[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Aug 30 20:31:38 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8bb03737 by Salvatore Bonaccorso at 2024-08-30T21:30:20+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18,21 +18,21 @@ CVE-2024-8234 (** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability
 CVE-2024-8016 (The Events Calendar Pro plugin for WordPress is vulnerable to PHP Obje ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-6672 (In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vul ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2024-6671 (In WhatsUp Gold versions released before 2024.0.0, if the application  ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2024-6670 (In WhatsUp Gold versions released before 2024.0.0,a SQL Injection vuln ...)
-	TODO: check
+	NOT-FOR-US: WhatsUp Gold
 CVE-2024-5879 (The HubSpot \u2013 CRM, Email Marketing, Live Chat, Forms & Analytics  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-5784 (The Tutor LMS  Pro plugin for WordPress is vulnerable to unauthorized  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-5061 (The Enfold - Responsive Multi-Purpose Theme theme for WordPress is vul ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-5024 (The Memberpress plugin for WordPress is vulnerable to Reflected Cross- ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-4401 (The Elementor Addon Elements plugin for WordPress is vulnerable to Sto ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-45492 (An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in  ...)
 	- expat <unfixed>
 	NOTE: https://github.com/libexpat/libexpat/pull/892
@@ -46,7 +46,7 @@ CVE-2024-45490 (An issue was discovered in libexpat before 2.6.3. xmlparse.c doe
 	NOTE: https://github.com/libexpat/libexpat/pull/890
 	NOTE: https://github.com/libexpat/libexpat/issues/887
 CVE-2024-45488 (One Identity Safeguard for Privileged Passwords before 7.5.2 allows un ...)
-	TODO: check
+	NOT-FOR-US: One Identity Safeguard for Privileged Passwords
 CVE-2024-45302 (RestSharp is a Simple REST and HTTP API Client for .NET. The second ar ...)
 	TODO: check
 CVE-2024-44944 [netfilter: ctnetlink: use helper function to calculate expect ID]
@@ -54,21 +54,21 @@ CVE-2024-44944 [netfilter: ctnetlink: use helper function to calculate expect ID
 	[bookworm] - linux 6.1.106-1
 	NOTE: https://git.kernel.org/linus/782161895eb4ac45cf7cfa8db375bd4766cb8299 (6.11-rc1)
 CVE-2024-42412 (Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S116 ...)
-	TODO: check
+	NOT-FOR-US: WAB-I1750-PS and WAB-S1167-PS
 CVE-2024-41349 (unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via applicati ...)
 	TODO: check
 CVE-2024-3998 (The Betheme theme for WordPress is vulnerable to Stored Cross-Site Scr ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-3673 (The Web Directory Free WordPress plugin before 1.7.3 does not validate ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-39300 (Missing authentication vulnerability exists in Telnet function of WAB- ...)
-	TODO: check
+	NOT-FOR-US: WAB-I1750-PS
 CVE-2024-34577 (Cross-site scripting vulnerability exists in WRC-X3000GS2-B, WRC-X3000 ...)
-	TODO: check
+	NOT-FOR-US: WRC-X3000GS2-B, WRC-X3000GS2-W, and WRC-X3000GS2A-B
 CVE-2024-2881 (Fault Injection vulnerability inwc_ed25519_sign_msg function in wolfss ...)
 	TODO: check
 CVE-2024-2694 (The Betheme theme for WordPress is vulnerable to PHP Object Injection  ...)
-	TODO: check
+	NOT-FOR-US: WordPress theme
 CVE-2024-2502 (An application can be configured to block boot attempts after consecut ...)
 	TODO: check
 CVE-2024-1545 (Fault Injection vulnerability in RsaPrivateDecryption function in wolf ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8bb0373791262724682ee21bd00f1fd5287318aa

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8bb0373791262724682ee21bd00f1fd5287318aa
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240830/36a6c50e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list