[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Apr 22 11:49:26 BST 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
868ccb12 by Moritz Muehlenhoff at 2024-04-22T12:48:59+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -17,17 +17,17 @@ CVE-2024-32693 (Cross-Site Request Forgery (CSRF) vulnerability in ValvePress Au
 CVE-2024-32690 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-32418 (An issue in flusity CMS v2.33 allows a remote attacker to execute arbi ...)
-	TODO: check
+	NOT-FOR-US: flusity CMS
 CVE-2024-30799 (An issue in PX4 Autopilot v1.14 and before allows a remote attacker to ...)
-	TODO: check
+	NOT-FOR-US: PX4 Autopilot
 CVE-2024-28722 (Cross Site Scripting vulnerability in Innovaphone myPBX v.14r1, v.13r3 ...)
-	TODO: check
+	NOT-FOR-US: Innovaphone
 CVE-2023-7252 (The Tickera  WordPress plugin before 3.5.2.5 does not prevent users fr ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2018-25101 (A vulnerability, which was classified as problematic, has been found i ...)
-	TODO: check
+	NOT-FOR-US: Koha Library Management System
 CVE-2015-10132 (A vulnerability classified as problematic was found in Thimo Grauerhol ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-32041 [OutOfBound Read in zgfx_decompress_segment]
 	- freerdp3 <not-affected> (Fixed with initial upload to Debian unstable)
 	- freerdp2 <unfixed>
@@ -89,7 +89,7 @@ CVE-2024-31991 (Mealie is a self hosted recipe manager and meal planner. Prior t
 CVE-2024-31584 (Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the  ...)
 	TODO: check
 CVE-2024-30974 (SQL Injection vulnerability in autoexpress v.1.3.0 allows attackers to ...)
-	TODO: check
+	NOT-FOR-US: autoexpress
 CVE-2024-22905 (Buffer Overflow vulnerability in ARM mbed-os v.6.17.0 allows a remote  ...)
 	NOT-FOR-US: ARM mbed-os
 CVE-2024-1730 (The Prime Slider \u2013 Addons For Elementor (Revolution of a slider,  ...)
@@ -127,7 +127,7 @@ CVE-2024-3470 (An Improper Privilege Management vulnerability was identified in
 CVE-2024-32683 (Authorization Bypass Through User-Controlled Key vulnerability in Wpme ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-32652 (The adapter @hono/node-server allows you to run your Hono application  ...)
-	TODO: check
+	NOT-FOR-US: @hono/node-server
 CVE-2024-32650 (Rustls is a modern TLS library written in Rust. `rustls::ConnectionCom ...)
 	TODO: check
 CVE-2024-32644 (Evmos is a scalable, high-throughput Proof-of-Stake EVM blockchain tha ...)
@@ -144,7 +144,7 @@ CVE-2024-32409 (An issue in SEMCMS v.4.8 allows a remote attacker to execute arb
 CVE-2024-32206 (A stored cross-site scripting (XSS) vulnerability in the component \af ...)
 	NOT-FOR-US: WUZHICMS
 CVE-2024-32166 (Webid v1.2.1 suffers from an Insecure Direct Object Reference (IDOR) - ...)
-	TODO: check
+	NOT-FOR-US: Webid
 CVE-2024-32038 (Wazuh is a free and open source platform used for threat prevention, d ...)
 	NOT-FOR-US: Wazuh
 CVE-2024-31846 (An issue was discovered in Italtel Embrace 1.6.4. The web application  ...)
@@ -235,13 +235,13 @@ CVE-2024-29957 (When Brocade SANnav before v2.3.1 and v2.3.0a servers are config
 CVE-2024-29204 (A Heap Overflow vulnerability in WLAvalancheService component of Ivant ...)
 	NOT-FOR-US: Ivanti
 CVE-2024-29183 (OpenRASP is a RASP solution that directly integrates its protection en ...)
-	TODO: check
+	NOT-FOR-US: OpenRASP
 CVE-2024-29030 (memos is a privacy-first, lightweight note-taking service. In memos 0. ...)
-	TODO: check
+	NOT-FOR-US: memos
 CVE-2024-29029 (memos is a privacy-first, lightweight note-taking service. In memos 0. ...)
-	TODO: check
+	NOT-FOR-US: memos
 CVE-2024-29028 (memos is a privacy-first, lightweight note-taking service. In memos 0. ...)
-	TODO: check
+	NOT-FOR-US: memos
 CVE-2024-27984 (A Path Traversal vulnerability in web component of Ivanti Avalanche be ...)
 	NOT-FOR-US: Ivanti
 CVE-2024-27978 (A Null Pointer Dereference vulnerability in WLAvalancheService compone ...)
@@ -307,9 +307,9 @@ CVE-2024-1681 (corydolphin/flask-cors is vulnerable to log injection when the lo
 CVE-2024-1491 (The devices allow access to an unprotected endpoint that allows MPFS   ...)
 	NOT-FOR-US: Electrolink
 CVE-2024-1065 (Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm ...)
-	TODO: check
+	NOT-FOR-US: Arm
 CVE-2024-0671 (Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm ...)
-	TODO: check
+	NOT-FOR-US: Arm
 CVE-2023-51798 (Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...)
 	TODO: check
 CVE-2023-51797 (Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...)
@@ -325,7 +325,7 @@ CVE-2023-51792 (Buffer Overflow vulnerability in libde265 v1.0.12 allows a local
 CVE-2023-51791 (Buffer Overflow vulenrability in Ffmpeg v.N113007-g8d24a28d06 allows a ...)
 	TODO: check
 CVE-2023-50260 (Wazuh is a free and open source platform used for threat prevention, d ...)
-	TODO: check
+	NOT-FOR-US: Wazuh
 CVE-2023-50010 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ...)
 	TODO: check
 CVE-2023-50009 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ...)
@@ -341,9 +341,9 @@ CVE-2023-49502 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 all
 CVE-2023-49501 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ...)
 	TODO: check
 CVE-2023-49275 (Wazuh is a free and open source platform used for threat prevention, d ...)
-	TODO: check
+	NOT-FOR-US: Wazuh
 CVE-2023-47435 (An issue in the verifyPassword function of hexo-theme-matery v2.0.0 al ...)
-	TODO: check
+	NOT-FOR-US: hexo-theme-matery
 CVE-2023-37400 (IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to esca ...)
 	NOT-FOR-US: IBM
 CVE-2023-37397 (IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to obta ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/868ccb125648daf3bc380768521b7747b6bffcd2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/868ccb125648daf3bc380768521b7747b6bffcd2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240422/638c20e4/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list