[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jul 11 11:36:26 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0e24f78b by Salvatore Bonaccorso at 2024-07-11T12:35:53+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,91 +1,91 @@
CVE-2024-6676 (A vulnerability has been found in witmy my-springsecurity-plus up to 2 ...)
TODO: check
CVE-2024-6666 (The WP ERP plugin for WordPress is vulnerable to SQL Injection via the ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6664
REJECTED
CVE-2024-6663
REJECTED
CVE-2024-6653 (A vulnerability was found in code-projects Simple Task List 1.0. It ha ...)
- TODO: check
+ NOT-FOR-US: code-projects Simple Task List
CVE-2024-6652 (A vulnerability was found in itsourcecode Gym Management System 1.0. I ...)
- TODO: check
+ NOT-FOR-US: itsourcecode Gym Management System
CVE-2024-6650 (A vulnerability was found in SourceCodester Employee and Visitor Gate ...)
- TODO: check
+ NOT-FOR-US: SourceCodester Employee and Visitor Gate Pass Logging System
CVE-2024-6624 (The JSON API User plugin for WordPress is vulnerable to privilege esca ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6554 (The Branda \u2013 White Label WordPress, Custom Login Page Customizer ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6447 (The FULL \u2013 Cliente plugin for WordPress is vulnerable to Stored C ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6397 (The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for W ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6286 (Local Privilege escalation allows a low-privileged user to gain SYSTEM ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6256 (The Feeds for YouTube (YouTube video, channel, and gallery plugin) plu ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6236 (Denial of Service inNetScaler Console (formerly NetScaler ADM), NetS ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6210 (The Duplicator plugin for WordPress is vulnerable to information expos ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6151 (Local Privilege escalation allows a low-privileged user to gain SYSTEM ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6150 (A non-admin user can cause short-term disruption in Target VM availabi ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6149 (Redirection of users to a vulnerable URL inCitrix Workspace app for HT ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6148 (Bypass of GACS Policy Configuration settings in Citrix Workspace app f ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-6138 (The Secure Copy Content Protection and Content Locking WordPress plugi ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6037 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows ...)
- TODO: check
+ NOT-FOR-US: gaizhenbiao/chuanhuchatgpt
CVE-2024-6036 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240410 allows ...)
- TODO: check
+ NOT-FOR-US: gaizhenbiao/chuanhuchatgpt
CVE-2024-6026 (The Slider by 10Web WordPress plugin before 1.2.56 does not sanitise ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-6025 (The Quiz and Survey Master (QSM) WordPress plugin before 9.0.5 does n ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-5444 (The Bible Text WordPress plugin through 0.2 does not validate and esca ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-4655 (The Ultimate Blocks WordPress plugin before 3.1.9 does not validate a ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-40618 (Whale browser before 3.26.244.21 allows an attacker to execute malicio ...)
- TODO: check
+ NOT-FOR-US: Whale browser
CVE-2024-39565 (An Improper Neutralization of Data within XPath Expressions ('XPath In ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39562 (A Missing Release of Resource after Effective Lifetime vulnerability t ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39561 (An Improper Check for Unusual or Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39560 (An Improper Handling of Exceptional Conditions vulnerability in the ro ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39559 (An Improper Check for Unusual or Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39558 (An Unchecked Return Value vulnerability in the Routing Protocol Daemon ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39557 (An Uncontrolled Resource Consumption vulnerability in the Layer 2 Ad ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39556 (A Stack-Based Buffer Overflow vulnerability in Juniper Networks Junos ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39555 (An Improper Handling of Exceptional Conditions vulnerability in the Ro ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39554 (A Concurrent Execution using Shared Resource with Improper Synchroniza ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39518 (A Heap-based Buffer Overflow vulnerability in the telemetry sensor pro ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39517 (An Improper Check for Unusual or Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39514 (An Improper Check or Handling of Exceptional Conditions vulnerability ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39513 (An Improper Input Validation vulnerability in the Packet Forwarding En ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39512 (An Improper Physical Access Control vulnerability in the console port ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-39511 (An Improper Input Validation vulnerability in the 802.1X Authenticatio ...)
- TODO: check
+ NOT-FOR-US: Juniper
CVE-2024-38433 (Nuvoton - CWE-305: Authentication Bypass by Primary Weakness An attac ...)
- TODO: check
+ NOT-FOR-US: Nuvoton
CVE-2024-25077 (An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697 ...)
TODO: check
CVE-2024-25076 (An issue was discovered on Renesas SmartBond DA14691, DA14695, DA14697 ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e24f78b6342a83289022a3049f8bc6f54efa31e
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e24f78b6342a83289022a3049f8bc6f54efa31e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240711/fb097f5c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list