Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d4a35668 by Moritz Muehlenhoff at 2024-12-23T09:16:50+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3,43 +3,43 @@ CVE-2024-56378 (libpoppler.so in Poppler through 24.12.0 has 
an out-of-bounds re
 CVE-2024-56375 (An integer underflow was discovered in Fort 1.6.3 and 1.6.4 
before 1.6 ...)
        TODO: check
 CVE-2024-56314 (A stored cross-site scripting (XSS) vulnerability in the 
Project name  ...)
-       TODO: check
+       NOT-FOR-US: REDCap
 CVE-2024-56313 (A stored cross-site scripting (XSS) vulnerability in the 
Calendar feat ...)
-       TODO: check
+       NOT-FOR-US: REDCap
 CVE-2024-56312 (A stored cross-site scripting (XSS) vulnerability in the 
Project Dashb ...)
-       TODO: check
+       NOT-FOR-US: REDCap
 CVE-2024-56311 (REDCap through 15.0.0 has a security flaw in the Notes section 
of cale ...)
-       TODO: check
+       NOT-FOR-US: REDCap
 CVE-2024-56310 (REDCap through 15.0.0 has a security flaw in the Project 
Dashboards na ...)
-       TODO: check
+       NOT-FOR-US: REDCap
 CVE-2024-54082 (home 5G HR02 and Wi-Fi STATION SH-54C contain an OS command 
injection  ...)
-       TODO: check
+       NOT-FOR-US: Sharp
 CVE-2024-52321 (Multiple SHARP routers contain an improper authentication 
vulnerabilit ...)
-       TODO: check
+       NOT-FOR-US: Sharp
 CVE-2024-47864 (home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C 
contain a ...)
-       TODO: check
+       NOT-FOR-US: Sharp
 CVE-2024-46873 (Multiple SHARP routers leave the hidden debug function 
enabled. An arb ...)
-       TODO: check
+       NOT-FOR-US: Sharp
 CVE-2024-45721 (home 5G HR02, Wi-Fi STATION SH-52B, and Wi-Fi STATION SH-54C 
contain a ...)
-       TODO: check
+       NOT-FOR-US: Sharp
 CVE-2024-12901 (A vulnerability classified as critical was found in FoxCMS up 
to 1.2.  ...)
-       TODO: check
+       NOT-FOR-US: FoxCMS
 CVE-2024-12900 (A vulnerability classified as critical has been found in 
FoxCMS up to  ...)
-       TODO: check
+       NOT-FOR-US: FoxCMS
 CVE-2024-12899 (A vulnerability was found in 1000 Projects Attendance Tracking 
Managem ...)
-       TODO: check
+       NOT-FOR-US: 1000 Projects Attendance Tracking Management System
 CVE-2024-12898 (A vulnerability was found in 1000 Projects Attendance Tracking 
Managem ...)
-       TODO: check
+       NOT-FOR-US: 1000 Projects Attendance Tracking Management System
 CVE-2024-12897 (A vulnerability was found in Intelbras VIP S3020 G2, VIP S4020 
G2, VIP ...)
-       TODO: check
+       NOT-FOR-US: Intelbras
 CVE-2024-12896 (A vulnerability was found in Intelbras VIP S3020 G2, VIP S4020 
G2, VIP ...)
-       TODO: check
+       NOT-FOR-US: Intelbras
 CVE-2024-11230 (The Elementor Header & Footer Builder plugin for WordPress is 
vulnerab ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-12895 (A vulnerability has been found in TreasureHuntGame 
TreasureHunt up to  ...)
-       TODO: check
+       NOT-FOR-US: TreasureHunt
 CVE-2024-12894 (A vulnerability, which was classified as critical, was found 
in Treasu ...)
-       TODO: check
+       NOT-FOR-US: TreasureHunt
 CVE-2024-12893 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: Portabilis i-Educar
 CVE-2024-12892 (A vulnerability classified as problematic was found in 
code-projects O ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4a3566882e5f85bfebac412d263d08d62bf1814

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d4a3566882e5f85bfebac412d263d08d62bf1814
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to