[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Dec 20 21:19:15 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
10d39f46 by Salvatore Bonaccorso at 2022-12-20T22:18:44+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4509,11 +4509,11 @@ CVE-2022-46423
 CVE-2022-46422
 	RESERVED
 CVE-2022-43486 (Hidden functionality vulnerability in Buffalo network devices WSR-3200 ...)
-	TODO: check
+	NOT-FOR-US: Buffalo network devices
 CVE-2022-43466 (Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, W ...)
-	TODO: check
+	NOT-FOR-US: Buffalo network devices
 CVE-2022-43443 (Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, W ...)
-	TODO: check
+	NOT-FOR-US: Buffalo network devices
 CVE-2022-4294
 	RESERVED
 CVE-2022-4293 (Floating Point Comparison with Incorrect Operator in GitHub repository ...)
@@ -4559,11 +4559,11 @@ CVE-2022-46421
 CVE-2022-4281 (A vulnerability has been found in Facepay 1.0 and classified as critic ...)
 	NOT-FOR-US: Facepay
 CVE-2022-46288 (Open redirect vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R4 and e ...)
-	TODO: check
+	NOT-FOR-US: DENSHI NYUSATSU CORE SYSTEM
 CVE-2022-46287 (Cross-site scripting vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R ...)
-	TODO: check
+	NOT-FOR-US: DENSHI NYUSATSU CORE SYSTEM
 CVE-2022-41993 (Cross-site scripting vulnerability in DENSHI NYUSATSU CORE SYSTEM v6 R ...)
-	TODO: check
+	NOT-FOR-US: DENSHI NYUSATSU CORE SYSTEM
 CVE-2022-46416
 	RESERVED
 CVE-2022-46415
@@ -4591,15 +4591,15 @@ CVE-2022-46405 (Mastodon through 4.0.2 allows attackers to cause a denial of ser
 CVE-2022-46404 (A command injection vulnerability has been identified in Atos Unify Op ...)
 	NOT-FOR-US: Atos Unify OpenScape
 CVE-2022-46403 (The Microchip RN4870 module firmware 1.43 (and the Microchip PIC Light ...)
-	TODO: check
+	NOT-FOR-US: Microchip
 CVE-2022-46402 (The Microchip RN4870 module firmware 1.43 (and the Microchip PIC Light ...)
-	TODO: check
+	NOT-FOR-US: Microchip
 CVE-2022-46401 (The Microchip RN4870 module firmware 1.43 (and the Microchip PIC Light ...)
-	TODO: check
+	NOT-FOR-US: Microchip
 CVE-2022-46400 (The Microchip RN4870 module firmware 1.43 (and the Microchip PIC Light ...)
-	TODO: check
+	NOT-FOR-US: Microchip
 CVE-2022-46399 (The Microchip RN4870 module firmware 1.43 (and the Microchip PIC Light ...)
-	TODO: check
+	NOT-FOR-US: Microchip
 CVE-2022-46398
 	RESERVED
 CVE-2022-46397
@@ -7307,7 +7307,7 @@ CVE-2022-45471 (In JetBrains Hub before 2022.3.15181 Throttling was missed when
 CVE-2022-45470 (** UNSUPPORTED WHEN ASSIGNED ** missing input validation in Apache Ham ...)
 	NOT-FOR-US: Apache Hama
 CVE-2022-44456 (CONPROSYS HMI System (CHS) Ver.3.4.4?and earlier allows a remote unaut ...)
-	TODO: check
+	NOT-FOR-US: CONPROSYS HMI System (CHS)
 CVE-2022-4061 (The JobBoardWP WordPress plugin before 1.2.2 does not properly validat ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-4060
@@ -8943,11 +8943,11 @@ CVE-2022-3879 (The Car Dealer (Dealership) and Vehicle sales WordPress Plugin Wo
 CVE-2022-3878 (A vulnerability classified as critical has been found in Maxon ERP. Th ...)
 	NOT-FOR-US: Maxon ERP
 CVE-2022-3877 (A vulnerability, which was classified as problematic, was found in Cli ...)
-	TODO: check
+	NOT-FOR-US: Click Studios Passwordstate and Passwordstate Browser Extension Chrome
 CVE-2022-3876 (A vulnerability, which was classified as problematic, has been found i ...)
-	TODO: check
+	NOT-FOR-US: Click Studios Passwordstate and Passwordstate Browser Extension Chrome
 CVE-2022-3875 (A vulnerability classified as critical was found in Click Studios Pass ...)
-	TODO: check
+	NOT-FOR-US: Click Studios Passwordstate and Passwordstate Browser Extension Chrome
 CVE-2022-3874
 	RESERVED
 CVE-2022-3873 (Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/drawio pr ...)
@@ -8964,7 +8964,7 @@ CVE-2022-45043 (Tenda AX12 V22.03.01.16_cn is vulnerable to command injection vi
 CVE-2022-45042
 	RESERVED
 CVE-2022-45041 (SQL Injection exits in xinhu < 2.5.0 ...)
-	TODO: check
+	NOT-FOR-US: xinhu
 CVE-2022-45040 (A cross-site scripting (XSS) vulnerability in /admin/pages/sections_sa ...)
 	NOT-FOR-US: WBCE CMS
 CVE-2022-45039 (An arbitrary file upload vulnerability in the Server Settings module o ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10d39f46c8de2a2d779bbb7a47ad1f06e9b9c757

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10d39f46c8de2a2d779bbb7a47ad1f06e9b9c757
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221220/c8cf83e3/attachment.htm>


More information about the debian-security-tracker-commits mailing list