[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jun 17 21:49:45 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
bcf0d3bc by Salvatore Bonaccorso at 2024-06-17T22:49:19+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -31,17 +31,17 @@ CVE-2024-37902 (DeepJavaLibrary(DJL) is an Engine-Agnostic Deep Learning Framewo
 CVE-2024-37896 (Gin-vue-admin is a backstage management system based on vue and gin. G ...)
 	TODO: check
 CVE-2024-37895 (Lobe Chat is an open-source LLMs/AI chat framework. In affected versio ...)
-	TODO: check
+	NOT-FOR-US: Lobe Chat
 CVE-2024-37893 (Firefly III is a free and open source personal finance manager. In aff ...)
-	TODO: check
+	NOT-FOR-US: Firefly
 CVE-2024-37891 (urllib3 is a user-friendly HTTP client library for Python. When using  ...)
 	TODO: check
 CVE-2024-37890 (ws is an open source WebSocket client and server for Node.js. A reques ...)
 	TODO: check
 CVE-2024-37848 (SQL Injection vulnerability in Online-Bookstore-Project-In-PHP v1.0 al ...)
-	TODO: check
+	NOT-FOR-US: Online-Bookstore-Project-In-PHP
 CVE-2024-37840 (SQL injection vulnerability in processscore.php in Itsourcecode Learni ...)
-	TODO: check
+	NOT-FOR-US: Itsourcecode Learning Management System Project In PHP With Source Code
 CVE-2024-37795 (A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a ...)
 	TODO: check
 CVE-2024-37794 (Improper input validation in CVC5 Solver v1.1.3 allows attackers to ca ...)
@@ -51,23 +51,23 @@ CVE-2024-37664 (Redmi router RB03 v1.0.57 is vulnerable to TCP DoS or hijacking
 CVE-2024-37663 (Redmi router RB03 v1.0.57 is vulnerable to forged ICMP redirect messag ...)
 	TODO: check
 CVE-2024-37662 (TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attac ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2024-37661 (TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect messa ...)
-	TODO: check
+	NOT-FOR-US: TP-LINK
 CVE-2024-37625 (zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site ...)
-	TODO: check
+	NOT-FOR-US: zhimengzhe iBarn
 CVE-2024-37624 (Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site s ...)
-	TODO: check
+	NOT-FOR-US: Xinhu RockOA
 CVE-2024-37623 (Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site s ...)
-	TODO: check
+	NOT-FOR-US: Xinhu RockOA
 CVE-2024-37622 (Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site s ...)
-	TODO: check
+	NOT-FOR-US: Xinhu RockOA
 CVE-2024-37621 (StrongShop v1.0 was discovered to contain a Server-Side Template Injec ...)
-	TODO: check
+	NOT-FOR-US: StrongShop
 CVE-2024-37620 (PHPVOD v4.0 was discovered to contain a reflected cross-site scripting ...)
-	TODO: check
+	NOT-FOR-US: PHPVOD
 CVE-2024-37619 (StrongShop v1.0 was discovered to contain a reflected cross-site scrip ...)
-	TODO: check
+	NOT-FOR-US: StrongShop
 CVE-2024-37305 (oqs-provider is a provider for the OpenSSL 3 cryptography library that ...)
 	TODO: check
 CVE-2024-37159 (Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. ...)
@@ -172,7 +172,7 @@ CVE-2024-38448 (htags in GNU Global through 6.6.12 allows code execution in situ
 	[buster] - global <postponed> (Minor issue, -d/dbpath unlikely to be untrusted)
 	NOTE: https://lists.gnu.org/archive/html/bug-global/2024-05/msg00009.html
 CVE-2024-38443 (C/sorting/binary_insertion_sort.c in The Algorithms - C through e5dad3 ...)
-	TODO: check
+	NOT-FOR-US: The Algorithms - C
 CVE-2024-38441 (Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer ...)
 	TODO: check
 CVE-2024-38440 (Netatalk 3.2.0 has an off-by-one error and resultant heap-based buffer ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bcf0d3bc0f37d85d4082c4c79eb6ed9ca2d00ffd

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bcf0d3bc0f37d85d4082c4c79eb6ed9ca2d00ffd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240617/4f560897/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list