Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
df59f82d by Salvatore Bonaccorso at 2023-12-12T21:24:53+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -7,91 +7,91 @@ CVE-2023-49923 (An issue was discovered by Elastic whereby
the Documents API of
CVE-2023-49922 (An issue was discovered by Elastic whereby Beats and Elastic
Agent wou ...)
TODO: check
CVE-2023-49279 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-49278 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-49274 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-49273 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-49089 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-48313 (Umbraco is an ASP.NET content management system (CMS).
Starting in 10 ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-48227 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-43364 (main.py in Searchor before 2.4.2 uses eval on CLI input, which
may cau ...)
TODO: check
CVE-2023-41337 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and
HTTP/3. In ...)
TODO: check
CVE-2023-38694 (Umbraco is an ASP.NET content management system (CMS).
Starting in ver ...)
- TODO: check
+ NOT-FOR-US: Umbraco
CVE-2023-36696 (Windows Cloud Files Mini Filter Driver Elevation of Privilege
Vulnerab ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36391 (Local Security Authority Subsystem Service Elevation of
Privilege Vuln ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36020 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting
Vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36019 (Microsoft Power Platform Connector Spoofing Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36012 (DHCP Server Service Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36011 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36010 (Microsoft Defender Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36009 (Microsoft Word Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36006 (Microsoft WDAC OLE DB provider for SQL Server Remote Code
Execution Vu ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36005 (Windows Telephony Server Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36004 (Windows DPAPI (Data Protection Application Programming
Interface) Spoo ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-36003 (XAML Diagnostics Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35644 (Windows Sysmain Service Elevation of Privilege)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35643 (DHCP Server Service Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35642 (Internet Connection Sharing (ICS) Denial of Service
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35641 (Internet Connection Sharing (ICS) Remote Code Execution
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35639 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35638 (DHCP Server Service Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35636 (Microsoft Outlook Information Disclosure Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35635 (Windows Kernel Denial of Service Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35634 (Windows Bluetooth Driver Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35633 (Windows Kernel Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35632 (Windows Ancillary Function Driver for WinSock Elevation of
Privilege V ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35631 (Win32k Elevation of Privilege Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35630 (Internet Connection Sharing (ICS) Remote Code Execution
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35629 (Microsoft USBHUB 3.0 Device Driver Remote Code Execution
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35628 (Windows MSHTML Platform Remote Code Execution Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35625 (Azure Machine Learning Compute Instance for SDK Users
Information Disc ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35624 (Azure Connected Machine Agent Elevation of Privilege
Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35622 (Windows DNS Spoofing Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35621 (Microsoft Dynamics 365 Finance and Operations Denial of
Service Vulner ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-35619 (Microsoft Outlook for Mac Spoofing Vulnerability)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2023-34064 (Workspace ONE Launcher contains a Privilege Escalation
Vulnerability.A ...)
- TODO: check
+ NOT-FOR-US: VMware
CVE-2023-6727 (Mattermost fails to perform correct authorization checks when
creating ...)
- mattermost-server <itp> (bug #823556)
CVE-2023-6593 (Client side permission bypass in Devolutions Remote Desktop
Manager 20 ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits