[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Sep 17 22:29:16 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c2869b9b by Moritz Muehlenhoff at 2024-09-17T23:28:56+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -23,7 +23,7 @@ CVE-2024-8945 (A vulnerability has been found in CodeCanyon RISE Ultimate Projec
CVE-2024-8944 (A vulnerability, which was classified as critical, was found in code-p ...)
NOT-FOR-US: Hospital Management System
CVE-2024-8939 (A vulnerability was found in the ilab model serve component, where imp ...)
- TODO: check
+ NOT-FOR-US: RHEL AI
CVE-2024-8900 (An attacker could write data to the user's clipboard, bypassing the us ...)
TODO: check
CVE-2024-8897 (Under certain conditions, an attacker with the ability to redirect use ...)
@@ -39,7 +39,7 @@ CVE-2024-8761 (The Share This Image plugin for WordPress is vulnerable to Open R
CVE-2024-8660 (Concrete CMS versions 9.0.0 through 9.3.3 are affected by a stored XSS ...)
NOT-FOR-US: Concrete CMS
CVE-2024-7873 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
- TODO: check
+ NOT-FOR-US: Veribase Order
CVE-2024-7788 (Improper Digital Signature Invalidation vulnerability in Zip Repair Mo ...)
- libreoffice 4:24.2.5-1
NOTE: https://www.libreoffice.org/about-us/security/advisories/CVE-2024-7788
@@ -56,23 +56,23 @@ CVE-2024-46362 (FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Fo
CVE-2024-46085 (FrogCMS V0.9.5 was discovered to contain a Cross-Site Request Forgery ...)
NOT-FOR-US: FrogCMS
CVE-2024-45812 (Vite a frontend build tooling framework for javascript. Affected versi ...)
- TODO: check
+ NOT-FOR-US: Vite
CVE-2024-45811 (Vite a frontend build tooling framework for javascript. In affected ve ...)
- TODO: check
+ NOT-FOR-US: Vite
CVE-2024-45804
REJECTED
CVE-2024-45803 (Wire UI is a library of components and resources to empower Laravel an ...)
- TODO: check
+ NOT-FOR-US: Wire UI
CVE-2024-45798 (arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ES ...)
- TODO: check
+ NOT-FOR-US: arduino-esp32
CVE-2024-45682 (There is a command injection vulnerability that may allow an attacker ...)
- TODO: check
+ NOT-FOR-US: Proroute H685t-w
CVE-2024-45612 (Contao is an Open Source CMS. In affected versions an untrusted user c ...)
NOT-FOR-US: Contao CMS
CVE-2024-45606 (Sentry is a developer-first error tracking and performance monitoring ...)
- TODO: check
+ NOT-FOR-US: Sentry
CVE-2024-45605 (Sentry is a developer-first error tracking and performance monitoring ...)
- TODO: check
+ NOT-FOR-US: Sentry
CVE-2024-45604 (Contao is an Open Source CMS. In affected versions authenticated users ...)
NOT-FOR-US: Contao CMS
CVE-2024-45537 (Apache Druid allows users with certain permissions to read data from o ...)
@@ -84,25 +84,25 @@ CVE-2024-45384 (Padding Oracle vulnerability in Apache Druid extension, druid-pa
CVE-2024-43460 (Improper authorization in Dynamics 365 Business Central resulted in a ...)
NOT-FOR-US: Microsoft
CVE-2024-42503 (Authenticated command execution vulnerability exist in the ArubaOS co ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-42502 (Authenticated command injection vulnerability exists in the ArubaOS co ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-42501 (An authenticated Path Traversal vulnerabilities exists in the ArubaOS. ...)
- TODO: check
+ NOT-FOR-US: HPE
CVE-2024-38860 (Improper neutralization of input in Checkmk before versions 2.3.0p16 a ...)
- TODO: check
+ - check-mk <removed>
CVE-2024-38813 (The vCenter Server contains a privilege escalation vulnerability.A mal ...)
- TODO: check
+ NOT-FOR-US: VMware
CVE-2024-38812 (ThevCenter Server contains a heap-overflow vulnerability in the implem ...)
- TODO: check
+ NOT-FOR-US: VMware
CVE-2024-38380 (This vulnerability occurs when user-supplied input is improperly sanit ...)
- TODO: check
+ NOT-FOR-US: Proroute H685t-w
CVE-2024-38183 (An improper access control vulnerability in GroupMe allows an a unauth ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2024-22303 (Incorrect Privilege Assignment vulnerability in favethemes Houzez houz ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-21743 (Privilege Escalation vulnerability in favethemes Houzez Login Register ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-8421
NOT-FOR-US: Red Hat specific golang.org/x/net/http2 CVE relating to CVE-2023-39325
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309710#c7
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c2869b9b80db363ee3b2c4a743e628f595ab6deb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c2869b9b80db363ee3b2c4a743e628f595ab6deb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240917/90990706/attachment.htm>
More information about the debian-security-tracker-commits
mailing list