[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Sep 23 21:40:02 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
67cfca11 by Salvatore Bonaccorso at 2024-09-23T22:39:28+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -13,11 +13,11 @@ CVE-2024-47069 (Oveleon Cookie Bar is a cookie bar is for the Contao Open Source
 CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 an ...)
 	TODO: check
 CVE-2024-47066 (Lobe Chat is an open-source artificial intelligence chat framework. Pr ...)
-	TODO: check
+	NOT-FOR-US: Lobe Chat
 CVE-2024-46997 (DataEase is an open source data visualization analysis tool. Prior to  ...)
-	TODO: check
+	NOT-FOR-US: DataEase
 CVE-2024-46985 (DataEase is an open source data visualization analysis tool. Prior to  ...)
-	TODO: check
+	NOT-FOR-US: DataEase
 CVE-2024-46639 (A cross-site scripting (XSS) vulnerability in HelpDeskZ v2.0.2 allows  ...)
 	NOT-FOR-US: HelpDeskZ
 CVE-2024-46544 (Incorrect Default Permissions vulnerability in Apache Tomcat Connector ...)
@@ -32,31 +32,31 @@ CVE-2024-44540 (Ubiquiti AirMax firmware version firmware version 8 allows attac
 CVE-2024-43201 (The Planet Fitness Workouts iOS and Android mobile apps prior to versi ...)
 	NOT-FOR-US: Planet Fitness Workouts iOS and Android mobile apps
 CVE-2024-41228 (A symlink following vulnerability in the pouch cp function of AliyunCo ...)
-	TODO: check
+	NOT-FOR-US: AliyunContainerService
 CVE-2024-40442 (An issue in Doccano Open source annotation tools for machine learning  ...)
-	TODO: check
+	NOT-FOR-US: Doccano
 CVE-2024-40441 (An issue in Doccano Open source annotation tools for machine learning  ...)
-	TODO: check
+	NOT-FOR-US: Doccano
 CVE-2024-39843 (A SQL injection vulnerability in Centreon 24.04.2 allows a remote high ...)
 	TODO: check
 CVE-2024-39842 (A SQL injection vulnerability in Centreon 24.04.2 allows a remote high ...)
 	TODO: check
 CVE-2024-39342 (Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10 ...)
-	TODO: check
+	NOT-FOR-US: Entrust Instant Financial Issuance
 CVE-2024-39341 (Entrust Instant Financial Issuance (On Premise) Software (formerly kno ...)
-	TODO: check
+	NOT-FOR-US: Entrust Instant Financial Issuance
 CVE-2024-37779 (WoodWing Elvis DAM v6.98.1 was discovered to contain an authenticated  ...)
-	TODO: check
+	NOT-FOR-US: WoodWing Elvis DAM
 CVE-2024-34331 (A lack of code signature verification in Parallels Desktop for Mac v19 ...)
-	TODO: check
+	NOT-FOR-US: Parallels Desktop
 CVE-2024-23972 (Sony XAV-AX5500 USB Configuration Descriptor Buffer Overflow Remote Co ...)
-	TODO: check
+	NOT-FOR-US: Sony XAV-AX5500 USB Configuration Descriptor
 CVE-2024-23934 (Sony XAV-AX5500 WMV/ASF Parsing Stack-based Buffer Overflow Remote Cod ...)
-	TODO: check
+	NOT-FOR-US: Sony XAV-AX5500 WMV/ASF
 CVE-2024-23933 (Sony XAV-AX5500 CarPlay TLV Stack-based Buffer Overflow Remote Code Ex ...)
-	TODO: check
+	NOT-FOR-US: Sony XAV-AX5500 CarPlay TLV
 CVE-2024-23922 (Sony XAV-AX5500 Insufficient Firmware Update Validation Remote Code Ex ...)
-	TODO: check
+	NOT-FOR-US: Sony XAV-AX5500
 CVE-2024-0005 (A condition exists in FlashArray and FlashBlade Purity whereby a malic ...)
 	TODO: check
 CVE-2024-0004 (A condition exists in FlashArray Purity whereby an user with array adm ...)
@@ -68,7 +68,7 @@ CVE-2024-0002 (A condition exists in FlashArray Purity whereby an attacker can e
 CVE-2024-0001 (A condition exists in FlashArray Purity whereby a local account intend ...)
 	TODO: check
 CVE-2023-46948 (A reflected Cross-Site Scripting (XSS) vulnerability was found on Teme ...)
-	TODO: check
+	NOT-FOR-US: Temenos T24 Browser
 CVE-2022-48945 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.1.4-1
 	[bullseye] - linux 5.10.178-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67cfca11a385c33000b188dc4b5f09f1c6d5565b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67cfca11a385c33000b188dc4b5f09f1c6d5565b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240923/43d951e5/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list