Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
09476ac5 by Salvatore Bonaccorso at 2024-08-27T10:53:50+02:00
Process some more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -20,57 +20,57 @@ CVE-2024-45321 (The App::cpanminus package through 1.7047 
for Perl downloads cod
 CVE-2024-45036 (Tophat is a mobile applications testing harness. An Improper 
Access Co ...)
        TODO: check
 CVE-2024-43916 (Authorization Bypass Through User-Controlled Key vulnerability 
in Dyla ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43915 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43798 (Chisel is a fast TCP/UDP tunnel, transported over HTTP, 
secured via SS ...)
        TODO: check
 CVE-2024-43356 (Cross-Site Request Forgery (CSRF) vulnerability in 
bobbingwide.This is ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43340 (Cross-Site Request Forgery (CSRF) vulnerability in Nasirahmed 
Advanced ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43339 (Cross-Site Request Forgery (CSRF) vulnerability in 
WebinarPress allows ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43337 (Cross-Site Request Forgery (CSRF) vulnerability in Brave Brave 
Popup B ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43336 (Cross-Site Request Forgery (CSRF) vulnerability in WP User 
Manager.Thi ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43325 (Cross-Site Request Forgery (CSRF) vulnerability in Naiche Dark 
Mode fo ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43316 (Cross-Site Request Forgery (CSRF) vulnerability in Checkout 
Plugins St ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43301 (Cross-Site Request Forgery (CSRF) vulnerability in Fonts 
Plugin Fonts  ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43299 (Cross-Site Request Forgery (CSRF) vulnerability in Softaculous 
Team Sp ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43295 (Cross-Site Request Forgery (CSRF) vulnerability in Passionate 
Programm ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43287 (Cross-Site Request Forgery (CSRF) vulnerability in Brevo 
Newsletter, S ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43269 (Cross-Site Request Forgery (CSRF) vulnerability in WPBackItUp 
Backup a ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43265 (Cross-Site Request Forgery (CSRF) vulnerability in 
Analytify.This issu ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43264 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43259 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43258 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43257 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43255 (Cross-Site Request Forgery (CSRF) vulnerability in Stormhill 
Media MyB ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43251 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43230 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43214 (Missing Authorization vulnerability in myCred.This issue 
affects myCre ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43117 (Cross-Site Request Forgery (CSRF) vulnerability in WPMU DEV 
Hummingbir ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-43116 (Cross-Site Request Forgery (CSRF) vulnerability in 10up Simple 
Local A ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-41176 (The MPD package included in TwinCAT/BSDallows an 
authenticated, low-pr ...)
        TODO: check
 CVE-2024-41175 (The IPC-Diagnostics package included in TwinCAT/BSD is 
vulnerable to a ...)
@@ -80,13 +80,13 @@ CVE-2024-41174 (The IPC-Diagnostics package in TwinCAT/BSD 
is susceptible to imp
 CVE-2024-41173 (The IPC-Diagnostics package included in TwinCAT/BSD is 
vulnerable to a ...)
        TODO: check
 CVE-2024-39657 (Cross-Site Request Forgery (CSRF) vulnerability in Sender 
Sender \u201 ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-39645 (Cross-Site Request Forgery (CSRF) vulnerability in Themeum 
Tutor LMS.T ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-39641 (Cross-Site Request Forgery (CSRF) vulnerability in ThimPress 
LearnPres ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-39628 (Cross-Site Request Forgery (CSRF) vulnerability in Saturday 
Drive Ninj ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-8188
        REJECTED
 CVE-2024-8174 (A vulnerability has been found in code-projects Blood Bank 
System 1.0  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/09476ac5dfbc5c4767344f9429ce23d8628466c8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/09476ac5dfbc5c4767344f9429ce23d8628466c8
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to