[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff jmm at debian.org
Tue Oct 29 08:43:30 GMT 2019



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
656f8310 by Moritz Muehlenhoff at 2019-10-29T08:43:09Z
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2008,11 +2008,11 @@ CVE-2019-18191
 CVE-2019-18190
 	RESERVED
 CVE-2019-18189 (A directory traversal vulnerability in Trend Micro Apex One, OfficeSca ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2019-18188 (Trend Micro Apex One could be exploited by an attacker utilizing a com ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2019-18187 (Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited  ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2019-18186
 	RESERVED
 CVE-2019-18185
@@ -23694,7 +23694,7 @@ CVE-2019-10750 (deeply is vulnerable to Prototype Pollution in versions before 3
 CVE-2019-10749
 	RESERVED
 CVE-2019-10748 (Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnera ...)
-	TODO: check
+	NOT-FOR-US: sequelize
 CVE-2019-10747 (set-value is vulnerable to Prototype Pollution in versions lower than  ...)
 	[experimental] - node-set-value 3.0.1-1
 	- node-set-value 0.4.0-2 (bug #941189)
@@ -23719,7 +23719,7 @@ CVE-2019-10744 (Versions of lodash lower than 4.17.12 are vulnerable to Prototyp
 	NOTE: https://github.com/lodash/lodash/issues/4348
 	NOTE: https://github.com/lodash/lodash/pull/4336
 CVE-2019-10743 (github.com/mholt/archiver/cmd/arc package versions 3.0.0 and later are ...)
-	TODO: check
+	NOT-FOR-US: archiver
 CVE-2019-10742 (Axios up to and including 0.18.0 allows attackers to cause a denial of ...)
 	- node-axios 0.17.1+dfsg-2 (bug #928624)
 	NOTE: https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505
@@ -38433,7 +38433,7 @@ CVE-2019-5535 (VMware Workstation and Fusion contain a network denial-of-service
 CVE-2019-5534 (VMware vCenter Server (6.7.x prior to 6.7 U3, 6.5 prior to 6.5 U3 and  ...)
 	NOT-FOR-US: VMware
 CVE-2019-5533 (In VMware SD-WAN by VeloCloud versions 3.x prior to 3.3.0, the VeloClo ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2019-5532 (VMware vCenter Server (6.7.x prior to 6.7 U3, 6.5 prior to 6.5 U3 and  ...)
 	NOT-FOR-US: VMware
 CVE-2019-5531 (VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to E ...)
@@ -40492,7 +40492,7 @@ CVE-2019-4602
 CVE-2019-4601
 	RESERVED
 CVE-2019-4600 (IBM API Connect version V5.0.0.0 through 5.0.8.7 could reveal sensitiv ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4599
 	RESERVED
 CVE-2019-4598
@@ -40600,7 +40600,7 @@ CVE-2019-4548
 CVE-2019-4547
 	RESERVED
 CVE-2019-4546 (After installing the IBM Maximo Health- Safety and Environment Manager ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4545
 	RESERVED
 CVE-2019-4544
@@ -41014,7 +41014,7 @@ CVE-2019-4341
 CVE-2019-4340 (IBM Security Guardium Big Data Intelligence 4.0 (SonarG) is vulnerable ...)
 	NOT-FOR-US: IBM
 CVE-2019-4339 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses weaker t ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4338 (IBM Security Guardium Big Data Intelligence 4.0 (SonarG) does not prop ...)
 	NOT-FOR-US: IBM
 CVE-2019-4337 (IBM Robotic Process Automation with Automation Anywhere 11 could allow ...)
@@ -41032,9 +41032,9 @@ CVE-2019-4332
 CVE-2019-4331
 	RESERVED
 CVE-2019-4330 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 does not set  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4329 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses incomple ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4328
 	RESERVED
 CVE-2019-4327
@@ -41064,23 +41064,23 @@ CVE-2019-4316
 CVE-2019-4315
 	RESERVED
 CVE-2019-4314 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores sensit ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4313
 	RESERVED
 CVE-2019-4312
 	RESERVED
 CVE-2019-4311 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 discloses sen ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4310 (IBM Security Guardium Big Data Intelligence 4.0 (SonarG) uses an inade ...)
 	NOT-FOR-US: IBM
 CVE-2019-4309 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses hard cod ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4308 (IBM Emptoris Sourcing 10.1.0 through 10.1.3, IBM Contract Management 1 ...)
 	NOT-FOR-US: IBM
 CVE-2019-4307 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores user c ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4306 (IBM Security Guardium Big Data Intelligence (SonarG) 4.0 specifies per ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2019-4305 (IBM WebSphere Application Server Liberty could allow a remote attacker ...)
 	NOT-FOR-US: IBM
 CVE-2019-4304 (IBM WebSphere Application Server - Liberty could allow a remote attack ...)
@@ -41734,13 +41734,13 @@ CVE-2019-3981
 CVE-2019-3980 (The Solarwinds Dameware Mini Remote Client agent v12.1.0.89 supports s ...)
 	NOT-FOR-US: Solarwinds
 CVE-2019-3979 (RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulne ...)
-	TODO: check
+	NOT-FOR-US: RouterOS
 CVE-2019-3978 (RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow rem ...)
-	TODO: check
+	NOT-FOR-US: RouterOS
 CVE-2019-3977 (RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insuffici ...)
-	TODO: check
+	NOT-FOR-US: RouterOS
 CVE-2019-3976 (RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulne ...)
-	TODO: check
+	NOT-FOR-US: RouterOS
 CVE-2019-3975 (Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows  ...)
 	NOT-FOR-US: Advantech WebAccess/SCADA
 CVE-2019-3974 (Nessus 8.5.2 and earlier on Windows platforms were found to contain an ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/656f831048a3069d7c51e41325b162daea682473

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/656f831048a3069d7c51e41325b162daea682473
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191029/da5464f1/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list