[Git][security-tracker-team/security-tracker][master] Process more NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Aug 15 10:22:18 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e58f6d13 by Salvatore Bonaccorso at 2024-08-15T11:21:32+02:00
Process more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -27,23 +27,23 @@ CVE-2024-7794 (A vulnerability was found in itsourcecode Vehicle Management Syst
 CVE-2024-7793 (A vulnerability was found in SourceCodester Task Progress Tracker 1.0. ...)
 	NOT-FOR-US: SourceCodester Task Progress Tracker
 CVE-2024-7628 (The MStore API \u2013 Create Native Android & iOS Apps On The Cloud pl ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7625 (In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.16.13, 1.7. ...)
 	TODO: check
 CVE-2024-7624 (The Zephyr Project Manager plugin for WordPress is vulnerable to limit ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7420 (The Insert PHP Code Snippet plugin for WordPress is vulnerable to Cros ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7411 (The Newsletters plugin for WordPress is vulnerable to Full Path Disclo ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7064 (The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7063 (The ElementsKit Pro plugin for WordPress is vulnerable to Sensitive In ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-6534 (Directus v10.13.0 allows an authenticated external attacker to modify  ...)
-	TODO: check
+	NOT-FOR-US: Directus
 CVE-2024-6533 (Directus v10.13.0 allows an authenticated external attacker to execute ...)
-	TODO: check
+	NOT-FOR-US: Directus
 CVE-2024-43368 (The Trix editor, versions prior to 2.1.4, is vulnerable to XSS when pa ...)
 	TODO: check
 CVE-2024-43275 (Cross-Site Request Forgery (CSRF) vulnerability in Xyzscripts Insert P ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e58f6d13b37ebafc25c7c831ea4040eeb7e90b54

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e58f6d13b37ebafc25c7c831ea4040eeb7e90b54
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240815/f905cc72/attachment.htm>


More information about the debian-security-tracker-commits mailing list