[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jan 11 08:53:39 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d7df183f by Salvatore Bonaccorso at 2024-01-11T09:53:17+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10,53 +10,53 @@ CVE-2024-22190 (GitPython is a python library used to interact with Git reposito
NOTE: https://github.com/gitpython-developers/GitPython/pull/1792
NOTE: https://github.com/gitpython-developers/GitPython/commit/ef3192cc414f2fd9978908454f6fd95243784c7f (3.1.41)
CVE-2024-21833 (Multiple TP-LINK products allow a network-adjacent unauthenticated att ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2024-21821 (Multiple TP-LINK products allow a network-adjacent authenticated attac ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2024-21773 (Multiple TP-LINK products allow a network-adjacent unauthenticated att ...)
- TODO: check
+ NOT-FOR-US: TP-LINK
CVE-2024-21669 (Hyperledger Aries Cloud Agent Python (ACA-Py) is a foundation for buil ...)
TODO: check
CVE-2024-21667 (pimcore/customer-data-framework is the Customer Management Framework f ...)
- TODO: check
+ NOT-FOR-US: Pimcore framework
CVE-2024-21666 (The Customer Management Framework (CMF) for Pimcore adds functionality ...)
- TODO: check
+ NOT-FOR-US: Pimcore framework
CVE-2024-21665 (ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. ...)
- TODO: check
+ NOT-FOR-US: Pimcore
CVE-2024-21638 (Azure IPAM (IP Address Management) is a lightweight solution developed ...)
TODO: check
CVE-2024-21637 (Authentik is an open-source Identity Provider. Authentik is a vulnerab ...)
- TODO: check
+ NOT-FOR-US: authentik
CVE-2024-0252 (ManageEngine ADSelfService Plus versions6401and below are vulnerable t ...)
- TODO: check
+ NOT-FOR-US: ManageEngine
CVE-2023-6883 (The Easy Social Feed plugin for WordPress is vulnerable to unauthorize ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6699 (The WP Compress \u2013 Image Optimizer [All-In-One] plugin for WordPre ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6630 (The Contact Form 7 \u2013 Dynamic Text Extension plugin for WordPress ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6520 (The WP 2FA \u2013 Two-factor authentication for WordPress plugin for W ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6506 (The WP 2FA \u2013 Two-factor authentication for WordPress plugin for W ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6446 (The Calculated Fields Form plugin for WordPress is vulnerable to Store ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-6223 (The LearnPress plugin for WordPress is vulnerable to Insecure Direct O ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-5448 (The WP Register Profile With Shortcode plugin for WordPress is vulnera ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2023-52274 (member/index/register.html in YzmCMS 6.5 through 7.0 allows XSS via th ...)
- TODO: check
+ NOT-FOR-US: YzmCMS
CVE-2023-52064 (Wuzhicms v4.1.0 was discovered to contain a SQL injection vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: Wuzhicms
CVE-2023-51127 (FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulner ...)
- TODO: check
+ NOT-FOR-US: FLIR AX8 thermal sensor cameras
CVE-2023-51126 (Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to ...)
- TODO: check
+ NOT-FOR-US: FLIR AX8
CVE-2023-51123 (An issue discovered in D-Link dir815 v.1.01SSb08.bin allows a remote a ...)
- TODO: check
+ NOT-FOR-US: D-Link
CVE-2023-51073 (An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to exe ...)
- TODO: check
+ NOT-FOR-US: Buffalo
CVE-2023-49295 (quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, ...)
TODO: check
CVE-2023-45175 (IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7df183fd4812dbfd9d0bbc552e3d36b7f7b55a3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7df183fd4812dbfd9d0bbc552e3d36b7f7b55a3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240111/ccebef46/attachment.htm>
More information about the debian-security-tracker-commits
mailing list