Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
d6beafc3 by security tracker role at 2024-07-30T08:11:47+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,387 @@
+CVE-2024-7252 (Comodo Internet Security Pro cmdagent Link Following Local
Privilege E ...)
+ TODO: check
+CVE-2024-7251 (Comodo Internet Security Pro cmdagent Link Following Local
Privilege E ...)
+ TODO: check
+CVE-2024-7250 (Comodo Internet Security Pro cmdagent Link Following Local
Privilege E ...)
+ TODO: check
+CVE-2024-7249 (Comodo Firewall Link Following Local Privilege Escalation
Vulnerabilit ...)
+ TODO: check
+CVE-2024-7248 (Comodo Internet Security Pro Directory Traversal Local
Privilege Escal ...)
+ TODO: check
+CVE-2024-7224 (A vulnerability was found in SourceCodester Lot Reservation
Management ...)
+ TODO: check
+CVE-2024-7223 (A vulnerability has been found in SourceCodester Lot
Reservation Manag ...)
+ TODO: check
+CVE-2024-7222 (A vulnerability, which was classified as critical, was found in
Source ...)
+ TODO: check
+CVE-2024-7221 (A vulnerability, which was classified as critical, has been
found in S ...)
+ TODO: check
+CVE-2024-7220 (A vulnerability classified as critical was found in
SourceCodester Sch ...)
+ TODO: check
+CVE-2024-7219 (A vulnerability classified as critical has been found in
SourceCodeste ...)
+ TODO: check
+CVE-2024-7218 (A vulnerability was found in SourceCodester School Log
Management Syst ...)
+ TODO: check
+CVE-2024-7217 (A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It
has been ...)
+ TODO: check
+CVE-2024-7216 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It
has been ...)
+ TODO: check
+CVE-2024-7215 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832 and
classifi ...)
+ TODO: check
+CVE-2024-7214 (A vulnerability has been found in TOTOLINK LR350
9.3.5u.6369_B20220309 ...)
+ TODO: check
+CVE-2024-7213 (A vulnerability, which was classified as critical, was found in
TOTOLI ...)
+ TODO: check
+CVE-2024-7212 (A vulnerability, which was classified as critical, has been
found in T ...)
+ TODO: check
+CVE-2024-7100 (The Bold Page Builder plugin for WordPress is vulnerable to
Stored Cro ...)
+ TODO: check
+CVE-2024-6620 (Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to
T10.20.0 ...)
+ TODO: check
+CVE-2024-6536 (The Zephyr Project Manager WordPress plugin before 3.3.99 does
not san ...)
+ TODO: check
+CVE-2024-6230 (The \u067e\u0644\u0627\u06af\u06cc\u0646
\u067e\u0631\u062f\u0627\u062 ...)
+ TODO: check
+CVE-2024-6226 (The WpStickyBar WordPress plugin through 2.1.0 does not
sanitise and ...)
+ TODO: check
+CVE-2024-6224 (The Send email only on Reply to My Comment WordPress plugin
through 1. ...)
+ TODO: check
+CVE-2024-6223 (The Send email only on Reply to My Comment WordPress plugin
through 1. ...)
+ TODO: check
+CVE-2024-6021 (The Donation Block For PayPal WordPress plugin through 2.1.0
does not ...)
+ TODO: check
+CVE-2024-5975 (The CZ Loan Management WordPress plugin through 1.1 does not
properly ...)
+ TODO: check
+CVE-2024-5809 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does
not sanit ...)
+ TODO: check
+CVE-2024-5808 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does
not have ...)
+ TODO: check
+CVE-2024-5807 (The Business Card WordPress plugin through 1.0.0 does not
prevent high ...)
+ TODO: check
+CVE-2024-5765 (The WpStickyBar WordPress plugin through 2.1.0 does not
properly sani ...)
+ TODO: check
+CVE-2024-4096 (The Responsive Tabs WordPress plugin through 4.0.8 does not
sanitise a ...)
+ TODO: check
+CVE-2024-42231 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42230 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2024-42229 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-42228 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42227 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42226 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-42225 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-42224 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42223 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-42162 (In the Linux kernel, the following vulnerability has been
resolved: g ...)
+ TODO: check
+CVE-2024-42161 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42160 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-42159 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42158 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42157 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42156 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42155 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42154 (In the Linux kernel, the following vulnerability has been
resolved: t ...)
+ TODO: check
+CVE-2024-42153 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-42152 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42151 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42150 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42149 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-42148 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42147 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-42146 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42145 (In the Linux kernel, the following vulnerability has been
resolved: I ...)
+ TODO: check
+CVE-2024-42144 (In the Linux kernel, the following vulnerability has been
resolved: t ...)
+ TODO: check
+CVE-2024-42143 (In the Linux kernel, the following vulnerability has been
resolved: o ...)
+ TODO: check
+CVE-2024-42142 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42141 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-42140 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
+ TODO: check
+CVE-2024-42139 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-42138 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-42137 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-42136 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-42135 (In the Linux kernel, the following vulnerability has been
resolved: v ...)
+ TODO: check
+CVE-2024-42134 (In the Linux kernel, the following vulnerability has been
resolved: v ...)
+ TODO: check
+CVE-2024-42133 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-42132 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42131 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-42130 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42129 (In the Linux kernel, the following vulnerability has been
resolved: l ...)
