[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun May 5 11:34:48 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a92c9257 by Salvatore Bonaccorso at 2024-05-05T12:34:12+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,45 +1,45 @@
CVE-2024-4497 (A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been dec ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4496 (A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been cla ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4495 (A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified a ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4494 (A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classif ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4493 (A vulnerability, which was classified as critical, was found in Tenda ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4492 (A vulnerability, which was classified as critical, has been found in T ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-4491 (A vulnerability classified as critical was found in Tenda i21 1.0.0.14 ...)
- TODO: check
+ NOT-FOR-US: Tenda
CVE-2024-34490 (In Maxima through 5.47.0 before 51704c, the plotting facilities make u ...)
TODO: check
CVE-2024-34489 (OFPHello in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34488 (OFPMultipartReply in parser.py in Faucet SDN Ryu 4.34 allows attackers ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34487 (OFPFlowStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to c ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34486 (OFPPacketQueue in parser.py in Faucet SDN Ryu 4.34 allows attackers to ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34484 (OFPBucket in parser.py in Faucet SDN Ryu 4.34 allows attackers to caus ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34483 (OFPGroupDescStats in parser.py in Faucet SDN Ryu 4.34 allows attackers ...)
- TODO: check
+ NOT-FOR-US: Faucet SDN Ryu
CVE-2024-34478 (btcd before 0.24.0 does not correctly implement the consensus rules ou ...)
TODO: check
CVE-2024-34476 (Open5GS before 2.7.1 is vulnerable to a reachable assertion that can c ...)
- TODO: check
+ NOT-FOR-US: Open5GS
CVE-2024-34475 (Open5GS before 2.7.1 is vulnerable to a reachable assertion that can c ...)
- TODO: check
+ NOT-FOR-US: Open5GS
CVE-2024-34473 (An issue was discovered in appmgr in O-RAN Near-RT RIC I-Release. An a ...)
TODO: check
CVE-2024-34469 (Rukovoditel before 3.5.3 allows XSS via user_photo to index.php?module ...)
- TODO: check
+ NOT-FOR-US: Rukovoditel
CVE-2024-34468 (Rukovoditel before 3.5.3 allows XSS via user_photo to My Page.)
- TODO: check
+ NOT-FOR-US: Rukovoditel
CVE-2024-34467 (ThinkPHP 8.0.3 allows remote attackers to discover the PHPSESSION cook ...)
- TODO: check
+ NOT-FOR-US: ThinkPHP
CVE-2024-34462 (Alinto SOGo through 5.10.0 allows XSS during attachment preview.)
TODO: check
CVE-2023-52729 (TCPServer.cpp in SimpleNetwork through 29bc615 has an off-by-one error ...)
@@ -113,7 +113,7 @@ CVE-2024-3985 (The Exclusive Addons for Elementor plugin for WordPress is vulner
CVE-2024-3957 (The Booster for WooCommerce plugin is vulnerable to Unauthenticated Ar ...)
NOT-FOR-US: WordPress plugin
CVE-2024-3955 (URL GET parameter "logtime" utilized within the "downloadlog" function ...)
- TODO: check
+ NOT-FOR-US: CraftBeerPi
CVE-2024-3942 (The MasterStudy LMS WordPress Plugin \u2013 for Online Courses and Edu ...)
NOT-FOR-US: WordPress plugin
CVE-2024-3936 (The The Post Grid \u2013 Shortcode, Gutenberg Blocks and Elementor Add ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a92c92574eaeba7aa1c08e0977d7444d6d44d75f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a92c92574eaeba7aa1c08e0977d7444d6d44d75f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240505/a5e5df28/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list