[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Dec 14 20:25:31 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
202e0c44 by Salvatore Bonaccorso at 2023-12-14T21:25:06+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,5 +1,5 @@
 CVE-2023-6595 (In WhatsUp Gold versions released before 2023.1, an API endpoint was f ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-6572 (Exposure of Sensitive Information to an Unauthorized Actor in GitHub r ...)
 	TODO: check
 CVE-2023-6571 (Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow)
@@ -9,47 +9,47 @@ CVE-2023-6570 (Server-Side Request Forgery (SSRF) in kubeflow/kubeflow)
 CVE-2023-6569 (External Control of File Name or Path in h2oai/h2o-3)
 	TODO: check
 CVE-2023-6563 (An unconstrained memory consumption vulnerability was discovered in Ke ...)
-	TODO: check
+	NOT-FOR-US: Keycloak
 CVE-2023-6545 (The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to ...)
-	TODO: check
+	NOT-FOR-US: authelia-bhf as included in Beckhoffs TwinCAT/BSD
 CVE-2023-6368 (In WhatsUp Gold versions released before 2023.1, an API endpoint was f ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-6367 (In WhatsUp Gold versions released before 2023.1, a stored cross-site s ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-6366 (In WhatsUp Gold versions released before 2023.1, a stored cross-site s ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-6365 (In WhatsUp Gold versions released before 2023.1, a stored cross-site s ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-6364 (In WhatsUp Gold versions released before 2023.1, a stored cross-site s ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2023-5769 (A vulnerability exists in the webserver that affects the  RTU500 serie ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2023-5592 (Download of Code Without Integrity Check vulnerability in PHOENIX CONT ...)
-	TODO: check
+	NOT-FOR-US: PHOENIX
 CVE-2023-50713 (Speckle Server provides server, frontend, 3D viewer, and other JavaScr ...)
 	TODO: check
 CVE-2023-50710 (Hono is a web framework written in TypeScript. Prior to version 3.11.7 ...)
 	TODO: check
 CVE-2023-50566 (A stored cross-site scripting (XSS) vulnerability in EyouCMS-V1.6.5-UT ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-50565 (A cross-site scripting (XSS) vulnerability in the component /logs/dopo ...)
-	TODO: check
+	NOT-FOR-US: RPCMS
 CVE-2023-50564 (An arbitrary file upload vulnerability in the component /inc/modules_i ...)
-	TODO: check
+	NOT-FOR-US: Pluck CMS
 CVE-2023-50563 (Semcms v4.8 was discovered to contain a SQL injection vulnerability vi ...)
-	TODO: check
+	NOT-FOR-US: Semcms
 CVE-2023-50472 (cJSON v1.7.16 was discovered to contain a segmentation violation via t ...)
 	TODO: check
 CVE-2023-50471 (cJSON v1.7.16 was discovered to contain a segmentation violation via t ...)
 	TODO: check
 CVE-2023-50371 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-50370 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-50369 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-50368 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-50269 (Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion ...)
 	TODO: check
 CVE-2023-50137 (JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the sit ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/202e0c44394bd90b3d20a5438d7b3e3e1fe43895

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/202e0c44394bd90b3d20a5438d7b3e3e1fe43895
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231214/0448cb40/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list