[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Feb 28 08:44:41 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c0d8b90c by Moritz Muehlenhoff at 2024-02-28T09:44:23+01:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2,33 +2,33 @@ CVE-2024-27913 (ospf_te_parse_te in ospfd/ospf_te.c in FRRouting (FRR) through 9
- frr <unfixed>
NOTE: https://github.com/FRRouting/frr/pull/15431
CVE-2024-26542 (Cross Site Scripting vulnerability in Bonitasoft, S.A v.7.14. and fixe ...)
- TODO: check
+ NOT-FOR-US: Bonitasoft
CVE-2024-26302 (A vulnerability in the web-based management interface of ClearPass Pol ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26301 (A vulnerability in the web-based management interface of ClearPass Pol ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26300 (A vulnerability in the guest interface of ClearPass Policy Manager cou ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26299 (A vulnerability in the web-based management interface of ClearPass Pol ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26298 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26297 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26296 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26295 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-26294 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-24027 (SQL Injection vulnerability in Likeshop before 2.5.7 allows attackers ...)
- TODO: check
+ NOT-FOR-US: Likeshop
CVE-2024-22723 (Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating ...)
- TODO: check
+ NOT-FOR-US: Webtrees
CVE-2024-1943 (The Yuki theme for WordPress is vulnerable to Cross-Site Request Forge ...)
- TODO: check
+ NOT-FOR-US: WordPress theme
CVE-2024-1932 (Unrestricted Upload of File with Dangerous Type in freescout-helpdesk/ ...)
- TODO: check
+ NOT-FOR-US: freescout-helpdesk
CVE-2024-1892 (Parts of the Scrapy API were found to be vulnerable to a ReDoS attack. ...)
TODO: check
CVE-2024-1866
@@ -38,23 +38,23 @@ CVE-2024-1865
CVE-2024-1864
REJECTED
CVE-2024-1568 (The Seraphinite Accelerator plugin for WordPress is vulnerable to Serv ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-1388 (The Yuki theme for WordPress is vulnerable to unauthorized modificatio ...)
- TODO: check
+ NOT-FOR-US: WordPress theme
CVE-2024-0763 (Any user can delete an arbitrary folder (recursively) on a remote serv ...)
- TODO: check
+ NOT-FOR-US: anythingllm
CVE-2024-0550 (A user who is privileged already `manager` or `admin` can set their pr ...)
- TODO: check
+ NOT-FOR-US: anythingllm
CVE-2023-50737 (The SE menu contains information used by Lexmark to diagnose device er ...)
- TODO: check
+ NOT-FOR-US: Lexmark
CVE-2023-50736 (A memory corruption vulnerability has been identified in PostScript in ...)
- TODO: check
+ NOT-FOR-US: Lexmark
CVE-2023-50735 (A heap corruption vulnerability has been identified in PostScript inte ...)
- TODO: check
+ NOT-FOR-US: Lexmark
CVE-2023-50734 (A buffer overflow vulnerability has been identified in PostScript inte ...)
- TODO: check
+ NOT-FOR-US: Lexmark
CVE-2023-50303 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
- TODO: check
+ NOT-FOR-US: IBM
CVE-2021-46969 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/0ecc1c70dcd32c0f081b173a1a5d89952686f271 (5.13-rc1)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240228/67605698/attachment.htm>
More information about the debian-security-tracker-commits
mailing list