[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Aug 27 21:37:19 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
353a63f6 by Salvatore Bonaccorso at 2024-08-27T22:36:40+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -25,21 +25,21 @@ CVE-2024-8182 (An Unauthenticated Denial of Service (DoS) vulnerability exists i
 CVE-2024-8181 (An Authentication Bypass vulnerability exists in Flowise version 1.8.2 ...)
 	TODO: check
 CVE-2024-7941 (An HTTP parameter may contain a URL value and could cause the web appl ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2024-7940 (The product exposes a service that is intended for local only to all n ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2024-7791 (The 140+ Widgets | Xpro Addons For Elementor \u2013 FREE plugin for Wo ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-7720 (HP Security Manager is potentially vulnerable to Remote Code Execution ...)
-	TODO: check
+	NOT-FOR-US: HP
 CVE-2024-7071 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
-	TODO: check
+	NOT-FOR-US: Brain Information Technologies Inc. Brain Low-Code
 CVE-2024-6789 (A path traversal issue in API endpoint in M-Files Server before versio ...)
-	TODO: check
+	NOT-FOR-US: M-Files Server
 CVE-2024-6633 (The default credentials for the setup HSQL database (HSQLDB) for FileC ...)
 	TODO: check
 CVE-2024-6632 (A vulnerability exists in FileCatalyst Workflow whereby a field access ...)
-	TODO: check
+	NOT-FOR-US: FileCatalyst Workflow
 CVE-2024-5991 (In function MatchDomainName(), input param str is treated as a NULL te ...)
 	TODO: check
 CVE-2024-5814 (A malicious TLS1.2 server can force a TLS1.3 client with downgrade cap ...)
@@ -47,17 +47,17 @@ CVE-2024-5814 (A malicious TLS1.2 server can force a TLS1.3 client with downgrad
 CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error attack v ...)
 	TODO: check
 CVE-2024-4872 (The product does not validate any query towards persistent data, resul ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2024-45264 (A cross-site request forgery (CSRF) vulnerability in the admin panel i ...)
-	TODO: check
+	NOT-FOR-US: SkySystem Arfa-CMS
 CVE-2024-45037 (The AWS Cloud Development Kit (CDK) is an open-source framework for de ...)
-	TODO: check
+	NOT-FOR-US: AWS Cloud Development Kit (CDK)
 CVE-2024-44342 (D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2024-44341 (D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2024-44340 (D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2024-43788 (Webpack is a module bundler. Its main purpose is to bundle JavaScript  ...)
 	TODO: check
 CVE-2024-43783 (The Apollo Router Core is a configurable, high-performance graph route ...)
@@ -67,15 +67,15 @@ CVE-2024-43414 (Apollo Federation is an architecture for declaratively composing
 CVE-2024-42851 (Buffer Overflow vulnerability in open source exiftags v.1.01 allows a  ...)
 	TODO: check
 CVE-2024-41622 (D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command ...)
-	TODO: check
+	NOT-FOR-US: D-Link
 CVE-2024-40395 (An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 all ...)
 	TODO: check
 CVE-2024-3982 (An attacker with local access to machine where MicroSCADA X SYS600 is  ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2024-3980 (The product allows user input to control or influence paths or file na ...)
-	TODO: check
+	NOT-FOR-US: Hitachi
 CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...)
-	TODO: check
+	NOT-FOR-US: Rubrik CDM
 CVE-2024-1544 (Generating the ECDSA nonce k samples a random number r and then  trunc ...)
 	TODO: check
 CVE-2024-8046 (The Logo Showcase Ultimate \u2013 Logo Carousel, Logo Slider & Logo Gr ...)
@@ -158163,9 +158163,9 @@ CVE-2022-39999
 CVE-2022-39998
 	RESERVED
 CVE-2022-39997 (A weak password requirement issue was discovered in Teldats Router RS1 ...)
-	TODO: check
+	NOT-FOR-US: Teldats Router
 CVE-2022-39996 (Cross Site Scripting vulnerability in Teldats Router RS123, RS123w all ...)
-	TODO: check
+	NOT-FOR-US: Teldats Router
 CVE-2022-39995
 	RESERVED
 CVE-2022-39994



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/353a63f6be2750a5ec8d3ebcb7e5628eb3760926

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/353a63f6be2750a5ec8d3ebcb7e5628eb3760926
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240827/52d1a7ee/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list