[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Feb 28 08:44:41 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c0d8b90c by Moritz Muehlenhoff at 2024-02-28T09:44:23+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2,33 +2,33 @@ CVE-2024-27913 (ospf_te_parse_te in ospfd/ospf_te.c in FRRouting (FRR) through 9
 	- frr <unfixed>
 	NOTE: https://github.com/FRRouting/frr/pull/15431
 CVE-2024-26542 (Cross Site Scripting vulnerability in Bonitasoft, S.A v.7.14. and fixe ...)
-	TODO: check
+	NOT-FOR-US: Bonitasoft
 CVE-2024-26302 (A vulnerability in the web-based management interface of ClearPass Pol ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26301 (A vulnerability in the web-based management interface of ClearPass Pol ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26300 (A vulnerability in the guest interface of ClearPass Policy Manager cou ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26299 (A vulnerability in the web-based management interface of ClearPass Pol ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26298 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26297 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26296 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26295 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-26294 (Vulnerabilities in the ClearPass Policy Manager web-based management i ...)
-	TODO: check
+	NOT-FOR-US: HPE
 CVE-2024-24027 (SQL Injection vulnerability in Likeshop before 2.5.7 allows attackers  ...)
-	TODO: check
+	NOT-FOR-US: Likeshop
 CVE-2024-22723 (Webtrees 2.1.18 is vulnerable to Directory Traversal. By manipulating  ...)
-	TODO: check
+	NOT-FOR-US: Webtrees
 CVE-2024-1943 (The Yuki theme for WordPress is vulnerable to Cross-Site Request Forge ...)
-	TODO: check
+	NOT-FOR-US: WordPress theme
 CVE-2024-1932 (Unrestricted Upload of File with Dangerous Type in freescout-helpdesk/ ...)
-	TODO: check
+	NOT-FOR-US: freescout-helpdesk
 CVE-2024-1892 (Parts of the Scrapy API were found to be vulnerable to a ReDoS attack. ...)
 	TODO: check
 CVE-2024-1866
@@ -38,23 +38,23 @@ CVE-2024-1865
 CVE-2024-1864
 	REJECTED
 CVE-2024-1568 (The Seraphinite Accelerator plugin for WordPress is vulnerable to Serv ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-1388 (The Yuki theme for WordPress is vulnerable to unauthorized modificatio ...)
-	TODO: check
+	NOT-FOR-US: WordPress theme
 CVE-2024-0763 (Any user can delete an arbitrary folder (recursively) on a remote serv ...)
-	TODO: check
+	NOT-FOR-US: anythingllm
 CVE-2024-0550 (A user who is privileged already `manager` or `admin` can set their pr ...)
-	TODO: check
+	NOT-FOR-US: anythingllm
 CVE-2023-50737 (The SE menu contains information used by Lexmark to diagnose device er ...)
-	TODO: check
+	NOT-FOR-US: Lexmark
 CVE-2023-50736 (A memory corruption vulnerability has been identified in PostScript in ...)
-	TODO: check
+	NOT-FOR-US: Lexmark
 CVE-2023-50735 (A heap corruption vulnerability has been identified in PostScript inte ...)
-	TODO: check
+	NOT-FOR-US: Lexmark
 CVE-2023-50734 (A buffer overflow vulnerability has been identified in PostScript inte ...)
-	TODO: check
+	NOT-FOR-US: Lexmark
 CVE-2023-50303 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-46969 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0ecc1c70dcd32c0f081b173a1a5d89952686f271 (5.13-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0d8b90cf1a882c215930ed4409951d2f418d2bd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240228/67605698/attachment.htm>


More information about the debian-security-tracker-commits mailing list