Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5e845814 by Moritz Muehlenhoff at 2019-03-25T16:26:08Z
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,5 +1,5 @@
 CVE-2019-10027 (PHPCMS 9.6.x through 9.6.3 has XSS via the mailbox (aka 
E-mail) field  ...)
-       TODO: check
+       NOT-FOR-US: PHPCMS
 CVE-2019-10026 (An issue was discovered in Xpdf 4.01.01. There is an FPE in 
the functi ...)
        TODO: check
 CVE-2019-10025 (An issue was discovered in Xpdf 4.01.01. There is an FPE in 
the functi ...)
@@ -19,13 +19,13 @@ CVE-2019-10019 (An issue was discovered in Xpdf 4.01.01. 
There is an FPE in the
 CVE-2019-10018 (An issue was discovered in Xpdf 4.01.01. There is an FPE in 
the functi ...)
        TODO: check
 CVE-2019-10017 (CMS Made Simple 2.2.10 has XSS via the moduleinterface.php 
Name field, ...)
-       TODO: check
+       NOT-FOR-US: CMS Made Simple
 CVE-2019-10016 (GForge Advanced Server 6.4.4 allows XSS via the 
commonsearch.php words ...)
        TODO: check
 CVE-2019-10015 (baigoStudio baigoSSO v3.0.1 allows remote attackers to execute 
arbitra ...)
-       TODO: check
+       NOT-FOR-US: baigoStudio
 CVE-2019-10014 (In DedeCMS 5.7SP2, member/resetpassword.php allows remote 
authenticate ...)
-       TODO: check
+       NOT-FOR-US: DedeCMS
 CVE-2019-9999
        RESERVED
 CVE-2019-9998
@@ -17780,7 +17780,7 @@ CVE-2018-20167 (Terminology before 1.3.1 allows Remote 
Code Execution because po
        NOTE: https://phab.enlightenment.org/T7504
        NOTE: 
https://git.enlightenment.org/apps/terminology.git/commit/?id=1ac204da9148e7bccb1b5f34b523e2094dfc39e2
 CVE-2018-20165 (Cross-site scripting (XSS) vulnerability in OpenText Portal 
7.4.4 allo ...)
-       TODO: check
+       NOT-FOR-US: OpenText Portal
 CVE-2018-20164 (An issue was discovered in regex.yaml (aka regexes.yaml) in 
UA-Parser  ...)
        - uap-core 20190213-1 (bug #922717)
        NOTE: 
https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/5e845814d1637964c9bac78593b6e6c3a08ae66c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/5e845814d1637964c9bac78593b6e6c3a08ae66c
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to