[Git][security-tracker-team/security-tracker][master] Process NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Nov 29 08:21:51 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8f904599 by Salvatore Bonaccorso at 2023-11-29T09:21:25+01:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,27 +1,27 @@
 CVE-2023-49092 (RustCrypto/RSA is a portable RSA implementation in pure Rust. Due to a ...)
 	TODO: check
 CVE-2023-48193 (Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows  ...)
-	TODO: check
+	NOT-FOR-US: JumpServer
 CVE-2023-47462 (Insecure Permissions vulnerability in GL.iNet AX1800 v.3.215 and befor ...)
-	TODO: check
+	NOT-FOR-US: GL.iNet AX1800
 CVE-2023-46944 (An issue in GitKraken GitLens before v.14.0.0 allows an attacker to ex ...)
 	TODO: check
 CVE-2023-46887 (In Dreamer CMS before 4.0.1, the backend attachment management office  ...)
-	TODO: check
+	NOT-FOR-US: Dreamer CMS
 CVE-2023-46886 (Dreamer CMS before version 4.0.1 is vulnerable to Directory Traversal. ...)
-	TODO: check
+	NOT-FOR-US: Dreamer CMS
 CVE-2023-45484 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-45483 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-45482 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-45481 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-45480 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-45479 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to con ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2023-6351
 	- chromium <unfixed>
 	[buster] - chromium <end-of-life> (see DSA 5046)
@@ -59,7 +59,7 @@ CVE-2023-49078 (raptor-web is a CMS for game server communities that can be used
 CVE-2023-49062 (Katran could disclose non-initialized kernel memory as part of an IP h ...)
 	TODO: check
 CVE-2023-48848 (An arbitrary file read vulnerability in ureport v2.2.9 allows a remote ...)
-	TODO: check
+	NOT-FOR-US: ureport
 CVE-2023-48121 (An authentication bypass vulnerability in the Direct Connection Module ...)
 	NOT-FOR-US: Direct Connection Module in Ezviz
 CVE-2023-48042 (Amazzing Filter for Prestashop through 3.2.2 is vulnerable to Cross-Si ...)
@@ -277,9 +277,9 @@ CVE-2023-49042 (Heap Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a r
 CVE-2023-49040 (An issue in Tneda AX1803 v.1.0.0.1 allows a remote attacker to execute ...)
 	NOT-FOR-US: Tenda
 CVE-2023-49029 (Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and  ...)
-	TODO: check
+	NOT-FOR-US: smpn1smg absis
 CVE-2023-49028 (Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and  ...)
-	TODO: check
+	NOT-FOR-US: smpn1smg absis
 CVE-2023-48369 (Mattermost fails to limit the log size of server logs allowing an atta ...)
 	- mattermost-server <itp> (bug #823556)
 CVE-2023-48268 (Mattermost fails tolimit the amount of data extracted from compressed  ...)
@@ -35077,17 +35077,17 @@ CVE-2023-29068 (A maliciously crafted file consumed through pskernel.dll file co
 CVE-2023-29067 (A maliciously crafted X_B file when parsed through Autodesk\xae AutoCA ...)
 	NOT-FOR-US: Autodesk
 CVE-2023-29066 (The FACSChorus software does not properly assign data access privilege ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29065 (The FACSChorus software database can be accessed directly with the pri ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29064 (The FACSChorus software contains sensitive information stored in plain ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29063 (The FACSChorus workstation does not prevent physical access to its PCI ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29062 (The Operating System hosting the FACSChorus application is configured  ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29061 (There is no BIOS password on the FACSChorus workstation. A threat acto ...)
-	TODO: check
+	NOT-FOR-US: FACSChorus
 CVE-2023-29060 (The FACSChorus workstation operating system does not restrict what dev ...)
 	NOT-FOR-US: facschorus
 CVE-2023-1764 (Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5 ...)
@@ -50095,7 +50095,7 @@ CVE-2023-24296
 CVE-2023-24295 (A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows at ...)
 	NOT-FOR-US: SoftMaker Software GmbH FlexiPDF
 CVE-2023-24294 (Zumtobel Netlink CCD Onboard v3.74 - Firmware v3.80 was discovered to  ...)
-	TODO: check
+	NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-24293
 	RESERVED
 CVE-2023-24292
@@ -52951,9 +52951,9 @@ CVE-2023-23327 (An Information Disclosure vulnerability exists in AvantFAX 3.3.7
 CVE-2023-23326 (A Stored Cross-Site Scripting (XSS) vulnerability exists in AvantFAX 3 ...)
 	NOT-FOR-US: AvantFAX
 CVE-2023-23325 (Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was discovered to co ...)
-	TODO: check
+	NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-23324 (Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was discovered to co ...)
-	TODO: check
+	NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-23323
 	RESERVED
 CVE-2023-23322



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f9045997f066fcdf4f7765cb640645ab89b6d6b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f9045997f066fcdf4f7765cb640645ab89b6d6b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231129/2be0f9f5/attachment.htm>


More information about the debian-security-tracker-commits mailing list