Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4340f208 by Moritz Muehlenhoff at 2024-06-11T10:29:59+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,23 +1,23 @@
 CVE-2024-5530 (The ShopLentor \u2013 WooCommerce Builder for Elementor & 
Gutenberg +1 ...)
        TODO: check
 CVE-2024-5090 (The SiteOrigin Widgets Bundle plugin for WordPress is 
vulnerable to St ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-4319 (The Advanced Contact form 7 DB plugin for WordPress is 
vulnerable to u ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-4266 (The MetForm \u2013 Contact Form, Survey, Quiz, & Custom Form 
Builder f ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-3723 (The Advanced Contact form 7 DB plugin for WordPress is 
vulnerable to S ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-3549 (The Blog2Social: Social Media Auto Post & Scheduler plugin for 
WordPre ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-37289 (An improper access control vulnerability in Trend Micro Apex 
One could ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-37178 (SAP Financial Consolidation does not sufficiently encode 
user-controll ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-37177 (SAP Financial Consolidation allows data to enter a Web 
application thr ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-37176 (SAP BW/4HANA Transformation and Data Transfer Process (DTP) 
allows an  ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-37169 (@jmondi/url-to-png is a self-hosted URL to PNG utility. 
Versions prior ...)
        TODO: check
 CVE-2024-37168 (@grpc/grps-js implements the core functionality of gRPC purely 
in Java ...)
@@ -25,35 +25,35 @@ CVE-2024-37168 (@grpc/grps-js implements the core 
functionality of gRPC purely i
 CVE-2024-37166 (ghtml is software that uses tagged templates for template 
engine funct ...)
        TODO: check
 CVE-2024-37130 (Dell OpenManage Server Administrator, versions 11.0.1.0 and 
prior, con ...)
-       TODO: check
+       NOT-FOR-US: Dell
 CVE-2024-36473 (Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is 
vulnerabl ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36471 (Import functionality is vulnerable to DNS rebinding attacks 
between ve ...)
        TODO: check
 CVE-2024-36419 (SuiteCRM is an open-source Customer Relationship Management 
(CRM) soft ...)
-       TODO: check
+       NOT-FOR-US: SuiteCRM
 CVE-2024-36418 (SuiteCRM is an open-source Customer Relationship Management 
(CRM) soft ...)
-       TODO: check
+       NOT-FOR-US: SuiteCRM
 CVE-2024-36416 (SuiteCRM is an open-source Customer Relationship Management 
(CRM) soft ...)
-       TODO: check
+       NOT-FOR-US: SuiteCRM
 CVE-2024-36360 (OS command injection vulnerability exists in awkblog v0.0.1 
(commit ha ...)
        TODO: check
 CVE-2024-36359 (A cross-site scripting (XSS) vulnerability in Trend Micro 
InterScan We ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36358 (A link following vulnerability in Trend Micro Deep Security 
20.x agent ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36307 (A security agent link following vulnerability in Trend Micro 
Apex One  ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36306 (A link following vulnerability in the Trend Micro Apex One and 
Apex On ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36305 (A security agent link following vulnerability in Trend Micro 
Apex One  ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36304 (A Time-of-Check Time-Of-Use vulnerability in the Trend Micro 
Apex One  ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36303 (An origin validation vulnerability in the Trend Micro Apex One 
securit ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-36302 (An origin validation vulnerability in the Trend Micro Apex One 
securit ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-35329 (libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in 
yaml_do ...)
        TODO: check
 CVE-2024-35242 (Composer is a dependency manager for PHP. On the 2.x branch 
prior to v ...)
@@ -61,45 +61,45 @@ CVE-2024-35242 (Composer is a dependency manager for PHP. 
On the 2.x branch prio
 CVE-2024-35241 (Composer is a dependency manager for PHP. On the 2.x branch 
prior to v ...)
        TODO: check
 CVE-2024-34691 (Manage Incoming Payment Files (F1680) of SAP S/4HANA does not 
perform  ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-34690 (SAP Student Life Cycle Management (SLcM) fails to conduct 
proper autho ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-34688 (Due to unrestricted access to the Meta Model Repository 
services in SA ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-34686 (Due to insufficient input validation, SAP CRM WebClient UI 
allows an u ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-34684 (On Unix, SAP BusinessObjects Business Intelligence Platform 
(Schedulin ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-34683 (An authenticated attacker can upload malicious file to SAP 
Document Bu ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-33850 (Pexip Infinity before 34.1 has Improper Access Control for 
persons in  ...)
-       TODO: check
+       NOT-FOR-US: Pexip Infinity
 CVE-2024-33001 (SAP NetWeaver and ABAP platform allows an attacker to impede 
performan ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-32849 (Trend Micro Security 17.x (Consumer) is vulnerable to a 
Privilege Esca ...)
-       TODO: check
+       NOT-FOR-US: Trend Micro
 CVE-2024-31404 (Insertion of sensitive information into sent data issue exists 
in Cybo ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31403 (Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 
to 6.0.0  ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31402 (Incorrect authorization vulnerability in Cybozu Garoon 5.0.0 
to 5.15.2 ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31401 (Cross-site scripting vulnerability in Cybozu Garoon 5.0.0 to 
5.15.2 al ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31400 (Insertion of sensitive information into sent data issue exists 
in Cybo ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31399 (Excessive platform resource consumption within a loop issue 
exists in  ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31398 (Insertion of sensitive information into sent data issue exists 
in Cybo ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-31397 (Improper handling of extra values issue exists in Cybozu 
Garoon 5.0.0  ...)
-       TODO: check
+       NOT-FOR-US: Cybozu
 CVE-2024-2473 (The WPS Hide Login plugin for WordPress is vulnerable to Login 
Page Di ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-29855 (Hard-coded JWT secret allows authentication bypass in Veeam 
Recovery O ...)
-       TODO: check
+       NOT-FOR-US: Veeam
 CVE-2024-28164 (SAP NetWeaver AS Java (CAF - Guided Procedures) allows an 
unauthentica ...)
-       TODO: check
+       NOT-FOR-US: SAP
 CVE-2024-27885 (This issue was addressed with improved validation of symlinks. 
This is ...)
        TODO: check
 CVE-2024-27857 (An out-of-bounds access issue was addressed with improved 
bounds check ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4340f20892bcc8b57053da7acdcba5395588661b

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4340f20892bcc8b57053da7acdcba5395588661b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to