Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: 1715bbcf by Moritz Muehlenhoff at 2024-11-14T10:08:28+01:00 NFUS - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,61 +1,61 @@ CVE-2024-9186 (The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2024-5083 (A storedCross-site Scripting vulnerability has been discovered in Sona ...) - TODO: check + NOT-FOR-US: Sonatype CVE-2024-5082 (A Remote Code Execution vulnerability has been discovered in Sonatype ...) - TODO: check + NOT-FOR-US: Sonatype CVE-2024-51027 (Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command e ...) - TODO: check + NOT-FOR-US: Ruijie NBR800G CVE-2024-50956 (A buffer overflow in the RecvSocketData function of Inovance HCPLC_AM4 ...) - TODO: check + NOT-FOR-US: Inovance CVE-2024-50955 (An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles TCP protoc ...) - TODO: check + NOT-FOR-US: XINJE CVE-2024-45879 (The file upload function in the "QWKalkulation" tool of baltic-it TOPq ...) - TODO: check + NOT-FOR-US: baltic-it TOPqw Webportal CVE-2024-45878 (The "Stammdaten" menu of baltic-it TOPqw Webportal v1.35.283.2 (fixed ...) - TODO: check + NOT-FOR-US: baltic-it TOPqw Webportal CVE-2024-45877 (baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Acces ...) - TODO: check + NOT-FOR-US: baltic-it TOPqw Webportal CVE-2024-45876 (The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed in vers ...) - TODO: check + NOT-FOR-US: baltic-it TOPqw Webportal CVE-2024-45875 (The create user function in baltic-it TOPqw Webportal 1.35.287.1 (fixe ...) - TODO: check + NOT-FOR-US: baltic-it TOPqw Webportal CVE-2024-41167 (Improper input validation in UEFI firmware in some Intel(R) Server Boa ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-40885 (Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIO ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-40410 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered ...) - TODO: check + NOT-FOR-US: Cybele Software Thinfinity Workspace CVE-2024-40408 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered ...) - TODO: check + NOT-FOR-US: Cybele Software Thinfinity Workspace CVE-2024-40407 (A full path disclosure in Cybele Software Thinfinity Workspace before ...) - TODO: check + NOT-FOR-US: Cybele Software Thinfinity Workspace CVE-2024-40405 (Incorrect access control in Cybele Software Thinfinity Workspace befor ...) - TODO: check + NOT-FOR-US: Cybele Software Thinfinity Workspace CVE-2024-40404 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered ...) - TODO: check + NOT-FOR-US: Cybele Software Thinfinity Workspace CVE-2024-39811 (Improper input validation in firmware for some Intel(R) Server M20NTP ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-39766 (Improper neutralization of special elements used in SQL command in som ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-39609 (Improper Access Control in UEFI firmware for some Intel(R) Server Boar ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-39368 (Improper neutralization of special elements used in an SQL command ('S ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-39285 (Improper access control in UEFI firmware in some Intel(R) Server M20NT ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-38668 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Standard E ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-38665 (Out-of-bounds write in some Intel(R) Graphics Drivers may allow an aut ...) TODO: check CVE-2024-38660 (Protection mechanism failure in the SPP for some Intel(R) Xeon(R) proc ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-38387 (Uncontrolled search path in the Intel(R) Graphics Driver installers fo ...) TODO: check CVE-2024-38383 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Editio ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-37027 (Improper Input validation in some Intel(R) VTune(TM) Profiler software ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-37025 (Incorrect execution-assigned permissions in some Intel(R) Advanced Lin ...) TODO: check CVE-2024-37024 (Uncontrolled search path for some ACAT software maintained by Intel(R) ...) @@ -83,23 +83,23 @@ CVE-2024-36242 (Protection mechanism failure in the SPP for some Intel(R) Proces CVE-2024-35245 (Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi ...) TODO: check CVE-2024-35201 (Incorrect default permissions in the Intel(R) SDP Tool for Windows sof ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-34776 (Out-of-bounds write in some Intel(R) SGX SDK software may allow an aut ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-34170 (Improper buffer restrictions in some Intel(R) Graphics Drivers may all ...) TODO: check CVE-2024-34167 (Uncontrolled search path for the Intel(R) Server Board S2600ST Family ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-34165 (Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler be ...) TODO: check CVE-2024-34164 (Uncontrolled search path element in some Intel(R) MAS software before ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-34028 (Uncontrolled search path in some Intel(R) Graphics Offline Compiler fo ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-34023 (Untrusted pointer dereference in some Intel(R) Graphics Drivers may al ...) TODO: check CVE-2024-34022 (Improper Access Control in some Thunderbolt(TM) Share software before ...) - TODO: check + NOT-FOR-US: Intel CVE-2024-33624 (Improper input validation for some Intel(R) PROSet/Wireless WiFi softw ...) TODO: check CVE-2024-33617 (Insufficient control flow management in some Intel(R) QAT Engine for O ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits