Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8f904599 by Salvatore Bonaccorso at 2023-11-29T09:21:25+01:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,27 +1,27 @@
 CVE-2023-49092 (RustCrypto/RSA is a portable RSA implementation in pure Rust. 
Due to a ...)
        TODO: check
 CVE-2023-48193 (Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 
allows  ...)
-       TODO: check
+       NOT-FOR-US: JumpServer
 CVE-2023-47462 (Insecure Permissions vulnerability in GL.iNet AX1800 v.3.215 
and befor ...)
-       TODO: check
+       NOT-FOR-US: GL.iNet AX1800
 CVE-2023-46944 (An issue in GitKraken GitLens before v.14.0.0 allows an 
attacker to ex ...)
        TODO: check
 CVE-2023-46887 (In Dreamer CMS before 4.0.1, the backend attachment management 
office  ...)
-       TODO: check
+       NOT-FOR-US: Dreamer CMS
 CVE-2023-46886 (Dreamer CMS before version 4.0.1 is vulnerable to Directory 
Traversal. ...)
-       TODO: check
+       NOT-FOR-US: Dreamer CMS
 CVE-2023-45484 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-45483 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-45482 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-45481 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-45480 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-45479 (Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was 
discovered to con ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2023-6351
        - chromium <unfixed>
        [buster] - chromium <end-of-life> (see DSA 5046)
@@ -59,7 +59,7 @@ CVE-2023-49078 (raptor-web is a CMS for game server 
communities that can be used
 CVE-2023-49062 (Katran could disclose non-initialized kernel memory as part of 
an IP h ...)
        TODO: check
 CVE-2023-48848 (An arbitrary file read vulnerability in ureport v2.2.9 allows 
a remote ...)
-       TODO: check
+       NOT-FOR-US: ureport
 CVE-2023-48121 (An authentication bypass vulnerability in the Direct 
Connection Module ...)
        NOT-FOR-US: Direct Connection Module in Ezviz
 CVE-2023-48042 (Amazzing Filter for Prestashop through 3.2.2 is vulnerable to 
Cross-Si ...)
@@ -277,9 +277,9 @@ CVE-2023-49042 (Heap Overflow vulnerability in Tenda AX1803 
v.1.0.0.1 allows a r
 CVE-2023-49040 (An issue in Tneda AX1803 v.1.0.0.1 allows a remote attacker to 
execute ...)
        NOT-FOR-US: Tenda
 CVE-2023-49029 (Cross Site Scripting vulnerability in smpn1smg absis 
v.2017-10-19 and  ...)
-       TODO: check
+       NOT-FOR-US: smpn1smg absis
 CVE-2023-49028 (Cross Site Scripting vulnerability in smpn1smg absis 
v.2017-10-19 and  ...)
-       TODO: check
+       NOT-FOR-US: smpn1smg absis
 CVE-2023-48369 (Mattermost fails to limit the log size of server logs allowing 
an atta ...)
        - mattermost-server <itp> (bug #823556)
 CVE-2023-48268 (Mattermost fails tolimit the amount of data extracted from 
compressed  ...)
@@ -35077,17 +35077,17 @@ CVE-2023-29068 (A maliciously crafted file consumed 
through pskernel.dll file co
 CVE-2023-29067 (A maliciously crafted X_B file when parsed through 
Autodesk\xae AutoCA ...)
        NOT-FOR-US: Autodesk
 CVE-2023-29066 (The FACSChorus software does not properly assign data access 
privilege ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29065 (The FACSChorus software database can be accessed directly with 
the pri ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29064 (The FACSChorus software contains sensitive information stored 
in plain ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29063 (The FACSChorus workstation does not prevent physical access to 
its PCI ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29062 (The Operating System hosting the FACSChorus application is 
configured  ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29061 (There is no BIOS password on the FACSChorus workstation. A 
threat acto ...)
-       TODO: check
+       NOT-FOR-US: FACSChorus
 CVE-2023-29060 (The FACSChorus workstation operating system does not restrict 
what dev ...)
        NOT-FOR-US: facschorus
 CVE-2023-1764 (Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 
10.9.5 ...)
@@ -50095,7 +50095,7 @@ CVE-2023-24296
 CVE-2023-24295 (A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 
allows at ...)
        NOT-FOR-US: SoftMaker Software GmbH FlexiPDF
 CVE-2023-24294 (Zumtobel Netlink CCD Onboard v3.74 - Firmware v3.80 was 
discovered to  ...)
-       TODO: check
+       NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-24293
        RESERVED
 CVE-2023-24292
@@ -52951,9 +52951,9 @@ CVE-2023-23327 (An Information Disclosure vulnerability 
exists in AvantFAX 3.3.7
 CVE-2023-23326 (A Stored Cross-Site Scripting (XSS) vulnerability exists in 
AvantFAX 3 ...)
        NOT-FOR-US: AvantFAX
 CVE-2023-23325 (Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was 
discovered to co ...)
-       TODO: check
+       NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-23324 (Zumtobel Netlink CCD Onboard 3.74 - Firmware 3.80 was 
discovered to co ...)
-       TODO: check
+       NOT-FOR-US: Zumtobel Netlink CCD Onboard
 CVE-2023-23323
        RESERVED
 CVE-2023-23322



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f9045997f066fcdf4f7765cb640645ab89b6d6b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8f9045997f066fcdf4f7765cb640645ab89b6d6b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to