[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Nov 19 08:20:06 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4809ea27 by Moritz Muehlenhoff at 2024-11-19T09:19:50+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,81 +1,81 @@
 CVE-2024-8403 (Improper Validation of Specified Type of Input vulnerability in Mitsub ...)
-	TODO: check
+	NOT-FOR-US: Mitsubishi
 CVE-2024-52587 (StepSecurity's Harden-Runner provides network egress filtering and run ...)
-	TODO: check
+	NOT-FOR-US: StepSecurity Harden-Runner
 CVE-2024-52585 (Autolab is a course management service that enables auto-graded progra ...)
-	TODO: check
+	NOT-FOR-US: Autolab
 CVE-2024-52584 (Autolab is a course management service that enables auto-graded progra ...)
-	TODO: check
+	NOT-FOR-US: Autolab
 CVE-2024-52583 (The WesHacks GitHub repository provides the official Hackathon competi ...)
-	TODO: check
+	NOT-FOR-US: WesHacks
 CVE-2024-52506 (Graylog is a free and open log management platform. The reporting func ...)
-	TODO: check
+	NOT-FOR-US: Graylog
 CVE-2024-52418 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52417 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52394 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52390 (: Path Traversal: '.../...//' vulnerability in CYAN Backup allows Path ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52389 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52349 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52348 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52347 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52346 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52345 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52344 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52343 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52342 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52341 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52340 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52339 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-52304 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...)
 	TODO: check
 CVE-2024-51940 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-51939 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-51053 (An arbitrary file upload vulnerability in the component /main/fileuplo ...)
-	TODO: check
+	NOT-FOR-US: AVSCMS
 CVE-2024-51051 (AVSCMS v8.2.0 was discovered to contain weak default credentials for t ...)
-	TODO: check
+	NOT-FOR-US: AVSCMS
 CVE-2024-50849 (Cross-Site Scripting (XSS) in the "Rules" functionality in WordServer  ...)
-	TODO: check
+	NOT-FOR-US: WordServer
 CVE-2024-50848 (An XML External Entity (XXE) vulnerability in the Import object and Tr ...)
-	TODO: check
+	NOT-FOR-US: WorldServer
 CVE-2024-50804 (Insecure Permissions vulnerability in Micro-star International MSI Cen ...)
-	TODO: check
+	NOT-FOR-US: Micro-star International
 CVE-2024-33231 (Cross Site Scripting vulnerability in Ferozo Email version 1.1 allows  ...)
-	TODO: check
+	NOT-FOR-US: Ferozo Email
 CVE-2024-21539 (Versions of the package @eslint/plugin-kit before 0.2.3 are vulnerable ...)
-	TODO: check
+	NOT-FOR-US: @eslint/plugin-kit
 CVE-2024-21287 (Vulnerability in the Oracle Agile PLM Framework product of Oracle Supp ...)
-	TODO: check
+	NOT-FOR-US: Oracle
 CVE-2024-11098 (The SVG Block plugin for WordPress is vulnerable to Stored Cross-Site  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11069 (The WordPress GDPR plugin for WordPress is vulnerable to unauthorized  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10486 (The Google for WooCommerce plugin for WordPress is vulnerable to Infor ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10388 (The WordPress GDPR plugin for WordPress is vulnerable to Stored Cross- ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10268 (The MP3 Audio Player \u2013 Music Player, Podcast Player & Radio by So ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10103 (In the process of testing the MailPoet  WordPress plugin before 5.3.2, ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-50302 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.11.9-1
 	NOTE: https://git.kernel.org/linus/177f25d1292c7e16e1199b39c85480f7f8815552 (6.12-rc7)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4809ea2753c8c88bfee189087f2101020c91b0be

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4809ea2753c8c88bfee189087f2101020c91b0be
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241119/6c60830b/attachment.htm>


More information about the debian-security-tracker-commits mailing list