[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Sep 10 09:45:37 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4ec19353 by Moritz Muehlenhoff at 2024-09-10T10:45:13+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3,31 +3,31 @@ CVE-2024-8611 (A vulnerability classified as critical was found in itsourcecode
CVE-2024-8610 (A vulnerability classified as problematic has been found in SourceCode ...)
TODO: check
CVE-2024-8478 (The The Affiliate Super Assistent plugin for WordPress is vulnerable t ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-8268 (The Frontend Dashboard plugin for WordPress is vulnerable to unauthori ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-7955 (The Starbox WordPress plugin before 3.5.2 does not sanitise and escap ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-7891 (The Floating Contact Button WordPress plugin before 2.8 does not sanit ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-7784 (During internal Axis Security Development Model (ASDM) threat-modellin ...)
- TODO: check
+ NOT-FOR-US: Axis
CVE-2024-7734 (An unauthenticated remote attacker canexploit the behavior of thepathf ...)
- TODO: check
+ NOT-FOR-US: Phoenix
CVE-2024-7655 (The Community by PeepSo \u2013 Social Network, Membership, Registratio ...)
- TODO: check
+ NOT-FOR-US: PeepSo
CVE-2024-7618 (The Community by PeepSo \u2013 Social Network, Membership, Registratio ...)
- TODO: check
+ NOT-FOR-US: PeepSo
CVE-2024-6979 (Amin Aliakbari, member of the AXIS OS Bug Bounty Program, has found a ...)
- TODO: check
+ NOT-FOR-US: Axis
CVE-2024-6596 (An unauthenticated remote attacker can run malicious c# code included ...)
- TODO: check
+ NOT-FOR-US: Endress+Hauser
CVE-2024-6509 (Marinus Pfund, member of the AXIS OS Bug Bounty Program, has found th ...)
- TODO: check
+ NOT-FOR-US: Axis
CVE-2024-6342 (**UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability in the ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2024-6173 (51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Gu ...)
- TODO: check
+ NOT-FOR-US: Axis
CVE-2024-45504 (Cross-site request forgery (CSRF) vulnerability in multiple Alps Syste ...)
TODO: check
CVE-2024-45286 (Due to lack of proper authorization checks when calling user, a functi ...)
@@ -37,57 +37,57 @@ CVE-2024-45285 (The RFC enabled function module allows a low privileged user to
CVE-2024-45284 (An authenticated attacker with high privilege can use functions of SLC ...)
TODO: check
CVE-2024-45283 (SAP NetWeaver AS for Java allows an authorized attacker to obtain sens ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-45281 (SAP BusinessObjects Business Intelligence Platform allows a high privi ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-45280 (Due to insufficient encoding of user-controlled inputs, SAP NetWeaver ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-45279 (Due to insufficient input validation, CRM Blueprint Application Builde ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44411 (D-Link DI-8300 v16.07.26A1 is vulnerable to command injection via the ...)
- TODO: check
+ NOT-FOR-US: D-Link
CVE-2024-44410 (D-Link DI-8300 v16.07.26A1 is vulnerable to command injection via the ...)
- TODO: check
+ NOT-FOR-US: D-Link
CVE-2024-44121 (Under certain conditions Statutory Reports in SAP S/4 HANA allows an a ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44120 (SAP NetWeaver Enterprise Portal is vulnerable to reflected cross site ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44117 (The RFC enabled function module allows a low privileged user to perfor ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44116 (The RFC enabled function module allows a low privileged user to add an ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44115 (The RFC enabled function module allows a low privileged user to add UR ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44114 (SAP NetWeaver Application Server for ABAP and ABAP Platform allow user ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44113 (Due to missing authorization checks, SAP Business Warehouse (BEx Analy ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44112 (Due to missing authorization check in SAP for Oil & Gas (Transportatio ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-44072 (OS command injection vulnerability exists in BUFFALO wireless LAN rout ...)
- TODO: check
+ NOT-FOR-US: BUFFALO
CVE-2024-42427 (Dell ThinOS versions 2402 and 2405, contains an Improper Neutralizatio ...)
- TODO: check
+ NOT-FOR-US: Dell
CVE-2024-42424 (Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, contains ...)
- TODO: check
+ NOT-FOR-US: Dell
CVE-2024-42380 (The RFC enabled function module allows a low privileged user to read a ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-42378 (Due to weak encoding of user-controlled inputs, eProcurement on SAP S/ ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-42371 (The RFC enabled function module allows a low privileged user to delete ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-41729 (Due to missing authorization checks, SAP BEx Analyzer allows an authen ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-41728 (Due to missing authorization check, SAP NetWeaver Application Server f ...)
- TODO: check
+ NOT-FOR-US: SAP
CVE-2024-38270 (An insufficient entropy vulnerability caused by the improper use of a ...)
- TODO: check
+ NOT-FOR-US: Zyxel
CVE-2024-27365 (An issue was discovered in Samsung Mobile Processor Exynos Exynos 980, ...)
- TODO: check
+ NOT-FOR-US: Samsung
CVE-2024-21528 (All versions of the package node-gettext are vulnerable to Prototype P ...)
TODO: check
CVE-2024-0067 (Marinus Pfund, member of the AXIS OS Bug Bounty Program, has found th ...)
- TODO: check
+ NOT-FOR-US: Axis
CVE-2024-8605 (A vulnerability classified as problematic was found in code-projects I ...)
NOT-FOR-US: code-projects Inventory Management
CVE-2024-8604 (A vulnerability classified as problematic has been found in SourceCode ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4ec1935310120569b03d3a349396593ce82e5629
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4ec1935310120569b03d3a349396593ce82e5629
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240910/f0d1e251/attachment.htm>
More information about the debian-security-tracker-commits
mailing list