[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun May 5 11:34:48 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a92c9257 by Salvatore Bonaccorso at 2024-05-05T12:34:12+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,45 +1,45 @@
 CVE-2024-4497 (A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been dec ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4496 (A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been cla ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4495 (A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified a ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4494 (A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classif ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4493 (A vulnerability, which was classified as critical, was found in Tenda  ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4492 (A vulnerability, which was classified as critical, has been found in T ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-4491 (A vulnerability classified as critical was found in Tenda i21 1.0.0.14 ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-34490 (In Maxima through 5.47.0 before 51704c, the plotting facilities make u ...)
 	TODO: check
 CVE-2024-34489 (OFPHello in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34488 (OFPMultipartReply in parser.py in Faucet SDN Ryu 4.34 allows attackers ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34487 (OFPFlowStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to c ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34486 (OFPPacketQueue in parser.py in Faucet SDN Ryu 4.34 allows attackers to ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34484 (OFPBucket in parser.py in Faucet SDN Ryu 4.34 allows attackers to caus ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34483 (OFPGroupDescStats in parser.py in Faucet SDN Ryu 4.34 allows attackers ...)
-	TODO: check
+	NOT-FOR-US: Faucet SDN Ryu
 CVE-2024-34478 (btcd before 0.24.0 does not correctly implement the consensus rules ou ...)
 	TODO: check
 CVE-2024-34476 (Open5GS before 2.7.1 is vulnerable to a reachable assertion that can c ...)
-	TODO: check
+	NOT-FOR-US: Open5GS
 CVE-2024-34475 (Open5GS before 2.7.1 is vulnerable to a reachable assertion that can c ...)
-	TODO: check
+	NOT-FOR-US: Open5GS
 CVE-2024-34473 (An issue was discovered in appmgr in O-RAN Near-RT RIC I-Release. An a ...)
 	TODO: check
 CVE-2024-34469 (Rukovoditel before 3.5.3 allows XSS via user_photo to index.php?module ...)
-	TODO: check
+	NOT-FOR-US: Rukovoditel
 CVE-2024-34468 (Rukovoditel before 3.5.3 allows XSS via user_photo to My Page.)
-	TODO: check
+	NOT-FOR-US: Rukovoditel
 CVE-2024-34467 (ThinkPHP 8.0.3 allows remote attackers to discover the PHPSESSION cook ...)
-	TODO: check
+	NOT-FOR-US: ThinkPHP
 CVE-2024-34462 (Alinto SOGo through 5.10.0 allows XSS during attachment preview.)
 	TODO: check
 CVE-2023-52729 (TCPServer.cpp in SimpleNetwork through 29bc615 has an off-by-one error ...)
@@ -113,7 +113,7 @@ CVE-2024-3985 (The Exclusive Addons for Elementor plugin for WordPress is vulner
 CVE-2024-3957 (The Booster for WooCommerce plugin is vulnerable to Unauthenticated Ar ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-3955 (URL GET parameter "logtime" utilized within the "downloadlog" function ...)
-	TODO: check
+	NOT-FOR-US: CraftBeerPi
 CVE-2024-3942 (The MasterStudy LMS WordPress Plugin \u2013 for Online Courses and Edu ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-3936 (The The Post Grid \u2013 Shortcode, Gutenberg Blocks and Elementor Add ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a92c92574eaeba7aa1c08e0977d7444d6d44d75f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a92c92574eaeba7aa1c08e0977d7444d6d44d75f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240505/a5e5df28/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list