diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-12-20 22:05:46 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-12-20 22:05:46 +0100 |
commit | 113b4b3106295605c8fd36684c2635d83089d345 (patch) | |
tree | ae34ce2a92779eedc410fd350a8c138d09a6daa5 | |
parent | f5e72a8ac9e604c47500eacd59e3863ec84e7df3 (diff) |
Drop invalid CVE id for python-asyncssh
The valid CVEs are already covered with CVE-2023-46445, CVE-2023-46446
and CVE-2023-48795.
-rw-r--r-- | data/CVE/list | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/data/CVE/list b/data/CVE/list index 8ed3c883e0..06d5757696 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -618,9 +618,6 @@ CVE-2023-32725 (The website configured in the URL widget will receive a session TODO: check CVE-2023-32230 (An improper handling of a malformed API request to an API server in Bo ...) NOT-FOR-US: Bosch -CVE-2023-46447 [Rogue Session Attack in AsyncSSH] - - python-asyncssh <unfixed> - NOTE: https://terrapin-attack.com/ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, found in O ...) - dropbear <unfixed> (bug #1059001) - erlang 1:25.3.2.8+dfsg-1 (bug #1059002) @@ -7025,6 +7022,7 @@ CVE-2023-46445 (An issue in AsyncSSH before 2.14.1 allows attackers to control t [bullseye] - python-asyncssh <no-dsa> (Minor issue) [buster] - python-asyncssh <no-dsa> (Minor issue) NOTE: https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 + NOTE: https://terrapin-attack.com/ CVE-2023-46021 (SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank ...) NOT-FOR-US: Code-Projects Blood Bank CVE-2023-46020 (Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood ...) |