Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
04fcf8ef by Salvatore Bonaccorso at 2022-08-04T22:18:17+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2851,45 +2851,45 @@ CVE-2022-2467 (A vulnerability has been found in 
SourceCodester Garage Managemen
 CVE-2016-15004 (A vulnerability was found in InfiniteWP Client Plugin 
1.5.1.3/1.6.0. I ...)
        NOT-FOR-US: InfiniteWP
 CVE-2022-35735 (In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 
15.1.6.1, 14. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35728 (In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 
16.1.3.1, 15. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35272 (In BIG-IP Versions 17.0.x before 17.0.0.1 and 16.1.x before 
16.1.3.1,  ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35245 (In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 
15.1.6.1, and ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35243 (In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 
15.1.5.1, 14.1. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35241 (In versions 2.x before 2.3.1 and all versions of 1.x, when 
NGINX Insta ...)
        TODO: check
 CVE-2022-35240 (In BIG-IP Versions 16.1.x before 16.1.2.2, 15.1.x before 
15.1.6.1, and ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-35236 (In BIG-IP Versions 16.1.x before 16.1.2.2, 15.1.x before 
15.1.6.1, and ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34865 (In BIG-IP Versions 15.1.x before 15.1.6.1, 14.1.x before 
14.1.5, and a ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34862 (In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 
15.1.6.1, 14. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34851 (In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 
16.1.3.1, 15. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34844 (In BIG-IP Versions 16.1.x before 16.1.3.1 and 15.1.x before 
15.1.6.1,  ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34655 (In BIG-IP Versions 16.0.x before 16.0.1.1, 15.1.x before 
15.1.6.1, and ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-34651 (In BIG-IP Versions 16.1.x before 16.1.3.1 and 15.1.x before 
15.1.6.1,  ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-33968 (In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 
16.1.3.1, 15. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-33962 (In BIG-IP Versions 17.0.x before 17.0.0.1, 16.1.x before 
16.1.3.1, 15. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-33947 (In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 
15.1.6.1, 14.1. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-33203 (In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 
15.1.6.1, and 1 ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-32455 (In BIG-IP Versions 16.1.x before 16.1.2.2, 15.1.x before 
15.1.6.1, 14. ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-31473 (In BIG-IP Versions 16.1.x before 16.1.1 and 15.1.x before 
15.1.4, when ...)
-       TODO: check
+       NOT-FOR-US: F5 BIG-IP
 CVE-2022-30535 (In versions 2.x before 2.3.0 and all versions of 1.x, An 
attacker auth ...)
        TODO: check
 CVE-2022-2466



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04fcf8ef5faddf59adfd636f93c60f1864a43513

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/04fcf8ef5faddf59adfd636f93c60f1864a43513
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to