[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Dec 31 08:40:54 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fe79fd33 by Salvatore Bonaccorso at 2022-12-31T09:39:56+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,9 +1,9 @@
 CVE-2022-4864 (Argument Injection in GitHub repository froxlor/froxlor prior to 2.0.0 ...)
 	- froxlor <itp> (bug #581792)
 CVE-2017-20155 (A vulnerability was found in Sterc Google Analytics Dashboard for MODX ...)
-	TODO: check
+	NOT-FOR-US: Sterc Google Analytics Dashboard for MODX
 CVE-2017-20154 (A vulnerability was found in ghostlander Phoenixcoin. It has been clas ...)
-	TODO: check
+	NOT-FOR-US: ghostlander Phoenixcoin
 CVE-2022-4863 (Improper Handling of Insufficient Permissions or Privileges in GitHub  ...)
 	NOT-FOR-US: usememos
 CVE-2022-4862
@@ -13,7 +13,7 @@ CVE-2022-4861 (Incorrect implementation in authentication protocol in M-Files Cl
 CVE-2022-4860 (A vulnerability was found in KBase Metrics. It has been classified as  ...)
 	NOT-FOR-US: KBase Metrics
 CVE-2022-4859 (A vulnerability, which was classified as problematic, has been found i ...)
-	TODO: check
+	NOT-FOR-US: Joget
 CVE-2022-4858 (Insertion of Sensitive Information into Log Files in M-Files Server be ...)
 	NOT-FOR-US: M-Files
 CVE-2022-4857 (A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and ...)
@@ -35,13 +35,13 @@ CVE-2018-25060 (A vulnerability was found in Macaron csrf and classified as prob
 CVE-2018-25059 (A vulnerability was found in pastebinit up to 0.2.2 and classified as  ...)
 	TODO: check
 CVE-2017-20153 (A vulnerability has been found in aerouk imageserve and classified as  ...)
-	TODO: check
+	NOT-FOR-US: aerouk imageserve
 CVE-2017-20152 (A vulnerability, which was classified as problematic, was found in aer ...)
-	TODO: check
+	NOT-FOR-US: aerouk imageserve
 CVE-2017-20151 (A vulnerability classified as problematic was found in iText RUPS. Thi ...)
 	NOT-FOR-US: iText RUPS
 CVE-2022-48195 (An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When  ...)
-	TODO: check
+	NOT-FOR-US: Mellium
 CVE-2022-48194 (TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated ...)
 	NOT-FOR-US: TP-Link
 CVE-2022-48193
@@ -782,7 +782,7 @@ CVE-2018-25052 (A vulnerability has been found in Catalyst-Plugin-Session up to
 	- libcatalyst-plugin-session-perl 0.41-1
 	NOTE: https://github.com/perl-catalyst/Catalyst-Plugin-Session/commit/88d1b599e1163761c9bd53bec53ba078f13e09d4 (0.41)
 CVE-2018-25051 (A vulnerability, which was classified as problematic, was found in JmP ...)
-	TODO: check
+	NOT-FOR-US: JmPotato Pomash
 CVE-2018-25050 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: Harvest Chosen
 CVE-2017-20150 (A vulnerability was found in challenge website. It has been rated as c ...)
@@ -6432,49 +6432,49 @@ CVE-2022-46603
 CVE-2022-46602
 	RESERVED
 CVE-2022-46601 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46600 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46599 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46598 (TRENDnet TEW755AP 1.13B01 was discovered to contain a command injectio ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46597 (TRENDnet TEW755AP 1.13B01 was discovered to contain a command injectio ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46596 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46595
 	RESERVED
 CVE-2022-46594 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46593 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46592 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46591 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46590 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46589 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46588 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46587
 	RESERVED
 CVE-2022-46586 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46585 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46584 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46583 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46582 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46581 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46580 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow v ...)
-	TODO: check
+	NOT-FOR-US: TRENDnet
 CVE-2022-46579
 	RESERVED
 CVE-2022-46578



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe79fd3348cd24ff1d2426359569e3b048ea129b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe79fd3348cd24ff1d2426359569e3b048ea129b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221231/e475d1ac/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list