Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
ff235b62 by Salvatore Bonaccorso at 2020-06-26T22:14:33+02:00
Process more NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3,59 +3,59 @@ CVE-2020-15353
CVE-2020-15352
RESERVED
CVE-2020-15351 (IDrive before 6.7.3.19 on Windows installs by default to
%PROGRAMFILES ...)
- TODO: check
+ NOT-FOR-US: IDrive
CVE-2020-15350
RESERVED
CVE-2020-15349
RESERVED
CVE-2020-15348 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows use of
live/CPEManag ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15347 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the
q6xV4aW8bQ4cfD-b pa ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15346 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a /live/GLOBALS
API wit ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15345 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an
unauthenticated zy_g ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15344 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an
unauthenticated zy_g ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15343 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an
unauthenticated zy_i ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15342 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an
unauthenticated zy_i ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15341 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an
unauthenticated upda ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15340 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded
opt/axess/A ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15339 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows
live/CPEManager/AXCa ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15338 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET
Request M ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15337 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET
Request M ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15336 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has no
authentication for / ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15335 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has no
authentication for / ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15334 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows
escape-sequence inje ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15333 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows attackers to
discove ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15332 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak
/opt/axess/etc/def ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15331 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded
OAUTH_SECRE ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15330 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded
APP_KEY in ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15329 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak Data.fs
permission ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15328 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak
/opt/axess/var/blo ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15327 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 uses ZODB storage
without a ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15326 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded
certificate ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15325 (Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded
Erlang cook ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2020-15324
RESERVED
CVE-2020-15323
@@ -824,7 +824,7 @@ CVE-2020-14957
CVE-2020-14956
RESERVED
CVE-2020-14955 (In Jiangmin Antivirus 16.0.13.129, the driver file (KVFG.sys)
allows l ...)
- TODO: check
+ NOT-FOR-US: Jiangmin Antivirus
CVE-2020-14953
RESERVED
CVE-2020-14952
@@ -1812,7 +1812,7 @@ CVE-2020-14479
CVE-2020-14478
RESERVED
CVE-2020-14477 (In Philips Ultrasound ClearVue Versions 3.2 and prior,
Ultrasound CX V ...)
- TODO: check
+ NOT-FOR-US: Philips
CVE-2020-14476
RESERVED
CVE-2020-14475 (A reflected cross-site scripting (XSS) vulnerability in
Dolibarr 11.0. ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff235b62f747b18aea90010e5cf6cb3836c69c8e
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff235b62f747b18aea90010e5cf6cb3836c69c8e
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits