Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 6b04ae15 by Salvatore Bonaccorso at 2020-03-24T09:15:13+01:00 Process some NFUs - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,7 +1,7 @@ CVE-2020-10880 RESERVED CVE-2020-10879 (rConfig before 3.9.5 allows injection because lib/crud/search.crud.php ...) - TODO: check + NOT-FOR-US: rConfig CVE-2020-10878 RESERVED CVE-2020-10877 @@ -9,15 +9,15 @@ CVE-2020-10877 CVE-2020-10876 RESERVED CVE-2020-10875 (Motorola FX9500 devices allow remote attackers to conduct absolute pat ...) - TODO: check + NOT-FOR-US: Motorola devices CVE-2020-10874 (Motorola FX9500 devices allow remote attackers to read database files. ...) - TODO: check + NOT-FOR-US: Motorola devices CVE-2020-10873 RESERVED CVE-2020-10872 RESERVED CVE-2020-10871 (** DISPUTED ** In OpenWrt LuCI git-20.x, remote unauthenticated attack ...) - TODO: check + NOT-FOR-US: OpenWrt LuCI CVE-2020-10870 (Zim through 0.72.1 creates temporary directories with predictable name ...) - zim <unfixed> (unimportant; bug #954810) NOTE: https://github.com/zim-desktop-wiki/zim-desktop-wiki/issues/1028 @@ -4734,7 +4734,7 @@ CVE-2020-8870 CVE-2020-8869 RESERVED CVE-2020-8868 (This vulnerability allows remote attackers to execute arbitrary code o ...) - TODO: check + NOT-FOR-US: Quest Foglight Evolve CVE-2020-8867 RESERVED CVE-2020-8866 (This vulnerability allows remote attackers to create arbitrary files o ...) @@ -4742,9 +4742,9 @@ CVE-2020-8866 (This vulnerability allows remote attackers to create arbitrary fi CVE-2020-8865 (This vulnerability allows remote attackers to execute local PHP files ...) TODO: check CVE-2020-8864 (This vulnerability allows network-adjacent attackers to bypass authent ...) - TODO: check + NOT-FOR-US: D-Link CVE-2020-8863 (This vulnerability allows network-adjacent attackers to bypass authent ...) - TODO: check + NOT-FOR-US: D-Link CVE-2020-8862 (This vulnerability allows network-adjacent attackers to bypass authent ...) NOT-FOR-US: D-Link CVE-2020-8861 (This vulnerability allows network-adjacent attackers to bypass authent ...) @@ -7891,13 +7891,13 @@ CVE-2020-7483 CVE-2020-7482 (A CWE-79:Improper Neutralization of Input During Web Page Generation ( ...) TODO: check CVE-2020-7481 (A CWE-79:Improper Neutralization of Input During Web Page Generation ( ...) - TODO: check + NOT-FOR-US: Andover Continuum CVE-2020-7480 (A CWE-94: Improper Control of Generation of Code ('Code Injection') vu ...) - TODO: check + NOT-FOR-US: Andover Continuum CVE-2020-7479 (A CWE-306: Missing Authentication for Critical Function vulnerability ...) - TODO: check + NOT-FOR-US: IGSS CVE-2020-7478 (A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ...) - TODO: check + NOT-FOR-US: IGSS CVE-2020-7477 (A CWE-754: Improper Check for Unusual or Exceptional Conditions vulner ...) TODO: check CVE-2020-7476 (A CWE-426: Untrusted Search Path vulnerability exists in ZigBee Instal ...) @@ -9089,7 +9089,7 @@ CVE-2020-6969 (It is possible to unmask credentials and other sensitive informat CVE-2020-6968 (Honeywell INNCOM INNControl 3 allows workstation users to escalate app ...) NOT-FOR-US: Honeywell CVE-2020-6967 (In Rockwell Automation all versions of FactoryTalk Diagnostics softwar ...) - TODO: check + NOT-FOR-US: Rockwell CVE-2020-6966 (In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetr ...) NOT-FOR-US: ApexPro Telemetry Server CVE-2020-6965 (In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetr ...) @@ -11901,7 +11901,7 @@ CVE-2020-5724 CVE-2020-5723 RESERVED CVE-2020-5722 (The HTTP interface of the Grandstream UCM6200 series is vulnerable to ...) - TODO: check + NOT-FOR-US: Grandstream CVE-2020-5721 RESERVED CVE-2020-5720 (MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerab ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b04ae15865128d19340cd1aafeda4a71b52fef0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b04ae15865128d19340cd1aafeda4a71b52fef0 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits