[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Nov 26 21:05:38 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ad83af21 by Salvatore Bonaccorso at 2024-11-26T22:05:08+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -45,68 +45,68 @@ CVE-2024-52336 (A script injection vulnerability was identified in the Tuned pac
 	- tuned <unfixed>
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324540
 CVE-2024-52008 (Fides is an open-source privacy engineering platform. The user invite  ...)
-	TODO: check
+	NOT-FOR-US: Fides
 CVE-2024-51058 (Local File Inclusion (LFI) vulnerability has been discovered in TCPDF  ...)
 	- tcpdf <unfixed>
 	NOTE: https://github.com/tecnickcom/TCPDF/commit/bfa7d2b6d455ebf72ebe3d48fbd487ee5a1f6f3b (6.7.6)
 CVE-2024-50377 (A CWE-798 "Use of Hard-coded Credentials" was discovered affecting the ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50376 (A CWE-79 "Improper Neutralization of Input During Web Page Generation  ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50375 (A CWE-306 "Missing Authentication for Critical Function" was discovere ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50374 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50373 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50372 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50371 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50370 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50369 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50368 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50367 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50366 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50365 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50364 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50363 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50362 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50361 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50360 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50359 (A CWE-78 "Improper Neutralization of Special Elements used in an OS Co ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-50358 (A CWE-15 "External Control of System or Configuration Setting" was dis ...)
-	TODO: check
+	NOT-FOR-US: Advantech
 CVE-2024-49053 (Microsoft Dynamics 365 Sales Spoofing Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-49052 (Missing authentication for critical function in Microsoft Azure Policy ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-49038 (Improper neutralization of input during web page generation ('Cross-si ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-49035 (An improper access control vulnerability in Partner.Microsoft.com allo ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-38834 (VMware Aria Operations contains a stored cross-site scripting vulnerab ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2024-38833 (VMware Aria Operations contains a stored cross-site scripting vulnerab ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2024-38832 (VMware Aria Operations contains a stored cross-site scripting vulnerab ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2024-38831 (VMware Aria Operations contains a local privilege escalation vulnerabi ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2024-38830 (VMware Aria Operations contains a local privilege escalation vulnerabi ...)
-	TODO: check
+	NOT-FOR-US: VMware
 CVE-2024-36463 (The implementation of atob in "Zabbix JS" allows to create a string wi ...)
 	TODO: check
 CVE-2024-32965 (Lobe Chat is an open-source, AI chat framework. Versions of lobe-chat  ...)
@@ -116,11 +116,11 @@ CVE-2024-22117 (When a URL is added to the map element, it is recorded in the da
 CVE-2024-11828 (A denial of service (DoS) condition was discovered in GitLab CE/EE aff ...)
 	- gitlab <unfixed>
 CVE-2024-11743 (A vulnerability, which was classified as problematic, was found in Sou ...)
-	TODO: check
+	NOT-FOR-US: SourceCodester Best House Rental Management System
 CVE-2024-11742 (A vulnerability, which was classified as problematic, has been found i ...)
-	TODO: check
+	NOT-FOR-US: SourceCodester Best House Rental Management System
 CVE-2024-11680 (ProjectSend versions prior to r1720 are affected by an improper authen ...)
-	TODO: check
+	NOT-FOR-US: ProjectSend
 CVE-2024-11669 (An issue was discovered in GitLab CE/EE affecting all versions from 16 ...)
 	- gitlab <not-affected> (Vulnerable code introduced later)
 CVE-2024-11668 (An issue has been discovered in GitLab CE/EE affecting all versions fr ...)
@@ -128,25 +128,25 @@ CVE-2024-11668 (An issue has been discovered in GitLab CE/EE affecting all versi
 CVE-2024-11407 (There exists a denial of service through Data corruption in gRPC-C++ - ...)
 	TODO: check
 CVE-2024-11192 (The Spotify Play Button for WordPress plugin for WordPress is vulnerab ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11177
 	REJECTED
 CVE-2024-11145 (Valor Apps Easy Folder Listing Pro has a deserialization vulnerability ...)
-	TODO: check
+	NOT-FOR-US: Valor
 CVE-2024-11119 (The BNE Gallery Extended plugin for WordPress is vulnerable to Stored  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11091 (The Support SVG \u2013 Upload svg files in wordpress without hassle pl ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11032 (The Parsi Date plugin for WordPress is vulnerable to Reflected Cross-S ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11024 (The AppPresser \u2013 Mobile App Framework plugin for WordPress is vul ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10878 (The Sugar Calendar \u2013 Simple Event Management plugin for WordPress ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10579 (The Hustle \u2013 Email Marketing, Lead Generation, Optins, Popups plu ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10308 (The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cro ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-10240 (An issue has been discovered in GitLab EE affecting all versions start ...)
 	- gitlab <not-affected> (Vulnerable code introduced later)
 CVE-2024-XXXX [Supplemental group inheritance grants unintended access to GID 0 due to lack of supplemental groups from mod_sql]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad83af21cf4e4ea87cb06b90938f822989dfe818

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad83af21cf4e4ea87cb06b90938f822989dfe818
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241126/9a494f58/attachment.htm>


More information about the debian-security-tracker-commits mailing list