[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Oct 11 10:52:31 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a7478b16 by Moritz Muehlenhoff at 2024-10-11T11:52:08+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -43,85 +43,85 @@ CVE-2024-39527
CVE-2024-47498
NOT-FOR-US: Juniper
CVE-2024-9822 (The Pedalo Connector plugin for WordPress is vulnerable to authenticat ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9818 (A vulnerability classified as critical has been found in SourceCodeste ...)
- TODO: check
+ NOT-FOR-US: SourceCodester
CVE-2024-9817 (A vulnerability was found in code-projects Blood Bank System 1.0. It h ...)
- TODO: check
+ NOT-FOR-US: code-projects Blood Bank System
CVE-2024-9816 (A vulnerability was found in Codezips Tourist Management System 1.0 an ...)
- TODO: check
+ NOT-FOR-US: Codezips Tourist Management System
CVE-2024-9815 (A vulnerability has been found in Codezips Tourist Management System 1 ...)
- TODO: check
+ NOT-FOR-US: Codezips Tourist Management System
CVE-2024-9814 (A vulnerability, which was classified as critical, was found in Codezi ...)
- TODO: check
+ NOT-FOR-US: Codezips Tourist Management System
CVE-2024-9813 (A vulnerability, which was classified as critical, has been found in C ...)
- TODO: check
+ NOT-FOR-US: Codezips Pharmacy Management System
CVE-2024-9812 (A vulnerability classified as critical was found in code-projects Crud ...)
- TODO: check
+ NOT-FOR-US: code-projects Crud Operation System
CVE-2024-9811 (A vulnerability classified as critical has been found in code-projects ...)
- TODO: check
+ NOT-FOR-US: code-projects Restaurant Reservation System
CVE-2024-9707 (The Hunk Companion plugin for WordPress is vulnerable to unauthorized ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9616 (The BlockMeister \u2013 Block Pattern Builder plugin for WordPress is ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9611 (The Increase upload file size & Maximum Execution Time limit plugin fo ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9610 (The Language Switcher plugin for WordPress is vulnerable to Reflected ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9587 (The Linkz.ai plugin for WordPress is vulnerable to unauthorized modifi ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9586 (The Linkz.ai plugin for WordPress is vulnerable to unauthorized modifi ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9543 (The PowerPress Podcasting plugin by Blubrry plugin for WordPress is vu ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9507 (The Contact Form by Bit Form: Multi Step Form, Calculation Contact For ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9487 (An improper verification of cryptographic signature vulnerability was ...)
- TODO: check
+ NOT-FOR-US: Github Enterprise Server
CVE-2024-9436 (The PublishPress Revisions: Duplicate Posts, Submit, Approve and Sched ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9346 (The Embed videos and respect privacy plugin for WordPress is vulnerabl ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9234 (The GutenKit \u2013 Page Builder Blocks, Patterns, and Templates for G ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9232 (The Download Plugins and Themes in ZIP from Dashboard plugin for WordP ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9221 (The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Sit ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9211 (The FULL \u2013 Cliente plugin for WordPress is vulnerable to Reflecte ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-9180 (A privileged Vault operator with write permissions to the root namespa ...)
- TODO: check
+ NOT-FOR-US: HashiCorp Vault
CVE-2024-9051 (The WP Ultimate Post Grid plugin for WordPress is vulnerable to Stored ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-48987 (Snipe-IT before 7.0.10 allows remote code execution (associated with c ...)
- TODO: check
+ NOT-FOR-US: Snipe-IT
CVE-2024-47872 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47871 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47870 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47869 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47868 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47867 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47168 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47167 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47166 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47165 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47164 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-47084 (Gradio is an open-source Python package designed for quick prototyping ...)
- TODO: check
+ NOT-FOR-US: Gradio
CVE-2024-21534 (Versions of the package jsonpath-plus before 10.0.0 are vulnerable to ...)
- TODO: check
+ NOT-FOR-US: Node jsonpath-plus
CVE-2024-9810 (A vulnerability was found in SourceCodester Record Management System 1 ...)
NOT-FOR-US: SourceCodester
CVE-2024-9809 (A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. I ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7478b16578826ee7d887485175ab308060216b0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7478b16578826ee7d887485175ab308060216b0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241011/0b1ddcc7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list