[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Mar 11 08:22:54 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
226e7b0b by Salvatore Bonaccorso at 2023-03-11T09:22:16+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -239,29 +239,29 @@ CVE-2023-28027
 CVE-2023-28026
 	RESERVED
 CVE-2023-1346 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1345 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1344 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1343 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1342 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1341 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1340 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1339 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1338 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1337 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1336 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1335 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
-	TODO: check
+	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1334 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
 	NOT-FOR-US: RapidLoad Power-Up for Autoptimize plugin for WordPress
 CVE-2023-1333 (The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnera ...)
@@ -8756,7 +8756,7 @@ CVE-2023-24977 (Out-of-bounds Read vulnerability in Apache Software Foundation A
 CVE-2023-24976
 	RESERVED
 CVE-2023-24975 (IBM Spectrum Symphony 7.3 is vulnerable to HTTP header injection, caus ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2023-24974
 	RESERVED
 CVE-2023-24973
@@ -33436,7 +33436,7 @@ CVE-2022-43904
 CVE-2022-43903
 	RESERVED
 CVE-2022-43902 (IBM MQ 9.2 CD, 9.2 LTS, 9.3 CD, and 9.3 LTS is vulnerable to a denial  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2022-43901 (IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.3 coul ...)
 	NOT-FOR-US: IBM
 CVE-2022-43900 (IBM WebSphere Automation for IBM Cloud Pak for Watson AIOps 1.4.2 coul ...)
@@ -238069,7 +238069,7 @@ CVE-2020-5004 (IBM Jazz Foundation products are vulnerable to cross-site scripti
 CVE-2020-5003 (IBM Financial Transaction Manager 3.2.4 is vulnerable to an XML Extern ...)
 	NOT-FOR-US: IBM
 CVE-2020-5002 (IBM Financial Transaction Manager 3.2.0 through 3.2.10 could allow an  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2020-5001 (IBM Financial Transaction Manager 3.2.0 through 3.2.7 could allow a re ...)
 	NOT-FOR-US: IBM
 CVE-2020-5000 (IBM Financial Transaction Manager 3.2.0 through 3.2.8 is vulnerable to ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/226e7b0befaa63136859c31341be51069bd2e552

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/226e7b0befaa63136859c31341be51069bd2e552
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230311/a911fa3f/attachment.htm>


More information about the debian-security-tracker-commits mailing list