Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5e3ffbd2 by Salvatore Bonaccorso at 2024-06-16T08:19:35+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,39 +1,39 @@
 CVE-2024-6016 (A vulnerability, which was classified as critical, has been 
found in i ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Online Laundry Management System
 CVE-2024-6015 (A vulnerability classified as critical was found in 
itsourcecode Onlin ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Online House Rental System
 CVE-2024-6014 (A vulnerability classified as critical has been found in 
itsourcecode  ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Document Management System
 CVE-2024-6013 (A vulnerability was found in itsourcecode Online Book Store 
1.0. It ha ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Online Book Store
 CVE-2024-6009 (A vulnerability has been found in itsourcecode Event Calendar 
1.0 and  ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Event Calendar
 CVE-2024-6008 (A vulnerability, which was classified as critical, was found in 
itsour ...)
-       TODO: check
+       NOT-FOR-US: itsourcecode Online Book Store
 CVE-2024-6007 (A vulnerability classified as critical has been found in 
Netentsec NS- ...)
-       TODO: check
+       NOT-FOR-US: Netentsec NS-ASG Application Security Gateway
 CVE-2024-6006 (A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 
4.1.0. It h ...)
-       TODO: check
+       NOT-FOR-US: ZKTeco ZKBio CVSecurity V5000
 CVE-2024-6005 (A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 
4.1.0. It h ...)
-       TODO: check
+       NOT-FOR-US: ZKTeco ZKBio CVSecurity V5000
 CVE-2024-5858 (The AI Infographic Maker plugin for WordPress is vulnerable to 
unautho ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-5611 (The Stratum \u2013 Elementor Widgets plugin for WordPress is 
vulnerabl ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-4551 (The Video Gallery \u2013 YouTube Playlist, Channel Gallery by 
YotuWP p ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-4258 (The Video Gallery \u2013 YouTube Playlist, Channel Gallery by 
YotuWP p ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-4095 (The Collapse-O-Matic plugin for WordPress is vulnerable to 
Stored Cros ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-3105 (The Woody code snippets \u2013 Insert Header Footer Code, 
AdSense Ads  ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-31870 (IBM Db2 for i 7.2, 7.3, 7.4, and 7.5 supplies user defined 
table funct ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2024-2695 (The Shariff Wrapper plugin for WordPress is vulnerable to 
Stored Cross ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-27275 (IBM i 7.2, 7.3, 7.4, and 7.5 contains a local privilege 
escalation vul ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2024-6003 (A vulnerability was found in Guangdong Baolun Electronics IP 
Network B ...)
        NOT-FOR-US: Guangdong Baolun Electronics IP Network Broadcasting 
Service Platform
 CVE-2024-6000 (The FooEvents for WooCommerce plugin for WordPress is 
vulnerable to un ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e3ffbd215736087af6fe1d8af83df710e8f22b1

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e3ffbd215736087af6fe1d8af83df710e8f22b1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to