[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Jul 3 21:19:20 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
26116b54 by Moritz Muehlenhoff at 2023-07-03T22:18:58+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,49 +1,49 @@
 CVE-2023-3497 (Out of bounds read in Google Security Processor firmware in Google Chr ...)
-	TODO: check
+	NOT-FOR-US: Chrome OS
 CVE-2023-3395 (All versions of the TWinSoft Configuration Tool store encrypted passwo ...)
-	TODO: check
+	NOT-FOR-US: TWinSoft Configuration ToolChrome OS
 CVE-2023-37378 (Nullsoft Scriptable Install System (NSIS) before 3.09 mishandles acces ...)
 	TODO: check
 CVE-2023-36819 (Knowage is the professional open source suite for modern business anal ...)
-	TODO: check
+	NOT-FOR-US: Knowage
 CVE-2023-36817 (`tktchurch/website` contains the codebase for The King's Temple Church ...)
-	TODO: check
+	NOT-FOR-US: tktchurch/website
 CVE-2023-36816 (2FA is a Web app to manage Two-Factor Authentication (2FA) accounts an ...)
-	TODO: check
+	NOT-FOR-US: Bubka 2FAuth
 CVE-2023-36815 (Sealos is a Cloud Operating System designed for managing cloud-native  ...)
-	TODO: check
+	NOT-FOR-US: Sealos
 CVE-2023-36814 (Products.CMFCore are the key framework services for the Zope Content M ...)
-	TODO: check
+	NOT-FOR-US: Products.CMFCore
 CVE-2023-36611 (The affected TBox RTUs allow low privilege users to access software se ...)
-	TODO: check
+	NOT-FOR-US: TBox
 CVE-2023-36610 (The affected TBox RTUs generate software security tokens using insuffi ...)
-	TODO: check
+	NOT-FOR-US: TBox
 CVE-2023-36609 (The affected TBox RTUs run OpenVPN with root privileges and can run us ...)
-	TODO: check
+	NOT-FOR-US: TBox
 CVE-2023-36608 (The affected TBox RTUs store hashed passwords using MD5 encryption, wh ...)
-	TODO: check
+	NOT-FOR-US: TBox
 CVE-2023-36377 (Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and befor ...)
 	TODO: check
 CVE-2023-36291 (Cross Site Scripting vulnerability in Maxsite CMS v.108.7 allows a rem ...)
-	TODO: check
+	NOT-FOR-US: Maxsite CMS
 CVE-2023-36262 (An issue in OBS Studio OBS-Studio v.29.1.2 allows a local attack to ob ...)
 	TODO: check
 CVE-2023-36258 (An issue in langchain v.0.0.199 allows an attacker to execute arbitrar ...)
-	TODO: check
+	NOT-FOR-US: Langchain
 CVE-2023-36223 (Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and be ...)
-	TODO: check
+	NOT-FOR-US: mlogclub bbs-go
 CVE-2023-36222 (Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and be ...)
-	TODO: check
+	NOT-FOR-US: mlogclub bbs-go
 CVE-2023-36183 (Buffer Overflow vulnerability in OpenImageIO v.2.4.12.0 and before all ...)
 	TODO: check
 CVE-2023-36162 (Cross Site Request Forgery vulnerability in ZZCMS v.2023 alows a remot ...)
-	TODO: check
+	NOT-FOR-US: ZZCMS
 CVE-2023-35935 (@fastify/oauth2, a wrapper around the `simple-oauth2` library, is vuln ...)
-	TODO: check
+	NOT-FOR-US: @fastify/oauth2
 CVE-2023-34451 (CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a s ...)
-	TODO: check
+	NOT-FOR-US: CometBFT
 CVE-2023-34450 (CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a s ...)
-	TODO: check
+	NOT-FOR-US: CometBFT
 CVE-2023-36053 (In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, Em ...)
 	- python-django <unfixed> (bug #1040225)
 	NOTE: https://www.openwall.com/lists/oss-security/2023/07/03/1
@@ -53,13 +53,13 @@ CVE-2023-36053 (In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2
 CVE-2023-35797 (Improper Input Validation vulnerability in Apache Software Foundation  ...)
 	NOT-FOR-US: Hive provider for Apache Airflow
 CVE-2023-3438 (An unquoted Windows search path vulnerability existed in the install t ...)
-	TODO: check
+	NOT-FOR-US: Trellix
 CVE-2023-3370
 	REJECTED
 CVE-2023-3314 (A vulnerability arises out of a failure to comprehensively sanitize th ...)
-	TODO: check
+	NOT-FOR-US: Trellix
 CVE-2023-3313 (An OS common injection vulnerability exists in the ESM certificate API ...)
-	TODO: check
+	NOT-FOR-US: Trellix
 CVE-2023-36001
 	REJECTED
 CVE-2023-35999



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/26116b54cb860003a23438c2a59c2ea63cbcddcf

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/26116b54cb860003a23438c2a59c2ea63cbcddcf
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230703/5e53637f/attachment.htm>


More information about the debian-security-tracker-commits mailing list