Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
fe79fd33 by Salvatore Bonaccorso at 2022-12-31T09:39:56+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,9 +1,9 @@
 CVE-2022-4864 (Argument Injection in GitHub repository froxlor/froxlor prior 
to 2.0.0 ...)
        - froxlor <itp> (bug #581792)
 CVE-2017-20155 (A vulnerability was found in Sterc Google Analytics Dashboard 
for MODX ...)
-       TODO: check
+       NOT-FOR-US: Sterc Google Analytics Dashboard for MODX
 CVE-2017-20154 (A vulnerability was found in ghostlander Phoenixcoin. It has 
been clas ...)
-       TODO: check
+       NOT-FOR-US: ghostlander Phoenixcoin
 CVE-2022-4863 (Improper Handling of Insufficient Permissions or Privileges in 
GitHub  ...)
        NOT-FOR-US: usememos
 CVE-2022-4862
@@ -13,7 +13,7 @@ CVE-2022-4861 (Incorrect implementation in authentication 
protocol in M-Files Cl
 CVE-2022-4860 (A vulnerability was found in KBase Metrics. It has been 
classified as  ...)
        NOT-FOR-US: KBase Metrics
 CVE-2022-4859 (A vulnerability, which was classified as problematic, has been 
found i ...)
-       TODO: check
+       NOT-FOR-US: Joget
 CVE-2022-4858 (Insertion of Sensitive Information into Log Files in M-Files 
Server be ...)
        NOT-FOR-US: M-Files
 CVE-2022-4857 (A vulnerability was found in Modbus Tools Modbus Poll up to 
9.10.0 and ...)
@@ -35,13 +35,13 @@ CVE-2018-25060 (A vulnerability was found in Macaron csrf 
and classified as prob
 CVE-2018-25059 (A vulnerability was found in pastebinit up to 0.2.2 and 
classified as  ...)
        TODO: check
 CVE-2017-20153 (A vulnerability has been found in aerouk imageserve and 
classified as  ...)
-       TODO: check
+       NOT-FOR-US: aerouk imageserve
 CVE-2017-20152 (A vulnerability, which was classified as problematic, was 
found in aer ...)
-       TODO: check
+       NOT-FOR-US: aerouk imageserve
 CVE-2017-20151 (A vulnerability classified as problematic was found in iText 
RUPS. Thi ...)
        NOT-FOR-US: iText RUPS
 CVE-2022-48195 (An issue was discovered in Mellium mellium.im/sasl before 
0.3.1. When  ...)
-       TODO: check
+       NOT-FOR-US: Mellium
 CVE-2022-48194 (TP-Link TL-WR902AC devices through V3 0.9.1 allow remote 
authenticated ...)
        NOT-FOR-US: TP-Link
 CVE-2022-48193
@@ -782,7 +782,7 @@ CVE-2018-25052 (A vulnerability has been found in 
Catalyst-Plugin-Session up to
        - libcatalyst-plugin-session-perl 0.41-1
        NOTE: 
https://github.com/perl-catalyst/Catalyst-Plugin-Session/commit/88d1b599e1163761c9bd53bec53ba078f13e09d4
 (0.41)
 CVE-2018-25051 (A vulnerability, which was classified as problematic, was 
found in JmP ...)
-       TODO: check
+       NOT-FOR-US: JmPotato Pomash
 CVE-2018-25050 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: Harvest Chosen
 CVE-2017-20150 (A vulnerability was found in challenge website. It has been 
rated as c ...)
@@ -6432,49 +6432,49 @@ CVE-2022-46603
 CVE-2022-46602
        RESERVED
 CVE-2022-46601 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46600 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46599 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46598 (TRENDnet TEW755AP 1.13B01 was discovered to contain a command 
injectio ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46597 (TRENDnet TEW755AP 1.13B01 was discovered to contain a command 
injectio ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46596 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46595
        RESERVED
 CVE-2022-46594 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46593 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46592 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46591 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46590 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46589 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46588 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46587
        RESERVED
 CVE-2022-46586 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46585 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46584 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46583 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46582 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46581 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46580 (TRENDnet TEW755AP 1.13B01 was discovered to contain a stack 
overflow v ...)
-       TODO: check
+       NOT-FOR-US: TRENDnet
 CVE-2022-46579
        RESERVED
 CVE-2022-46578



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe79fd3348cd24ff1d2426359569e3b048ea129b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe79fd3348cd24ff1d2426359569e3b048ea129b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to