[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Jul 15 16:19:22 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d7a8bd97 by Moritz Muehlenhoff at 2022-07-15T17:19:08+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -72,7 +72,7 @@ CVE-2022-35859
 CVE-2022-35858
 	RESERVED
 CVE-2022-35857 (kvf-admin through 2022-02-12 allows remote attackers to execute arbitr ...)
-	TODO: check
+	NOT-FOR-US: kvf-admin
 CVE-2022-35856
 	RESERVED
 CVE-2022-35855
@@ -1043,7 +1043,7 @@ CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitial
 CVE-2022-2366 (Incorrect default configuration for trusted IP header in Mattermost ve ...)
 	- mattermost-server <itp> (bug #823556)
 CVE-2022-2365 (Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium ...)
-	TODO: check
+	NOT-FOR-US: Trilium Notes
 CVE-2022-2364 (A vulnerability, which was classified as problematic, was found in Sou ...)
 	NOT-FOR-US: Simple Parking Management System
 CVE-2022-2363 (A vulnerability, which was classified as problematic, has been found i ...)
@@ -1071,7 +1071,7 @@ CVE-2022-2355
 CVE-2022-2354
 	RESERVED
 CVE-2022-35411 (rpc.py through 0.6.0 allows Remote Code Execution because an unpickle  ...)
-	TODO: check
+	NOT-FOR-US: rpc.py
 CVE-2022-35410 (mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ dir ...)
 	- mat2 0.13.0-1
 	NOTE: https://0xacab.org/jvoisin/mat2/-/commit/beebca4bf1cd3b935824c966ce077e7bcf610385
@@ -4547,11 +4547,11 @@ CVE-2022-34096
 CVE-2022-34095
 	RESERVED
 CVE-2022-34094 (Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to c ...)
-	TODO: check
+	NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
 CVE-2022-34093 (Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to c ...)
-	TODO: check
+	NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
 CVE-2022-34092 (Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to c ...)
-	TODO: check
+	NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
 CVE-2022-34091
 	RESERVED
 CVE-2022-34090
@@ -7084,7 +7084,7 @@ CVE-2022-33013
 CVE-2022-33012
 	RESERVED
 CVE-2022-33011 (Known v1.3.1+2020120201 was discovered to allow attackers to perform a ...)
-	TODO: check
+	NOT-FOR-US: Known
 CVE-2022-33010
 	RESERVED
 CVE-2022-33009 (A stored cross-site scripting (XSS) vulnerability in LightCMS v1.3.11  ...)
@@ -8594,7 +8594,7 @@ CVE-2022-32427
 CVE-2022-32426
 	RESERVED
 CVE-2022-32425 (The login function of Mealie v1.0.0beta-2 allows attackers to enumerat ...)
-	TODO: check
+	NOT-FOR-US: Mealie
 CVE-2022-32424
 	RESERVED
 CVE-2022-32423
@@ -8610,15 +8610,15 @@ CVE-2022-32419
 CVE-2022-32418
 	RESERVED
 CVE-2022-32417 (PbootCMS v3.1.2 was discovered to contain a remote code execution (RCE ...)
-	TODO: check
+	NOT-FOR-US: PbootCMS
 CVE-2022-32416 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/c ...)
-	TODO: check
+	NOT-FOR-US: Product Show Room Site
 CVE-2022-32415 (Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/? ...)
-	TODO: check
+	NOT-FOR-US: Product Show Room Site
 CVE-2022-32414 (Nginx NJS v0.7.2 was discovered to contain a segmentation violation in ...)
 	NOT-FOR-US: njs
 CVE-2022-32413 (An arbitrary file upload vulnerability in Dice v4.2.0 allows attackers ...)
-	TODO: check
+	NOT-FOR-US: Dice
 CVE-2022-32412 (An issue in the /template/edit component of HongCMS v3.0 allows attack ...)
 	NOT-FOR-US: HongCMS
 CVE-2022-32411 (An issue in the languages config file of HongCMS v3.0 allows attackers ...)
@@ -8626,13 +8626,13 @@ CVE-2022-32411 (An issue in the languages config file of HongCMS v3.0 allows att
 CVE-2022-32410
 	RESERVED
 CVE-2022-32409 (A local file inclusion (LFI) vulnerability in the component codemirror ...)
-	TODO: check
+	NOT-FOR-US: Portal do Software Publico Brasileiro i3geo
 CVE-2022-32408
 	RESERVED
 CVE-2022-32407
 	RESERVED
 CVE-2022-32406 (GtkRadiant v1.6.6 was discovered to contain a buffer overflow via the  ...)
-	TODO: check
+	NOT-FOR-US: GtkRadiant
 CVE-2022-32405 (Prison Management System v1.0 was discovered to contain a SQL injectio ...)
 	NOT-FOR-US: Prison Management System
 CVE-2022-32404 (Prison Management System v1.0 was discovered to contain a SQL injectio ...)
@@ -8666,7 +8666,7 @@ CVE-2022-32391 (Prison Management System v1.0 was discovered to contain a SQL in
 CVE-2022-32390
 	RESERVED
 CVE-2022-32389 (Isode SWIFT v4.0.2 was discovered to contain hard-coded credentials in ...)
-	TODO: check
+	NOT-FOR-US: Isode SWIFT (different than src:swift)
 CVE-2022-32388
 	RESERVED
 CVE-2022-32387
@@ -8808,7 +8808,7 @@ CVE-2022-32320
 CVE-2022-32319
 	RESERVED
 CVE-2022-32318 (Fast Food Ordering System v1.0 was discovered to contain a persistent  ...)
-	TODO: check
+	NOT-FOR-US: Fast Food Ordering System
 CVE-2022-32317 (The MPlayer Project v1.5 was discovered to contain a heap use-after-fr ...)
 	TODO: check
 CVE-2022-32316
@@ -9545,7 +9545,7 @@ CVE-2022-32117 (Jerryscript v2.4.0 was discovered to contain a stack buffer over
 CVE-2022-32116
 	RESERVED
 CVE-2022-32115 (An issue in the isSVG() function of Known v1.2.2+2020061101 allows att ...)
-	TODO: check
+	NOT-FOR-US: Known
 CVE-2022-32114 (An unrestricted file upload vulnerability in the Add New Assets functi ...)
 	TODO: check
 CVE-2022-32113
@@ -11812,7 +11812,7 @@ CVE-2022-31291 (An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 allow
 	NOTE: https://github.com/COVESA/dlt-daemon/pull/376
 	NOTE: https://github.com/COVESA/dlt-daemon/commit/6a3bd901d825c7206797e36ea98e10a218f5aad2
 CVE-2022-31290 (A cross-site scripting (XSS) vulnerability in Known v1.2.2+2020061101  ...)
-	TODO: check
+	NOT-FOR-US: Known
 CVE-2022-31289
 	REJECTED
 CVE-2022-31288



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7a8bd97ba337b97fdad0941d18f614a6bf71e79

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7a8bd97ba337b97fdad0941d18f614a6bf71e79
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220715/e5c853bb/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list