[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 22 08:21:38 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2689fdb6 by Salvatore Bonaccorso at 2024-11-22T09:21:03+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,19 +1,19 @@
 CVE-2024-9542 (The Sky Addons for Elementor plugin for WordPress is vulnerable to Sen ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-9422 (The GEO my WP WordPress plugin before 4.5, gmw-premium-settings WordPr ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-8735 (The MailMunch \u2013 Grow your Email List plugin for WordPress is vuln ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-8526 (A vulnerability in Automated Logic WebCTRL 7.0 could allow an attacker ...)
-	TODO: check
+	NOT-FOR-US: Automated Logic WebCTRL
 CVE-2024-8525 (An unrestricted upload of file with dangerous type in Automated Logic  ...)
-	TODO: check
+	NOT-FOR-US: Automated Logic WebCTRL
 CVE-2024-7130 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: Kion Computer KION Exchange Programs Software
 CVE-2024-7026 (SQL Injection: Hibernate vulnerability in Teknogis Informatics Closed  ...)
-	TODO: check
+	NOT-FOR-US: Teknogis Informatics Closed Circuit Vehicle Tracking Software
 CVE-2024-7016 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
-	TODO: check
+	NOT-FOR-US: Smarttek Informatics Smart Doctor
 CVE-2024-53432 (While parsing certain malformed PLY files, PCL version 1.14.1 crashes  ...)
 	TODO: check
 CVE-2024-53429 (Open62541 v1.4.6 is has an assertion failure in fuzz_binary_decode, wh ...)
@@ -23,11 +23,11 @@ CVE-2024-53426 (A heap-buffer-overflow vulnerability has been identified in ntop
 CVE-2024-53425 (A heap-buffer-overflow vulnerability was discovered in the SkipSpacesA ...)
 	TODO: check
 CVE-2024-53335 (TOTOLINK A810R V4.1.2cu.5182_B20201026 is vulnerable to Buffer Overflo ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-53334 (TOTOLINK A810R V4.1.2cu.5182_B20201026 is vulnerable to Buffer Overflo ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-53333 (TOTOLINK EX200 v4.0.3c.7646_B20201211 was found to contain a command i ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-52803 (LLama Factory enables fine-tuning of large language models. A critical ...)
 	TODO: check
 CVE-2024-52799 (Argo Workflows Chart is used to set up argo and its needed dependencie ...)
@@ -35,21 +35,21 @@ CVE-2024-52799 (Argo Workflows Chart is used to set up argo and its needed depen
 CVE-2024-52309 (SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S  ...)
 	TODO: check
 CVE-2024-52307 (authentik is an open-source identity provider. Due to the usage of a n ...)
-	TODO: check
+	NOT-FOR-US: authentik
 CVE-2024-52289 (authentik is an open-source identity provider. Redirect URIs in the OA ...)
-	TODO: check
+	NOT-FOR-US: authentik
 CVE-2024-52287 (authentik is an open-source identity provider. When using the client_c ...)
-	TODO: check
+	NOT-FOR-US: authentik
 CVE-2024-52056 (Path Traversal in the Manager component of Wowza Streaming Engine belo ...)
-	TODO: check
+	NOT-FOR-US: Wowza
 CVE-2024-52055 (Path Traversal in the Manager component of Wowza Streaming Engine belo ...)
-	TODO: check
+	NOT-FOR-US: Wowza
 CVE-2024-52054 (Path Traversal in the Manager component of Wowza Streaming Engine belo ...)
-	TODO: check
+	NOT-FOR-US: Wowza
 CVE-2024-52053 (Stored Cross-Site Scripting in the Manager component of Wowza Streamin ...)
-	TODO: check
+	NOT-FOR-US: Wowza
 CVE-2024-52052 (Wowza Streaming Engine below 4.9.1 permits an authenticated Streaming  ...)
-	TODO: check
+	NOT-FOR-US: Wowza
 CVE-2024-51367 (An arbitrary file upload vulnerability in the component \Users\usernam ...)
 	TODO: check
 CVE-2024-51366 (An arbitrary file upload vulnerability in the component \Roaming\Omega ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2689fdb62795e7de6c882a404043f8e6711e6fb4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2689fdb62795e7de6c882a404043f8e6711e6fb4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241122/7744ea1e/attachment.htm>


More information about the debian-security-tracker-commits mailing list