Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1715bbcf by Moritz Muehlenhoff at 2024-11-14T10:08:28+01:00
NFUS

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,61 +1,61 @@
 CVE-2024-9186 (The Recover WooCommerce Cart Abandonment, Newsletter, Email 
Marketing, ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-5083 (A storedCross-site Scripting vulnerability has been discovered 
in Sona ...)
-       TODO: check
+       NOT-FOR-US: Sonatype
 CVE-2024-5082 (A Remote Code Execution vulnerability has been discovered in 
Sonatype  ...)
-       TODO: check
+       NOT-FOR-US: Sonatype
 CVE-2024-51027 (Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to 
command e ...)
-       TODO: check
+       NOT-FOR-US: Ruijie NBR800G
 CVE-2024-50956 (A buffer overflow in the RecvSocketData function of Inovance 
HCPLC_AM4 ...)
-       TODO: check
+       NOT-FOR-US: Inovance
 CVE-2024-50955 (An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles 
TCP protoc ...)
-       TODO: check
+       NOT-FOR-US: XINJE
 CVE-2024-45879 (The file upload function in the "QWKalkulation" tool of 
baltic-it TOPq ...)
-       TODO: check
+       NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45878 (The "Stammdaten" menu of baltic-it TOPqw Webportal v1.35.283.2 
(fixed  ...)
-       TODO: check
+       NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45877 (baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to 
Incorrect Acces ...)
-       TODO: check
+       NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45876 (The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed 
in vers ...)
-       TODO: check
+       NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45875 (The create user function in baltic-it TOPqw Webportal 
1.35.287.1 (fixe ...)
-       TODO: check
+       NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-41167 (Improper input validation in UEFI firmware in some Intel(R) 
Server Boa ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-40885 (Use after free in the UEFI firmware of some Intel(R) Server 
M20NTP BIO ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-40410 (Cybele Software Thinfinity Workspace before v7.0.2.113 was 
discovered  ...)
-       TODO: check
+       NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40408 (Cybele Software Thinfinity Workspace before v7.0.2.113 was 
discovered  ...)
-       TODO: check
+       NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40407 (A full path disclosure in Cybele Software Thinfinity Workspace 
before  ...)
-       TODO: check
+       NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40405 (Incorrect access control in Cybele Software Thinfinity 
Workspace befor ...)
-       TODO: check
+       NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40404 (Cybele Software Thinfinity Workspace before v7.0.2.113 was 
discovered  ...)
-       TODO: check
+       NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-39811 (Improper input validation in firmware for some Intel(R) Server 
M20NTP  ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-39766 (Improper neutralization of special elements used in SQL 
command in som ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-39609 (Improper Access Control in UEFI firmware for some Intel(R) 
Server Boar ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-39368 (Improper neutralization of special elements used in an SQL 
command ('S ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-39285 (Improper access control in UEFI firmware in some Intel(R) 
Server M20NT ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-38668 (Uncontrolled search path for some Intel(R) Quartus(R) Prime 
Standard E ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-38665 (Out-of-bounds write in some Intel(R) Graphics Drivers may 
allow an aut ...)
        TODO: check
 CVE-2024-38660 (Protection mechanism failure in the SPP for some Intel(R) 
Xeon(R) proc ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-38387 (Uncontrolled search path in the Intel(R) Graphics Driver 
installers fo ...)
        TODO: check
 CVE-2024-38383 (Uncontrolled search path for some Intel(R) Quartus(R) Prime 
Pro Editio ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-37027 (Improper Input validation in some Intel(R) VTune(TM) Profiler 
software ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-37025 (Incorrect execution-assigned permissions in some Intel(R) 
Advanced Lin ...)
        TODO: check
 CVE-2024-37024 (Uncontrolled search path for some ACAT software maintained by 
Intel(R) ...)
@@ -83,23 +83,23 @@ CVE-2024-36242 (Protection mechanism failure in the SPP for 
some Intel(R) Proces
 CVE-2024-35245 (Uncontrolled search path element in some Intel(R) 
PROSet/Wireless WiFi ...)
        TODO: check
 CVE-2024-35201 (Incorrect default permissions in the Intel(R) SDP Tool for 
Windows sof ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-34776 (Out-of-bounds write in some Intel(R) SGX SDK software may 
allow an aut ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-34170 (Improper buffer restrictions in some Intel(R) Graphics Drivers 
may all ...)
        TODO: check
 CVE-2024-34167 (Uncontrolled search path for the Intel(R) Server Board S2600ST 
Family  ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-34165 (Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ 
Compiler be ...)
        TODO: check
 CVE-2024-34164 (Uncontrolled search path element in some Intel(R) MAS software 
before  ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-34028 (Uncontrolled search path in some Intel(R) Graphics Offline 
Compiler fo ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-34023 (Untrusted pointer dereference in some Intel(R) Graphics 
Drivers may al ...)
        TODO: check
 CVE-2024-34022 (Improper Access Control in some Thunderbolt(TM) Share software 
before  ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2024-33624 (Improper input validation for some Intel(R) PROSet/Wireless 
WiFi softw ...)
        TODO: check
 CVE-2024-33617 (Insufficient control flow management in some Intel(R) QAT 
Engine for O ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to