Microsoft ODBC Driver for SQL Server Remote Code Execution
Vulnerabili ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36780 (Skype for Business Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36778 (Microsoft Exchange Server Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36776 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36743 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36737 (Azure Network Watcher VM Agent Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36732 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36731 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36730 (Microsoft ODBC Driver for SQL Server Remote Code Execution
Vulnerabili ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36729 (Named Pipe File System Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36728 (Microsoft SQL Server Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36726 (Windows Internet Key Exchange (IKE) Extension Elevation of
Privilege ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36725 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36724 (Windows Power Management Service Information Disclosure
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36723 (Windows Container Manager Service Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36722 (Active Directory Domain Services Information Disclosure
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36721 (Windows Error Reporting Service Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36720 (Windows Mixed Reality Developer Tools Denial of Service
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36718 (Microsoft Virtual Trusted Platform Module Remote Code
Execution Vulner ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36717 (Windows Virtual Trusted Platform Module Denial of Service
Vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36713 (Windows Common Log File System Driver Information Disclosure
Vulnerabi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36712 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36711 (Windows Runtime C++ Template Library Elevation of Privilege
Vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36710 (Windows Media Foundation Core Remote Code Execution
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36709 (Microsoft AllJoyn API Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36707 (Windows Deployment Services Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36706 (Windows Deployment Services Information Disclosure
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36704 (Windows Setup Files Cleanup Remote Code Execution
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36703 (DHCP Server Service Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36702 (Microsoft DirectMusic Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36701 (Microsoft Resilient File System (ReFS) Elevation of Privilege
Vulnerab ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36698 (Windows Kernel Security Feature Bypass Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36697 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36637 (An improper neutralization of input during web page generation
vulnera ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36606 (Microsoft Message Queuing Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36605 (Windows Named Pipe Filesystem Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36603 (Windows TCP/IP Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36602 (Windows TCP/IP Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36598 (Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36596 (Remote Procedure Call Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36594 (Windows Graphics Component Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36593 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36592 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36591 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36590 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36589 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36585 (Active Template Library Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36584 (Windows Mark of the Web Security Feature Bypass Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36583 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36582 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36581 (Microsoft Message Queuing Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36579 (Microsoft Message Queuing Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36578 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36577 (Microsoft WDAC OLE DB provider for SQL Server Remote Code
Execution Vu ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36576 (Windows Kernel Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36575 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36574 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36573 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36572 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36571 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36570 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36569 (Microsoft Office Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36568 (Microsoft Office Click-To-Run Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36567 (Windows Deployment Services Information Disclosure
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36566 (Microsoft Common Data Model SDK Denial of Service
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36565 (Microsoft Office Graphics Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36564 (Windows Search Security Feature Bypass Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36563 (Microsoft WordPad Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36561 (Azure DevOps Server Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36557 (PrintHTML API Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36556 (An incorrect authorization vulnerability [CWE-863] in
FortiMail webmai ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36555 (An improper neutralization of script-related html tags in a
web page ( ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36550 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36549 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36548 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36547 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-36478 (Eclipse Jetty provides a web server and servlet container. In
versions ...)
TODO: check
CVE-2023-36438 (Windows TCP/IP Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36436 (Windows MSHTML Platform Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36435 (Microsoft QUIC Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36434 (Windows IIS Server Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36433 (Microsoft Dynamics 365 (On-Premises) Information Disclosure
Vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36431 (Microsoft Message Queuing Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36429 (Microsoft Dynamics 365 (On-Premises) Information Disclosure
Vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36420 (Microsoft ODBC Driver for SQL Server Remote Code Execution
Vulnerabili ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36419 (Azure HDInsight Apache Oozie Workflow Scheduler Elevation of
Privilege ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36418 (Azure RTOS GUIX Studio Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36417 (Microsoft SQL ODBC Driver Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36416 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting
Vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36415 (Azure Identity SDK Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36414 (Azure Identity SDK Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36380 (A vulnerability has been identified in CP-8031 MASTER MODULE
(All vers ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-35796 (A vulnerability has been identified in SINEMA Server V14 (All
versions ...)
- TODO: check
+ NOT-FOR-US: Siemens
CVE-2023-35349 (Microsoft Message Queuing Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-34993 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34992 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34989 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34988 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34987 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34986 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-34985 (A improper neutralization of special elements used in an os
command (' ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-33301 (An improper access control vulnerability in Fortinet FortiOS
7.2.0 - 7 ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-42670 [Samba AD DC Busy RPC multiple listener DoS]
- samba 2:4.19.1+dfsg-1
[bullseye] - samba <ignored> (Domain controller functionality is EOLed,
see DSA DSA-5477-1)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4541d6f8b3401d3300aa24bb72f4498b7266724
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits