[Git][security-tracker-team/security-tracker][master] Process NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jan 18 08:37:00 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e69dfef1 by Salvatore Bonaccorso at 2024-01-18T09:36:41+01:00
Process NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -6,83 +6,83 @@ CVE-2024-23525 (The Spreadsheet::ParseXLSX package before 0.30 for Perl allows X
CVE-2024-22416 (pyLoad is a free and open-source Download Manager written in pure Pyth ...)
- pyload <itp> (bug #1001980)
CVE-2024-22414 (flaskBlog is a simple blog app built with Flask. Improper storage and ...)
- TODO: check
+ NOT-FOR-US: flaskBlog
CVE-2024-22410 (Creditcoin is a network that enables cross-blockchain credit transacti ...)
TODO: check
CVE-2024-0655 (A vulnerability has been found in Novel-Plus 4.3.0-RC1 and classified ...)
- TODO: check
+ NOT-FOR-US: Novel-Plus
CVE-2024-0654 (A vulnerability, which was classified as problematic, was found in Dee ...)
- TODO: check
+ NOT-FOR-US: DeepFaceLab
CVE-2024-0652 (A vulnerability was found in PHPGurukul Company Visitor Management Sys ...)
- TODO: check
+ NOT-FOR-US: PHPGurukul Company Visitor Management System
CVE-2024-0651 (A vulnerability was found in PHPGurukul Company Visitor Management Sys ...)
- TODO: check
+ NOT-FOR-US: PHPGurukul Company Visitor Management System
CVE-2024-0650 (A vulnerability was found in Project Worlds Visitor Management System ...)
- TODO: check
+ NOT-FOR-US: Project Worlds Visitor Management System
CVE-2024-0649 (A vulnerability was found in ZhiHuiYun up to 4.4.13 and classified as ...)
- TODO: check
+ NOT-FOR-US: ZhiHuiYun
CVE-2024-0648 (A vulnerability has been found in Yunyou CMS up to 2.2.6 and classifie ...)
- TODO: check
+ NOT-FOR-US: Yunyou CMS
CVE-2024-0381 (The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6970 (The WP Recipe Maker plugin for WordPress is vulnerable to Reflected Cr ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6958 (The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6549 (Improper Restriction of Operations within the Bounds of a Memory Buffe ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2023-6548 (Improper Control of Generation of Code ('Code Injection') in NetScaler ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2023-6340 (SonicWall Capture Client version 3.7.10,NetExtender client version 10. ...)
- TODO: check
+ NOT-FOR-US: SonicWall
CVE-2023-6184 (Cross SiteScripting vulnerability in Citrix Session Recording allows a ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2023-5914 (Cross-site scripting (XSS))
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2023-48858 (A Cross-site scripting (XSS) vulnerability in login page php code in A ...)
- TODO: check
+ NOT-FOR-US: Armex ABO.CMS
CVE-2023-48359 (In autotest driver, there is a possible out of bounds write due to imp ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48358 (In drm driver, there is a possible out of bounds write due to a missin ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48357 (In vsp driver, there is a possible out of bounds write due to a missin ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48356 (In jpg driver, there is a possible out of bounds write due to a missin ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48355 (In jpg driver, there is a possible out of bounds write due to a missin ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48354 (In telephone service, there is a possible improper input validation. T ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48353 (In vsp driver, there is a possible use after free due to a logic error ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48352 (In phasecheckserver, there is a possible out of bounds write due to a ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48351 (In video decoder, there is a possible out of bounds write due to a mis ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48350 (In video decoder, there is a possible out of bounds write due to a mis ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48349 (In video decoder, there is a possible out of bounds write due to a mis ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48348 (In video decoder, there is a possible out of bounds write due to impro ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48347 (In video decoder, there is a possible out of bounds read due to improp ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48346 (In video decoder, there is a possible improper input validation. This ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48345 (In video decoder, there is a possible out of bounds read due to improp ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48344 (In video decoder, there is a possible out of bounds read due to improp ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48343 (In video decoder, there is a possible out of bounds write due to impro ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48342 (In media service, there is a possible out of bounds write due to a mis ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48341 (In video decoder, there is a possible out of bounds read due to improp ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48340 (In video decoder, there is a possible out of bounds write due to impro ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2023-48339 (In jpg driver, there is a possible missing permission check. This coul ...)
- TODO: check
+ NOT-FOR-US: Unisoc
CVE-2021-4433 (A vulnerability was found in Karjasoft Sami HTTP Server 2.0. It has be ...)
TODO: check
CVE-2024-22365 [pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations]
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e69dfef1eb0b126012a6aec3d7ba45a44542cf34
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e69dfef1eb0b126012a6aec3d7ba45a44542cf34
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240118/a6c51fc6/attachment.htm>
More information about the debian-security-tracker-commits
mailing list