[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Sep 21 19:30:36 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4a930978 by Salvatore Bonaccorso at 2024-09-21T20:30:15+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -119269,7 +119269,7 @@ CVE-2023-27585 (PJSIP is a free and open source multimedia communication library
 	NOTE: https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
 	NOTE: https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
 CVE-2023-27584 (Dragonfly is an open source P2P-based file distribution and image acce ...)
-	TODO: check
+	NOT-FOR-US: Dragonfly
 CVE-2023-27583 (PanIndex is a network disk directory index. In Panindex prior to versi ...)
 	NOT-FOR-US: PanIndex
 CVE-2023-27582 (maddy is a composable, all-in-one mail server. Starting with version 0 ...)
@@ -138979,7 +138979,7 @@ CVE-2022-4535
 CVE-2022-4534
 	RESERVED
 CVE-2022-4533 (The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2022-4532 (The LOGIN AND REGISTRATION ATTEMPTS LIMIT plugin for WordPress is vuln ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2022-4531
@@ -204081,13 +204081,13 @@ CVE-2022-25779 (Logging of Excessive Data vulnerability in audit log of Secomea
 CVE-2022-25778 (Cross-Site Request Forgery (CSRF) vulnerability in Web UI of Secomea G ...)
 	NOT-FOR-US: Secomea
 CVE-2022-25777 (Prior to the patched version, an authenticated user of Mautic could re ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25776 (Prior to the patched version, logged in users of Mautic are able to ac ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25775 (Prior to the patched version, logged in users of Mautic are vulnerable ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25774 (Prior to the patched version, logged in users of Mautic are vulnerable ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25773
 	RESERVED
 CVE-2022-25772 (A cross-site scripting (XSS) vulnerability in the web tracking compone ...)
@@ -204095,11 +204095,11 @@ CVE-2022-25772 (A cross-site scripting (XSS) vulnerability in the web tracking c
 CVE-2022-25771
 	RESERVED
 CVE-2022-25770 (Mautic allows you to update the application via an upgrade script.  Th ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25769 (ImpactThe default .htaccess file has some restrictions in the access t ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25768 (The logic in place to facilitate the update process via the user inter ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2022-25763 (Improper Input Validation vulnerability in HTTP/2 request validation o ...)
 	{DSA-5206-1 DLA-3279-1}
 	- trafficserver 9.1.3+ds-1
@@ -269151,11 +269151,11 @@ CVE-2021-3420 (A flaw was found in newlib in versions prior to 4.0.0. Improper o
 	NOTE: Fix in picolibc: https://keithp.com/cgit/picolibc.git/commit/newlib/libc/stdlib/mallocr.c?id=aa106b29a6a8a1b0df9e334704292cbc32f2d44e
 	NOTE: https://sourceware.org/git/?p=newlib-cygwin.git;a=commit;h=aa106b29a6a8a1b0df9e334704292cbc32f2d44e
 CVE-2021-27917 (Prior to this patch, a stored XSS vulnerability existed in the contact ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2021-27916 (Prior to the patched version, logged in users of Mautic are vulnerable ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2021-27915 (Prior to the patched version, there is an XSS vulnerability in the des ...)
-	TODO: check
+	NOT-FOR-US: Mautic
 CVE-2021-27914 (A cross-site scripting (XSS) vulnerability in the installer component  ...)
 	NOT-FOR-US: installer component of Mautic
 CVE-2021-27913 (The function mt_rand is used to generate session tokens, this function ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a9309788ef83470a55a184f706974f20267924e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a9309788ef83470a55a184f706974f20267924e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240921/c8b12337/attachment.htm>


More information about the debian-security-tracker-commits mailing list