[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Aug 31 22:40:18 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e3ff3232 by Salvatore Bonaccorso at 2023-08-31T23:39:37+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -15,41 +15,41 @@ CVE-2023-4678 (Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.)
NOTE: https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07
NOTE: https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877
CVE-2023-41748 (Remote command execution due to improper input validation. The followi ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41747 (Sensitive information disclosure due to improper input validation. The ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41746 (Remote command execution due to improper input validation. The followi ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41745 (Sensitive information disclosure due to excessive collection of system ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41744 (Local privilege escalation due to unrestricted loading of unsigned lib ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41743 (Local privilege escalation due to insecure driver communication port p ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41742 (Excessive attack surface due to binding to an unrestricted IP address. ...)
- TODO: check
+ NOT-FOR-US: Acronis
CVE-2023-41741 (Exposure of sensitive information to an unauthorized actor vulnerabili ...)
- TODO: check
+ NOT-FOR-US: Synology
CVE-2023-41740 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
- TODO: check
+ NOT-FOR-US: Synology
CVE-2023-41739 (Uncontrolled resource consumption vulnerability in File Functionality ...)
- TODO: check
+ NOT-FOR-US: Synology
CVE-2023-41738 (Improper neutralization of special elements used in an OS command ('OS ...)
- TODO: check
+ NOT-FOR-US: Synology
CVE-2023-41717 (Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and ...)
TODO: check
CVE-2023-41642 (Multiple reflected cross-site scripting (XSS) vulnerabilities in the E ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41640 (An improper error handling vulnerability in the component ErroreNonGes ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41638 (An arbitrary file upload vulnerability in the Gestione Documentale mod ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41637 (An arbitrary file upload vulnerability in the Carica immagine function ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41636 (A SQL injection vulnerability in the Data Richiesta dal parameter of G ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41635 (A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.a ...)
- TODO: check
+ NOT-FOR-US: GruppoSCAI RealGimm
CVE-2023-41045 (Graylog is a free and open log management platform. Graylog makes use ...)
TODO: check
CVE-2023-41044 (Graylog is a free and open log management platform. A partial path tra ...)
@@ -67,9 +67,9 @@ CVE-2023-39351 (FreeRDP is a free implementation of the Remote Desktop Protocol
CVE-2023-39350 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...)
TODO: check
CVE-2023-34392 (A Missing Authentication for Critical Function vulnerability in the Sc ...)
- TODO: check
+ NOT-FOR-US: Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator
CVE-2023-34391 (Insecure Inherited Permissions vulnerability in Schweitzer Engineering ...)
- TODO: check
+ NOT-FOR-US: Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software
CVE-2023-33835 (IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a ...)
NOT-FOR-US: IBM
CVE-2023-33834 (IBM Security Verify Information Queue 10.0.4 and 10.0.5 could allow a ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3ff3232f24d7dcc7f7fd53ecc7dad527c4c155f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3ff3232f24d7dcc7f7fd53ecc7dad527c4c155f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230831/ace2ba77/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list