[Git][security-tracker-team/security-tracker][master] Process NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Jan 18 08:37:00 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e69dfef1 by Salvatore Bonaccorso at 2024-01-18T09:36:41+01:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -6,83 +6,83 @@ CVE-2024-23525 (The Spreadsheet::ParseXLSX package before 0.30 for Perl allows X
 CVE-2024-22416 (pyLoad is a free and open-source Download Manager written in pure Pyth ...)
 	- pyload <itp> (bug #1001980)
 CVE-2024-22414 (flaskBlog is a simple blog app built with Flask. Improper storage and  ...)
-	TODO: check
+	NOT-FOR-US: flaskBlog
 CVE-2024-22410 (Creditcoin is a network that enables cross-blockchain credit transacti ...)
 	TODO: check
 CVE-2024-0655 (A vulnerability has been found in Novel-Plus 4.3.0-RC1 and classified  ...)
-	TODO: check
+	NOT-FOR-US: Novel-Plus
 CVE-2024-0654 (A vulnerability, which was classified as problematic, was found in Dee ...)
-	TODO: check
+	NOT-FOR-US: DeepFaceLab
 CVE-2024-0652 (A vulnerability was found in PHPGurukul Company Visitor Management Sys ...)
-	TODO: check
+	NOT-FOR-US: PHPGurukul Company Visitor Management System
 CVE-2024-0651 (A vulnerability was found in PHPGurukul Company Visitor Management Sys ...)
-	TODO: check
+	NOT-FOR-US: PHPGurukul Company Visitor Management System
 CVE-2024-0650 (A vulnerability was found in Project Worlds Visitor Management System  ...)
-	TODO: check
+	NOT-FOR-US: Project Worlds Visitor Management System
 CVE-2024-0649 (A vulnerability was found in ZhiHuiYun up to 4.4.13 and classified as  ...)
-	TODO: check
+	NOT-FOR-US: ZhiHuiYun
 CVE-2024-0648 (A vulnerability has been found in Yunyou CMS up to 2.2.6 and classifie ...)
-	TODO: check
+	NOT-FOR-US: Yunyou CMS
 CVE-2024-0381 (The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-6970 (The WP Recipe Maker plugin for WordPress is vulnerable to Reflected Cr ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-6958 (The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2023-6549 (Improper Restriction of Operations within the Bounds of a Memory Buffe ...)
-	TODO: check
+	NOT-FOR-US: Citrix
 CVE-2023-6548 (Improper Control of Generation of Code ('Code Injection') in NetScaler ...)
-	TODO: check
+	NOT-FOR-US: Citrix
 CVE-2023-6340 (SonicWall Capture Client version 3.7.10,NetExtender client version 10. ...)
-	TODO: check
+	NOT-FOR-US: SonicWall
 CVE-2023-6184 (Cross SiteScripting vulnerability in Citrix Session Recording allows a ...)
-	TODO: check
+	NOT-FOR-US: Citrix
 CVE-2023-5914 (Cross-site scripting (XSS))
-	TODO: check
+	NOT-FOR-US: Citrix
 CVE-2023-48858 (A Cross-site scripting (XSS) vulnerability in login page php code in A ...)
-	TODO: check
+	NOT-FOR-US: Armex ABO.CMS
 CVE-2023-48359 (In autotest driver, there is a possible out of bounds write due to imp ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48358 (In drm driver, there is a possible out of bounds write due to a missin ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48357 (In vsp driver, there is a possible out of bounds write due to a missin ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48356 (In jpg driver, there is a possible out of bounds write due to a missin ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48355 (In jpg driver, there is a possible out of bounds write due to a missin ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48354 (In telephone service, there is a possible improper input validation. T ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48353 (In vsp driver, there is a possible use after free due to a logic error ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48352 (In phasecheckserver, there is a possible out of bounds write due to a  ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48351 (In video decoder, there is a possible out of bounds write due to a mis ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48350 (In video decoder, there is a possible out of bounds write due to a mis ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48349 (In video decoder, there is a possible out of bounds write due to a mis ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48348 (In video decoder, there is a possible out of bounds write due to impro ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48347 (In video decoder, there is a possible out of bounds read due to improp ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48346 (In video decoder, there is a possible improper input validation. This  ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48345 (In video decoder, there is a possible out of bounds read due to improp ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48344 (In video decoder, there is a possible out of bounds read due to improp ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48343 (In video decoder, there is a possible out of bounds write due to impro ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48342 (In media service, there is a possible out of bounds write due to a mis ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48341 (In video decoder, there is a possible out of bounds read due to improp ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48340 (In video decoder, there is a possible out of bounds write due to impro ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2023-48339 (In jpg driver, there is a possible missing permission check. This coul ...)
-	TODO: check
+	NOT-FOR-US: Unisoc
 CVE-2021-4433 (A vulnerability was found in Karjasoft Sami HTTP Server 2.0. It has be ...)
 	TODO: check
 CVE-2024-22365 [pam_namespace: protect_dir(): use O_DIRECTORY to prevent local DoS situations]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e69dfef1eb0b126012a6aec3d7ba45a44542cf34

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e69dfef1eb0b126012a6aec3d7ba45a44542cf34
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240118/a6c51fc6/attachment.htm>


More information about the debian-security-tracker-commits mailing list