[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Jul 6 21:49:04 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
421f75c5 by Salvatore Bonaccorso at 2023-07-06T22:48:35+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,13 +1,13 @@
 CVE-2023-3531 (Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassn ...)
 	TODO: check
 CVE-2023-3529 (A vulnerability classified as problematic has been found in Rotem Dyna ...)
-	TODO: check
+	NOT-FOR-US: Rotem Dynamics Rotem CRM
 CVE-2023-3528 (A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been rated ...)
-	TODO: check
+	NOT-FOR-US: ThinuTech ThinuCMS
 CVE-2023-3523 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.)
 	TODO: check
 CVE-2023-3456 (Vulnerability of kernel raw address leakage in the  hang detector modu ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37454 (An issue was discovered in the Linux kernel through 6.4.2. A crafted U ...)
 	- linux <unfixed>
 CVE-2023-37453 (An issue was discovered in the USB subsystem in the Linux kernel throu ...)
@@ -15,43 +15,43 @@ CVE-2023-37453 (An issue was discovered in the USB subsystem in the Linux kernel
 CVE-2023-37260 (league/oauth2-server is an implementation of an OAuth 2.0 authorizatio ...)
 	TODO: check
 CVE-2023-37245 (Buffer overflow vulnerability in the modem pinctrl module. Successful  ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37242 (Vulnerability of commands from the modem being intercepted in the atcm ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37241 (Input verification vulnerability in the WMS API. Successful exploitati ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37240 (Vulnerability of missing input length verification in the  distributed ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37239 (Format string vulnerability in the  distributed file system. Attackers ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37238 (Vulnerability of apps' permission to access a certain API being incomp ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2023-37136 (A stored cross-site scripting (XSS) vulnerability in the Basic Website ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-37135 (A stored cross-site scripting (XSS) vulnerability in the Image Upload  ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-37134 (A stored cross-site scripting (XSS) vulnerability in the Basic Informa ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-37133 (A stored cross-site scripting (XSS) vulnerability in the Column manage ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-37132 (A stored cross-site scripting (XSS) vulnerability in the custom variab ...)
-	TODO: check
+	NOT-FOR-US: EyouCMS
 CVE-2023-37131 (A Cross-Site Request Forgery (CSRF) in the component /public/admin/pro ...)
-	TODO: check
+	NOT-FOR-US: YznCMS
 CVE-2023-37125 (A stored cross-site scripting (XSS) vulnerability in the Management Cu ...)
-	TODO: check
+	NOT-FOR-US: SEACMS
 CVE-2023-37124 (A stored cross-site scripting (XSS) vulnerability in the Site Setup mo ...)
-	TODO: check
+	NOT-FOR-US: SEACMS
 CVE-2023-37122 (A stored cross-site scripting (XSS) vulnerability in Bagecms v3.1.0 al ...)
-	TODO: check
+	NOT-FOR-US: Bagecms
 CVE-2023-36995 (TravianZ through 8.3.4 allows XSS via the Alliance tag/name, the stati ...)
-	TODO: check
+	NOT-FOR-US: TravianZ
 CVE-2023-36970 (A Cross-site scripting (XSS) vulnerability in CMS Made Simple v2.2.17  ...)
-	TODO: check
+	NOT-FOR-US: CMS Made Simple
 CVE-2023-36969 (CMS Made Simple v2.2.17 is vulnerable to Remote Command Execution via  ...)
-	TODO: check
+	NOT-FOR-US: CMS Made Simple
 CVE-2023-36968 (A SQL Injection vulnerability detected in Food Ordering System v1.0 al ...)
-	TODO: check
+	NOT-FOR-US: Food Ordering System
 CVE-2023-36830 (SQLFluff is a SQL linter. Prior to version 2.1.2, in environments wher ...)
 	TODO: check
 CVE-2023-36823 (Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/421f75c5c7c798dba54921f38c034fa13f9610f9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/421f75c5c7c798dba54921f38c034fa13f9610f9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230706/db2d068f/attachment.htm>


More information about the debian-security-tracker-commits mailing list