[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Oct 25 21:30:28 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
21b23d7e by Salvatore Bonaccorso at 2023-10-25T22:29:56+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2,117 +2,117 @@ CVE-2023-5717 (A heap out-of-bounds write vulnerability in the Linux kernel's Li
- linux <unfixed>
NOTE: https://git.kernel.org/linus/32671e3799ca2e4590773fd0e63aaa4229e50c06 (6.6-rc7)
CVE-2023-5671 (HP Print and Scan Doctor for Windows may potentially be vulnerable to ...)
- TODO: check
+ NOT-FOR-US: HP
CVE-2023-46564 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46563 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46562 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46560 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46559 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46558 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46557 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46556 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46555 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46554 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46553 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46552 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46551 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46550 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46549 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46548 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46547 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46546 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46545 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46544 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46543 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46542 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46541 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46540 (TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46539 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46538 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46537 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46536 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46535 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46534 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46527 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46526 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46525 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46523 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46522 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46521 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46520 (TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discover ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2023-46518 (Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a command ex ...)
- TODO: check
+ NOT-FOR-US: Mercury A15
CVE-2023-46424 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46423 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46422 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46421 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46420 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46419 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46418 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46417 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46416 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46415 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46414 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a rem ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46413 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46412 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46411 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46410 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46409 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46408 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
- TODO: check
+ NOT-FOR-US: TOTOLINK
CVE-2023-46396 (Audimex 15.0.0 is vulnerable to Cross Site Scripting (XSS) in /audimex ...)
TODO: check
CVE-2023-46102 (The Android Client application, when enrolled to the AppHub server, co ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/21b23d7ea3c3d2a26788640e045e54c1b895ba16
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/21b23d7ea3c3d2a26788640e045e54c1b895ba16
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231025/e82a139e/attachment.htm>
More information about the debian-security-tracker-commits
mailing list