[Git][security-tracker-team/security-tracker][master] Process NFUs
Salvatore Bonaccorso
carnil at debian.org
Wed Nov 11 08:45:48 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
84e28766 by Salvatore Bonaccorso at 2020-11-11T09:45:23+01:00
Process NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -11,9 +11,9 @@ CVE-2020-28411
CVE-2020-28410
RESERVED
CVE-2020-28409 (The server in Dundas BI through 8.0.0.1001 allows XSS via addition of ...)
- TODO: check
+ NOT-FOR-US: Dundas BI
CVE-2020-28408 (The server in Dundas BI through 8.0.0.1001 allows XSS via an HTML labe ...)
- TODO: check
+ NOT-FOR-US: Dundas BI
CVE-2020-28407
RESERVED
CVE-2020-28406
@@ -8949,9 +8949,9 @@ CVE-2020-25269 (An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before
NOTE: https://github.com/inspircd/inspircd/commit/fbdd08043e97c2749ce2f03382559bba89abf47a (v3)
NOTE: https://github.com/inspircd/inspircd/commit/b24a91181f58c7f7141de8995ff212993bcc333b (v3)
CVE-2020-25268 (Remote Code Execution can occur via the external news feed in ILIAS 6. ...)
- TODO: check
+ NOT-FOR-US: ILIAS
CVE-2020-25267 (An XSS issue exists in the question-pool file-upload preview feature i ...)
- TODO: check
+ NOT-FOR-US: ILIAS
CVE-2020-25266
RESERVED
CVE-2020-25265
@@ -10959,7 +10959,7 @@ CVE-2020-24368 (Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Di
NOTE: https://github.com/Icinga/icingaweb2/commit/5700caf5f2ebd8a20ce2bd9ca30cb471f8b7487e (support/2.6)
NOTE: https://github.com/Icinga/icingaweb2/commit/3035efac65ca2f7977916bd117056aa411776dfd (master)
CVE-2020-24367 (Incorrect file permissions in BlueStacks 4 through 4.230 on Windows al ...)
- TODO: check
+ NOT-FOR-US: BlueStacks
CVE-2020-24366
RESERVED
CVE-2020-24365 (An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-12 ...)
@@ -11796,7 +11796,7 @@ CVE-2020-23970
CVE-2020-23969
RESERVED
CVE-2020-23968 (Ilex International Sign&go Workstation Security Suite 7.1 allows e ...)
- TODO: check
+ NOT-FOR-US: Ilex International Sign&go Workstation Security Suite
CVE-2020-23967
RESERVED
CVE-2020-23966
@@ -25568,33 +25568,33 @@ CVE-2020-17115
CVE-2020-17114
RESERVED
CVE-2020-17113 (, aka 'Windows Camera Codec Information Disclosure Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17112
RESERVED
CVE-2020-17111
RESERVED
CVE-2020-17110 (, aka 'HEVC Video Extensions Remote Code Execution Vulnerability'. Thi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17109 (, aka 'HEVC Video Extensions Remote Code Execution Vulnerability'. Thi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17108 (, aka 'HEVC Video Extensions Remote Code Execution Vulnerability'. Thi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17107 (, aka 'HEVC Video Extensions Remote Code Execution Vulnerability'. Thi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17106 (, aka 'HEVC Video Extensions Remote Code Execution Vulnerability'. Thi ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17105 (, aka 'AV1 Video Extension Remote Code Execution Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17104 (, aka 'Visual Studio Code JSHint Extension Remote Code Execution Vulne ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17103
RESERVED
CVE-2020-17102 (, aka 'WebP Image Extensions Information Disclosure Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17101 (, aka 'HEIF Image Extensions Remote Code Execution Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17100 (, aka 'Visual Studio Tampering Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17099
RESERVED
CVE-2020-17098
@@ -25612,39 +25612,39 @@ CVE-2020-17093
CVE-2020-17092
RESERVED
CVE-2020-17091 (, aka 'Microsoft Teams Remote Code Execution Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17090 (, aka 'Microsoft Defender for Endpoint Security Feature Bypass Vulnera ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17089
RESERVED
CVE-2020-17088 (, aka 'Windows Common Log File System Driver Elevation of Privilege Vu ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17087 (, aka 'Windows Kernel Local Elevation of Privilege Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17086 (, aka 'Raw Image Extension Remote Code Execution Vulnerability'. This ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17085 (, aka 'Microsoft Exchange Server Denial of Service Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17084 (, aka 'Microsoft Exchange Server Remote Code Execution Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17083 (, aka 'Microsoft Exchange Server Remote Code Execution Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17082 (, aka 'Raw Image Extension Remote Code Execution Vulnerability'. This ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17081 (, aka 'Microsoft Raw Image Extension Information Disclosure Vulnerabil ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17080
RESERVED
CVE-2020-17079 (, aka 'Raw Image Extension Remote Code Execution Vulnerability'. This ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17078 (, aka 'Raw Image Extension Remote Code Execution Vulnerability'. This ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17077 (, aka 'Windows Update Stack Elevation of Privilege Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17076 (, aka 'Windows Update Orchestrator Service Elevation of Privilege Vuln ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17075 (, aka 'Windows USO Core Worker Elevation of Privilege Vulnerability'. ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2020-17074 (, aka 'Windows Update Orchestrator Service Elevation of Privilege Vuln ...)
TODO: check
CVE-2020-17073 (, aka 'Windows Update Orchestrator Service Elevation of Privilege Vuln ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84e28766ab26cc62cd798e59f0b08a99f4b4a8a0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84e28766ab26cc62cd798e59f0b08a99f4b4a8a0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201111/fdaab611/attachment.html>
More information about the debian-security-tracker-commits
mailing list