[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jun 19 09:51:53 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
da044f02 by Salvatore Bonaccorso at 2023-06-19T10:51:28+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,9 +1,9 @@
 CVE-2023-3311 (A vulnerability, which was classified as problematic, was found in Pun ...)
-	TODO: check
+	NOT-FOR-US: PuneethReddyHC online-shopping-system-advanced
 CVE-2023-3310 (A vulnerability, which was classified as critical, has been found in c ...)
-	TODO: check
+	NOT-FOR-US: Agro-School Management System
 CVE-2023-3309 (A vulnerability classified as problematic was found in SourceCodester  ...)
-	TODO: check
+	NOT-FOR-US: SourceCodester Resort Reservation System
 CVE-2023-3308 (A vulnerability classified as problematic has been found in whaleal Ic ...)
 	TODO: check
 CVE-2023-3307 (A vulnerability was found in miniCal 1.0.0. It has been rated as criti ...)
@@ -13,9 +13,9 @@ CVE-2023-35866 (In KeePassXC through 2.7.5, a local attacker can make changes to
 CVE-2023-35862 (libcoap 4.3.1 contains a buffer over-read via the function coap_parse_ ...)
 	TODO: check
 CVE-2023-35857 (In Siren Investigate before 13.2.2, session keys remain active even af ...)
-	TODO: check
+	NOT-FOR-US: Siren Investigate
 CVE-2023-35856 (A buffer overflow in Nintendo Mario Kart Wii RMCP01, RMCE01, RMCJ01, a ...)
-	TODO: check
+	NOT-FOR-US: Nintendo Mario Kart Wii
 CVE-2023-35855 (A buffer overflow in Counter-Strike through 8684 allows a game server  ...)
 	TODO: check
 CVE-2023-35853 (In Suricata before 6.0.13, an adversary who controls an external sourc ...)
@@ -41,15 +41,15 @@ CVE-2023-35829 (An issue was discovered in the Linux kernel before 6.3.2. A use-
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3228cec23b8b29215e18090c6ba635840190993d (6.4-rc1)
 CVE-2023-34657 (A stored cross-site scripting (XSS) vulnerability in Eyoucms v1.6.2 al ...)
-	TODO: check
+	NOT-FOR-US: Eyoucms
 CVE-2023-34642 (KioWare for Windows through v8.33 was discovered to contain an incompl ...)
-	TODO: check
+	NOT-FOR-US: KioWare for Windows
 CVE-2023-34641 (KioWare for Windows through v8.33 was discovered to contain an incompl ...)
-	TODO: check
+	NOT-FOR-US: KioWare for Windows
 CVE-2023-34603 (JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vuln ...)
-	TODO: check
+	NOT-FOR-US: JeecgBoot
 CVE-2023-34602 (JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vuln ...)
-	TODO: check
+	NOT-FOR-US: JeecgBoot
 CVE-2023-32542 (Out-of-bounds read vulnerability exists in TELLUS v4.0.15.0 and TELLUS ...)
 	TODO: check
 CVE-2023-32538 (Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 a ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da044f0223d07c6b6969266cb281cf6739591962

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da044f0223d07c6b6969266cb281cf6739591962
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230619/1acd8ef2/attachment.htm>


More information about the debian-security-tracker-commits mailing list