[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Oct 25 21:42:50 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d6fde674 by Salvatore Bonaccorso at 2023-10-25T22:42:19+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -114,29 +114,29 @@ CVE-2023-46409 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain
CVE-2023-46408 (TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a com ...)
NOT-FOR-US: TOTOLINK
CVE-2023-46396 (Audimex 15.0.0 is vulnerable to Cross Site Scripting (XSS) in /audimex ...)
- TODO: check
+ NOT-FOR-US: Audimex
CVE-2023-46102 (The Android Client application, when enrolled to the AppHub server, co ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-45851 (The Android Client application, when enrolled to the AppHub server,con ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-45844 (The vulnerability allows a low privileged user that have access to the ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-45321 (The Android Client application, when enrolled with the define method ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-45220 (The Android Client application, when enrolled with the define method 1 ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-45136 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-45135 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-45134 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-43488 (The vulnerability allows a low privileged (untrusted) application to m ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-42861 (A logic issue was addressed with improved state management. This issue ...)
- TODO: check
+ NOT-FOR-US: Apple
CVE-2023-42857 (A privacy issue was addressed with improved private data redaction for ...)
- TODO: check
+ NOT-FOR-US: Apple
CVE-2023-42856 (The issue was addressed with improved memory handling. This issue is f ...)
TODO: check
CVE-2023-42854 (This issue was addressed by removing the vulnerable code. This issue i ...)
@@ -160,21 +160,21 @@ CVE-2023-42842 (The issue was addressed with improved checks. This issue is fixe
CVE-2023-42841 (The issue was addressed with improved memory handling. This issue is f ...)
TODO: check
CVE-2023-42494 (EisBaer Scada - CWE-749: Exposed Dangerous Method or Function)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42493 (EisBaer Scada - CWE-256: Plaintext Storage of a Password)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42492 (EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42491 (EisBaer Scada - CWE-285: Improper Authorization)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42490 (EisBaer Scada - CWE-200: Exposure of Sensitive Information to an Unaut ...)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42489 (EisBaer Scada - CWE-732: Incorrect Permission Assignment for Critical ...)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42488 (EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a Restric ...)
- TODO: check
+ NOT-FOR-US: EisBaer Scada
CVE-2023-42438 (An inconsistent user interface issue was addressed with improved state ...)
- TODO: check
+ NOT-FOR-US: Apple
CVE-2023-41997 (This issue was addressed by restricting options offered on a locked de ...)
TODO: check
CVE-2023-41989 (The issue was addressed by restricting options offered on a locked dev ...)
@@ -192,11 +192,11 @@ CVE-2023-41976 (A use-after-free issue was addressed with improved memory manage
CVE-2023-41975 (This issue was addressed by removing the vulnerable code. This issue i ...)
TODO: check
CVE-2023-41960 (The vulnerability allows an unprivileged(untrusted) third-party applic ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-41372 (The vulnerability allows an unprivileged (untrusted) third- party appl ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-41255 (The vulnerability allows an unprivileged user with access to the subne ...)
- TODO: check
+ NOT-FOR-US: Bosch
CVE-2023-41254 (A privacy issue was addressed with improved private data redaction for ...)
TODO: check
CVE-2023-41077 (The issue was addressed with improved checks. This issue is fixed in m ...)
@@ -230,23 +230,23 @@ CVE-2023-40404 (A use-after-free issue was addressed with improved memory manage
CVE-2023-40401 (The issue was addressed with additional permissions checks. This issue ...)
TODO: check
CVE-2023-3010 (Grafana is an open-source platform for monitoring and observability. ...)
- TODO: check
+ NOT-FOR-US: Grafana plugin
CVE-2023-37913 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-37912 (XWiki Rendering is a generic Rendering system that converts textual in ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-37911 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-37910 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-37909 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-37908 (XWiki Rendering is a generic Rendering system that converts textual in ...)
- TODO: check
+ NOT-FOR-US: XWiki
CVE-2023-34447 (iTop is an open source, web-based IT service management platform. Prio ...)
- TODO: check
+ NOT-FOR-US: iTop
CVE-2023-34446 (iTop is an open source, web-based IT service management platform. Prio ...)
- TODO: check
+ NOT-FOR-US: iTop
CVE-2023-32359 (This issue was addressed with improved redaction of sensitive informat ...)
TODO: check
CVE-2023-46660 (Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time compari ...)
@@ -24208,7 +24208,7 @@ CVE-2023-2199 (An issue has been discovered in GitLab CE/EE affecting all versio
CVE-2023-2198 (An issue has been discovered in GitLab CE/EE affecting all versions st ...)
- gitlab 15.10.8+ds1-2
CVE-2023-30912 (A remote code execution issue exists in HPE OneView.)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2023-30911 (HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest ...)
NOT-FOR-US: HPE
CVE-2023-30910 (HPE MSA Controller prior to versionIN210R004 could be remotely exploit ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6fde674b25851db0360f4458aa86dc4f040722a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6fde674b25851db0360f4458aa86dc4f040722a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231025/e7a08b0c/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list