[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso
carnil at debian.org
Tue Mar 24 08:15:39 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6b04ae15 by Salvatore Bonaccorso at 2020-03-24T09:15:13+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,7 +1,7 @@
CVE-2020-10880
RESERVED
CVE-2020-10879 (rConfig before 3.9.5 allows injection because lib/crud/search.crud.php ...)
- TODO: check
+ NOT-FOR-US: rConfig
CVE-2020-10878
RESERVED
CVE-2020-10877
@@ -9,15 +9,15 @@ CVE-2020-10877
CVE-2020-10876
RESERVED
CVE-2020-10875 (Motorola FX9500 devices allow remote attackers to conduct absolute pat ...)
- TODO: check
+ NOT-FOR-US: Motorola devices
CVE-2020-10874 (Motorola FX9500 devices allow remote attackers to read database files. ...)
- TODO: check
+ NOT-FOR-US: Motorola devices
CVE-2020-10873
RESERVED
CVE-2020-10872
RESERVED
CVE-2020-10871 (** DISPUTED ** In OpenWrt LuCI git-20.x, remote unauthenticated attack ...)
- TODO: check
+ NOT-FOR-US: OpenWrt LuCI
CVE-2020-10870 (Zim through 0.72.1 creates temporary directories with predictable name ...)
- zim <unfixed> (unimportant; bug #954810)
NOTE: https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028
@@ -4734,7 +4734,7 @@ CVE-2020-8870
CVE-2020-8869
RESERVED
CVE-2020-8868 (This vulnerability allows remote attackers to execute arbitrary code o ...)
- TODO: check
+ NOT-FOR-US: Quest Foglight Evolve
CVE-2020-8867
RESERVED
CVE-2020-8866 (This vulnerability allows remote attackers to create arbitrary files o ...)
@@ -4742,9 +4742,9 @@ CVE-2020-8866 (This vulnerability allows remote attackers to create arbitrary fi
CVE-2020-8865 (This vulnerability allows remote attackers to execute local PHP files ...)
TODO: check
CVE-2020-8864 (This vulnerability allows network-adjacent attackers to bypass authent ...)
- TODO: check
+ NOT-FOR-US: D-Link
CVE-2020-8863 (This vulnerability allows network-adjacent attackers to bypass authent ...)
- TODO: check
+ NOT-FOR-US: D-Link
CVE-2020-8862 (This vulnerability allows network-adjacent attackers to bypass authent ...)
NOT-FOR-US: D-Link
CVE-2020-8861 (This vulnerability allows network-adjacent attackers to bypass authent ...)
@@ -7891,13 +7891,13 @@ CVE-2020-7483
CVE-2020-7482 (A CWE-79:Improper Neutralization of Input During Web Page Generation ( ...)
TODO: check
CVE-2020-7481 (A CWE-79:Improper Neutralization of Input During Web Page Generation ( ...)
- TODO: check
+ NOT-FOR-US: Andover Continuum
CVE-2020-7480 (A CWE-94: Improper Control of Generation of Code ('Code Injection') vu ...)
- TODO: check
+ NOT-FOR-US: Andover Continuum
CVE-2020-7479 (A CWE-306: Missing Authentication for Critical Function vulnerability ...)
- TODO: check
+ NOT-FOR-US: IGSS
CVE-2020-7478 (A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ...)
- TODO: check
+ NOT-FOR-US: IGSS
CVE-2020-7477 (A CWE-754: Improper Check for Unusual or Exceptional Conditions vulner ...)
TODO: check
CVE-2020-7476 (A CWE-426: Untrusted Search Path vulnerability exists in ZigBee Instal ...)
@@ -9089,7 +9089,7 @@ CVE-2020-6969 (It is possible to unmask credentials and other sensitive informat
CVE-2020-6968 (Honeywell INNCOM INNControl 3 allows workstation users to escalate app ...)
NOT-FOR-US: Honeywell
CVE-2020-6967 (In Rockwell Automation all versions of FactoryTalk Diagnostics softwar ...)
- TODO: check
+ NOT-FOR-US: Rockwell
CVE-2020-6966 (In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetr ...)
NOT-FOR-US: ApexPro Telemetry Server
CVE-2020-6965 (In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetr ...)
@@ -11901,7 +11901,7 @@ CVE-2020-5724
CVE-2020-5723
RESERVED
CVE-2020-5722 (The HTTP interface of the Grandstream UCM6200 series is vulnerable to ...)
- TODO: check
+ NOT-FOR-US: Grandstream
CVE-2020-5721
RESERVED
CVE-2020-5720 (MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerab ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b04ae15865128d19340cd1aafeda4a71b52fef0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b04ae15865128d19340cd1aafeda4a71b52fef0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200324/28442577/attachment.html>
More information about the debian-security-tracker-commits
mailing list