[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 5 10:27:57 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
00a27cc2 by Salvatore Bonaccorso at 2024-08-05T11:27:25+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,53 +1,53 @@
 CVE-2024-7470 (A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and M ...)
-	TODO: check
+	NOT-FOR-US: Raisecom
 CVE-2024-7469 (A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and M ...)
-	TODO: check
+	NOT-FOR-US: Raisecom
 CVE-2024-7468 (A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and M ...)
-	TODO: check
+	NOT-FOR-US: Raisecom
 CVE-2024-7467 (A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200 and M ...)
-	TODO: check
+	NOT-FOR-US: Raisecom
 CVE-2024-7466 (A vulnerability has been found in PMWeb 7.2.00 and classified as probl ...)
-	TODO: check
+	NOT-FOR-US: PMWeb
 CVE-2024-7465 (A vulnerability, which was classified as critical, was found in TOTOLI ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-7464 (A vulnerability, which was classified as critical, has been found in T ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-7463 (A vulnerability classified as critical was found in TOTOLINK CP900 6.3 ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-7462 (A vulnerability classified as critical has been found in TOTOLINK N350 ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-7461 (A vulnerability was found in ForIP Tecnologia Administra\xe7\xe3o PABX ...)
-	TODO: check
+	NOT-FOR-US: ForIP Tecnologia Administracao PABX
 CVE-2024-7460 (A vulnerability was found in OSWAPP Warehouse Inventory System 1.0/2.0 ...)
-	TODO: check
+	NOT-FOR-US: OSWAPP Warehouse Inventory System
 CVE-2024-7459 (A vulnerability was found in OSWAPP Warehouse Inventory System 1.0/2.0 ...)
-	TODO: check
+	NOT-FOR-US: OSWAPP Warehouse Inventory System
 CVE-2024-7458 (A vulnerability was found in elunez eladmin up to 2.7 and classified a ...)
-	TODO: check
+	NOT-FOR-US: elunez eladmin
 CVE-2024-6710 (The Ditty  WordPress plugin before 3.1.45 does not sanitise and escape ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-6498 (The Chatbot for WordPress by Collect.chat \u26a1\ufe0f WordPress plugi ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-6270 (The Community Events WordPress plugin before 1.5.1 does not sanitise a ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-6118 (A Plaintext Storage of a Password vulnerability in ebooknote function  ...)
-	TODO: check
+	NOT-FOR-US: Hamastar MeetingHub Paperless Meetings
 CVE-2024-6117 (A Unrestricted upload of file with dangerous type vulnerability in mee ...)
-	TODO: check
+	NOT-FOR-US: Hamastar MeetingHub Paperless Meetings
 CVE-2024-5081 (The wp-eMember WordPress plugin before v10.7.0 does not have CSRF chec ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-41889 (Multiple Pimax products accept WebSocket connections from unintended e ...)
-	TODO: check
+	NOT-FOR-US: Pimax
 CVE-2024-41720 (Incorrect permission assignment for critical resource issue exists in  ...)
-	TODO: check
+	NOT-FOR-US: ZWX-2000CSW2-HN firmware
 CVE-2024-3636 (The Pinpoint Booking System  WordPress plugin before 2.9.9.4.8 does no ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-39838 (ZWX-2000CSW2-HN firmware versions prior to Ver.0.3.15 uses hard-coded  ...)
-	TODO: check
+	NOT-FOR-US: ZWX-2000CSW2-HN firmware
 CVE-2024-39713 (A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webh ...)
-	TODO: check
+	NOT-FOR-US: Rocket.Chat
 CVE-2024-2232 (The  lacks CSRF checks allowing a user to invite any user to any group ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-38856
 	NOT-FOR-US: Apache OFBiz
 CVE-2024-42447 (Insufficient Session Expiration vulnerability in Apache Airflow Provid ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00a27cc25f816fb352fc413d666ec95972e9d102

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/00a27cc25f816fb352fc413d666ec95972e9d102
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240805/aa64d62e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list