Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: df59f82d by Salvatore Bonaccorso at 2023-12-12T21:24:53+01:00 Process some NFUs - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -7,91 +7,91 @@ CVE-2023-49923 (An issue was discovered by Elastic whereby the Documents API of CVE-2023-49922 (An issue was discovered by Elastic whereby Beats and Elastic Agent wou ...) TODO: check CVE-2023-49279 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-49278 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-49274 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-49273 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-49089 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-48313 (Umbraco is an ASP.NET content management system (CMS). Starting in 10 ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-48227 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-43364 (main.py in Searchor before 2.4.2 uses eval on CLI input, which may cau ...) TODO: check CVE-2023-41337 (h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. In ...) TODO: check CVE-2023-38694 (Umbraco is an ASP.NET content management system (CMS). Starting in ver ...) - TODO: check + NOT-FOR-US: Umbraco CVE-2023-36696 (Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerab ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36391 (Local Security Authority Subsystem Service Elevation of Privilege Vuln ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36020 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerabilit ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36019 (Microsoft Power Platform Connector Spoofing Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36012 (DHCP Server Service Information Disclosure Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36011 (Win32k Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36010 (Microsoft Defender Denial of Service Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36009 (Microsoft Word Information Disclosure Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36006 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36005 (Windows Telephony Server Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36004 (Windows DPAPI (Data Protection Application Programming Interface) Spoo ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-36003 (XAML Diagnostics Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35644 (Windows Sysmain Service Elevation of Privilege) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35643 (DHCP Server Service Information Disclosure Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35642 (Internet Connection Sharing (ICS) Denial of Service Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35641 (Internet Connection Sharing (ICS) Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35639 (Microsoft ODBC Driver Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35638 (DHCP Server Service Denial of Service Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35636 (Microsoft Outlook Information Disclosure Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35635 (Windows Kernel Denial of Service Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35634 (Windows Bluetooth Driver Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35633 (Windows Kernel Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35632 (Windows Ancillary Function Driver for WinSock Elevation of Privilege V ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35631 (Win32k Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35630 (Internet Connection Sharing (ICS) Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35629 (Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35628 (Windows MSHTML Platform Remote Code Execution Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35625 (Azure Machine Learning Compute Instance for SDK Users Information Disc ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35624 (Azure Connected Machine Agent Elevation of Privilege Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35622 (Windows DNS Spoofing Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35621 (Microsoft Dynamics 365 Finance and Operations Denial of Service Vulner ...) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-35619 (Microsoft Outlook for Mac Spoofing Vulnerability) - TODO: check + NOT-FOR-US: Microsoft CVE-2023-34064 (Workspace ONE Launcher contains a Privilege Escalation Vulnerability.A ...) - TODO: check + NOT-FOR-US: VMware CVE-2023-6727 (Mattermost fails to perform correct authorization checks when creating ...) - mattermost-server <itp> (bug #823556) CVE-2023-6593 (Client side permission bypass in Devolutions Remote Desktop Manager 20 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/df59f82d8fa4947d1da3ae7c8383df056f59ef43 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits