[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Aug 3 10:54:52 BST 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fafe969d by Moritz Muehlenhoff at 2024-08-03T11:53:51+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -13,83 +13,83 @@ CVE-2024-38891 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663
 CVE-2024-38887 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
 	TODO: check
 CVE-2024-7323 (Digiwin EasyFlow .NET lacks proper access control for specific functio ...)
-	TODO: check
+	NOT-FOR-US: Digiwin EasyFlow .NET
 CVE-2024-7314 (anji-plus AJ-Report is affected by an authentication bypass vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: anji-plus AJ-Report
 CVE-2024-7204 (Ai3 QbiBot does not properly filter user input, allowing unauthenticat ...)
-	TODO: check
+	NOT-FOR-US: Ai3 QbiBot
 CVE-2024-7029 (Commands can be injected over the network and executed without authent ...)
-	TODO: check
+	NOT-FOR-US: AVTech AVM1203
 CVE-2024-6704 (The Comments \u2013 wpDiscuz plugin for WordPress is vulnerable to HTM ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-4643 (The Element Pack Elementor Addons (Header Footer, Template Library, Dy ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-42349 (FOG is a cloning/imaging/rescue suite/inventory management system. FOG ...)
-	TODO: check
+	NOT-FOR-US: FOG
 CVE-2024-42348 (FOG is a cloning/imaging/rescue suite/inventory management system. FOG ...)
-	TODO: check
+	NOT-FOR-US: FOG
 CVE-2024-41519 (Feripro <= v2.2.3 is vulnerable to Cross Site Scripting (XSS) via "/ad ...)
-	TODO: check
+	NOT-FOR-US: Feripro
 CVE-2024-41518 (An Incorrect Access Control vulnerability in "/admin/programm/<program ...)
-	TODO: check
+	NOT-FOR-US: Feripro
 CVE-2024-41517 (An Incorrect Access Control vulnerability in "/admin/benutzer/institut ...)
-	TODO: check
+	NOT-FOR-US: Feripro
 CVE-2024-41310 (AndServer 2.1.12 is vulnerable to Directory Traversal.)
-	TODO: check
+	NOT-FOR-US: Feripro
 CVE-2024-41127 (Monkeytype is a minimalistic and customizable typing test. Monkeytype  ...)
-	TODO: check
+	NOT-FOR-US: Monkeytype
 CVE-2024-40723 (The specific API in HWATAIServiSign Windows Version from CHANGING Info ...)
-	TODO: check
+	NOT-FOR-US: CHANGING Information Technology
 CVE-2024-40722 (The specific API in TCBServiSign Windows Version from CHANGING Informa ...)
-	TODO: check
+	NOT-FOR-US: CHANGING Information Technology
 CVE-2024-40721 (The specific API in TCBServiSign Windows Version from CHANGING Informa ...)
-	TODO: check
+	NOT-FOR-US: CHANGING Information Technology
 CVE-2024-40720 (The specific API in TCBServiSign Windows Version from CHANGING Informa ...)
-	TODO: check
+	NOT-FOR-US: CHANGING Information Technology
 CVE-2024-40719 (The encryption strength of the authorization keys in CHANGING Informat ...)
-	TODO: check
+	NOT-FOR-US: CHANGING Information Technology
 CVE-2024-38890 (An issue in Horizon Business Services Inc. Caterease Software 16.0.1.1 ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38889 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38888 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38886 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38885 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38884 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38883 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38882 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38881 (An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 throu ...)
-	TODO: check
+	NOT-FOR-US: Caterease
 CVE-2024-38879 (A vulnerability has been identified in OmniviseT3000 Application Serve ...)
-	TODO: check
+	NOT-FOR-US: OmniviseT3000
 CVE-2024-38878 (A vulnerability has been identified in OmniviseT3000 Application Serve ...)
-	TODO: check
+	NOT-FOR-US: OmniviseT3000
 CVE-2024-38877 (A vulnerability has been identified in OmniviseT3000 Application Serve ...)
-	TODO: check
+	NOT-FOR-US: OmniviseT3000
 CVE-2024-38876 (A vulnerability has been identified in OmniviseT3000 Application Serve ...)
-	TODO: check
+	NOT-FOR-US: OmniviseT3000
 CVE-2024-33896 (Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x ...)
-	TODO: check
+	NOT-FOR-US: Cosy+
 CVE-2024-33895 (Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x ...)
-	TODO: check
+	NOT-FOR-US: Cosy+
 CVE-2024-33894 (Insecure Permission vulnerability in Cosy+ devices running a firmware  ...)
-	TODO: check
+	NOT-FOR-US: Cosy+
 CVE-2024-33893 (Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x ...)
-	TODO: check
+	NOT-FOR-US: Cosy+
 CVE-2024-33892 (Insecure Permissions vulnerability in Cosy+ devices running a firmware ...)
-	TODO: check
+	NOT-FOR-US: Cosy+
 CVE-2024-28298 (SQL injection vulnerability in BM SOFT BMPlanning 1.0.0.1 allows authe ...)
-	TODO: check
+	NOT-FOR-US: BM SOFT BMPlanning
 CVE-2024-28297 (SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows authenti ...)
-	TODO: check
+	NOT-FOR-US: AzureSoft MyHorus
 CVE-2024-22169 (WD Discovery versions prior to 5.0.589 contain a misconfiguration in t ...)
-	TODO: check
+	NOT-FOR-US: Western Digital
 CVE-2024-36268 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
 	NOT-FOR-US: Apache Linkis
 CVE-2024-27182 (In Apache Linkis <= 1.5.0,  Arbitrary file deletion in Basic managemen ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fafe969dab931d430efcda55f10a792ed1c0be49

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fafe969dab931d430efcda55f10a792ed1c0be49
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240803/85851680/attachment.htm>


More information about the debian-security-tracker-commits mailing list