Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5d879413 by Moritz Muehlenhoff at 2024-02-15T21:32:32+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -24,103 +24,103 @@ CVE-2024-21892
        - nodejs <unfixed>
        NOTE: 
https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/#code-injection-and-privilege-escalation-through-linux-capabilities-cve-2024-21892---high
 CVE-2024-25502 (Directory Traversal vulnerability in flusity CMS v.2.4 allows 
a remote ...)
-       TODO: check
+       NOT-FOR-US: flusity CMS
 CVE-2024-25373 (Tenda AC10V4.0 V16.03.10.20 was discovered to contain a stack 
overflow ...)
-       TODO: check
+       NOT-FOR-US: Tenda
 CVE-2024-23113 (A use of externally-controlled format string in Fortinet 
FortiOS versi ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2024-20750 (Substance3D - Designer versions 13.1.0 and earlier are 
affected by an  ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20749 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20748 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20747 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20744 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20743 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20742 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20741 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by a Wri ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20740 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20739 (Audition versions 24.0.3, 23.6.2 and earlier are affected by a 
Heap-ba ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20738 (Adobe Framemaker versions 2022.1 and earlier are affected by 
an Improp ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20736 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20735 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20734 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20733 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20731 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20730 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20729 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20728 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20727 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20726 (Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier 
are aff ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20725 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20724 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20723 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by a Buf ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20722 (Substance3D - Painter versions 9.1.1 and earlier are affected 
by an ou ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20720 (Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and 
earlier are a ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20719 (Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and 
earlier are a ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20718 (Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and 
earlier are a ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20717 (Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and 
earlier are a ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-20716 (Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and 
earlier are a ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2024-1530 (A vulnerability, which was classified as critical, has been 
found in E ...)
-       TODO: check
+       NOT-FOR-US: ECshop
 CVE-2024-0390 (INPRAX "iZZi connect" application on Android contains 
hard-coded MQTT  ...)
-       TODO: check
+       NOT-FOR-US: INPRAX "iZZi connect" application on Android
 CVE-2023-7081 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
-       TODO: check
+       NOT-FOR-US: POSTASIL Online Payment System
 CVE-2023-6255 (Use of Hard-coded Credentials vulnerability in Utarit 
Information Tech ...)
-       TODO: check
+       NOT-FOR-US: Utarit
 CVE-2023-5155 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
-       TODO: check
+       NOT-FOR-US: Utarit
 CVE-2023-4993 (Improper Privilege Management vulnerability in Utarit 
Information Tech ...)
-       TODO: check
+       NOT-FOR-US: Utarit
 CVE-2023-4539 (Use of a hard-coded password for a special database account 
created du ...)
-       TODO: check
+       NOT-FOR-US: Comarch ERP XL
 CVE-2023-4538 (The database access credentials configured during installation 
are sto ...)
-       TODO: check
+       NOT-FOR-US: Comarch ERP XL
 CVE-2023-4537 (Comarch ERP XL client is vulnerable to MS SQL protocol 
downgrade reque ...)
-       TODO: check
+       NOT-FOR-US: Comarch ERP XL
 CVE-2023-47537 (An improper certificate validation vulnerability in Fortinet 
FortiOS 7 ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-45581 (An improper privilege management vulnerability [CWE-269] in 
Fortinet F ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-44253 (An exposure of sensitive information to an unauthorized actor 
vulnerab ...)
-       TODO: check
+       NOT-FOR-US: Fortinet
 CVE-2023-39245 (DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 
10.0, c ...)
-       TODO: check
+       NOT-FOR-US: Dell
 CVE-2023-39244 (DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 
10.0, c ...)
-       TODO: check
+       NOT-FOR-US: Dell
 CVE-2023-32484 (Dell Networking Switches running Enterprise SONiC versions 
4.1.0, 4.0. ...)
-       TODO: check
+       NOT-FOR-US: Dell
 CVE-2023-32462 (Dell OS10 Networking Switches running 10.5.2.x and above 
contain an OS ...)
-       TODO: check
+       NOT-FOR-US: Dell
 CVE-2024-26264 (EBM Technologies RISWEB's specific query function parameter 
does not p ...)
        NOT-FOR-US: EBM Technologies RISWEB
 CVE-2024-26263 (EBM Technologies RISWEB's specific URL path is not properly 
controlled ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d87941374f36a3d66a25b37973e8c2c0c035a6d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d87941374f36a3d66a25b37973e8c2c0c035a6d
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to