+ TODO: check
+CVE-2024-42128 (In the Linux kernel, the following vulnerability has been
resolved: l ...)
+ TODO: check
+CVE-2024-42127 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42126 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2024-42125 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-42124 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-42123 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42122 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42121 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42120 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42119 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42118 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42117 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42116 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-42115 (In the Linux kernel, the following vulnerability has been
resolved: j ...)
+ TODO: check
+CVE-2024-42114 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-42113 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42112 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42111 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42110 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42109 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42108 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42107 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-42106 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-42105 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42104 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-42103 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-42102 (In the Linux kernel, the following vulnerability has been
resolved: R ...)
+ TODO: check
+CVE-2024-42101 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-42100 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-42099 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-40836 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40835 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40834 (This issue was addressed by adding an additional prompt for
user conse ...)
+ TODO: check
+CVE-2024-40833 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40832 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40829 (The issue was addressed with improved checks. This issue is
fixed in w ...)
+ TODO: check
+CVE-2024-40828 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40827 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40824 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-40823 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40822 (This issue was addressed by restricting options offered on a
locked de ...)
+ TODO: check
+CVE-2024-40821 (An access issue was addressed with additional sandbox
restrictions. Th ...)
+ TODO: check
+CVE-2024-40818 (This issue was addressed by restricting options offered on a
locked de ...)
+ TODO: check
+CVE-2024-40817 (The issue was addressed with improved UI handling. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40816 (An out-of-bounds read was addressed with improved input
validation. Th ...)
+ TODO: check
+CVE-2024-40815 (A race condition was addressed with additional validation.
This issue ...)
+ TODO: check
+CVE-2024-40814 (A downgrade issue was addressed with additional code-signing
restricti ...)
+ TODO: check
+CVE-2024-40813 (A lock screen issue was addressed with improved state
management. This ...)
+ TODO: check
+CVE-2024-40812 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40811 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40809 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40807 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2024-40806 (An out-of-bounds read issue was addressed with improved input
validati ...)
+ TODO: check
+CVE-2024-40805 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2024-40804 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40803 (A type confusion issue was addressed with improved checks.
This issue ...)
+ TODO: check
+CVE-2024-40802 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40800 (An input validation issue was addressed with improved input
validation ...)
+ TODO: check
+CVE-2024-40799 (An out-of-bounds read issue was addressed with improved input
validati ...)
+ TODO: check
+CVE-2024-40798 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2024-40796 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2024-40795 (This issue was addressed with improved data protection. This
issue is ...)
+ TODO: check
+CVE-2024-40794 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-40793 (This issue was addressed by removing the vulnerable code. This
issue i ...)
+ TODO: check
+CVE-2024-40789 (An out-of-bounds access issue was addressed with improved
bounds check ...)
+ TODO: check
+CVE-2024-40788 (A type confusion issue was addressed with improved memory
handling. Th ...)
+ TODO: check
+CVE-2024-40787 (This issue was addressed by adding an additional prompt for
user conse ...)
+ TODO: check
+CVE-2024-40786 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-40785 (This issue was addressed with improved checks. This issue is
fixed in ...)
+ TODO: check
+CVE-2024-40784 (An integer overflow was addressed with improved input
validation. This ...)
+ TODO: check
+CVE-2024-40783 (The issue was addressed with improved restriction of data
container ac ...)
+ TODO: check
+CVE-2024-40782 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2024-40781 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-40780 (An out-of-bounds read was addressed with improved bounds
checking. Thi ...)
+ TODO: check
+CVE-2024-40779 (An out-of-bounds read was addressed with improved bounds
checking. Thi ...)
+ TODO: check
+CVE-2024-40778 (An authentication issue was addressed with improved state
management. ...)
+ TODO: check
+CVE-2024-40777 (An out-of-bounds access issue was addressed with improved
bounds check ...)
+ TODO: check
+CVE-2024-40776 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2024-40775 (A downgrade issue was addressed with additional code-signing
restricti ...)
+ TODO: check
+CVE-2024-40774 (A downgrade issue was addressed with additional code-signing
restricti ...)
+ TODO: check
+CVE-2024-40094 (GraphQL Java (aka graphql-java) before 21.5 does not properly
consider ...)
+ TODO: check
+CVE-2024-3986 (The SportsPress WordPress plugin before 2.7.22 does not
sanitise and ...)
+ TODO: check
+CVE-2024-3669 (The Web Directory Free WordPress plugin before 1.7.2 does not
sanitise ...)
+ TODO: check
+CVE-2024-3219 (There is a MEDIUM severity vulnerability affecting CPython.
The \u20 ...)
+ TODO: check
+CVE-2024-3113 (The FormFlow: WhatsApp Social and Advanced Form Builder with
Easy Lead ...)
+ TODO: check
+CVE-2024-27888 (A permissions issue was addressed by removing vulnerable code
and addi ...)
+ TODO: check
+CVE-2024-27887 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2024-27886 (A logic issue was addressed with improved restrictions. This
issue is ...)
+ TODO: check
+CVE-2024-27884 (This issue was addressed with a new entitlement. This issue is
fixed i ...)
+ TODO: check
+CVE-2024-27883 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2024-27882 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2024-27881 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2024-27878 (A buffer overflow issue was addressed with improved memory
handling. T ...)
+ TODO: check
+CVE-2024-27877 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27873 (An out-of-bounds write issue was addressed with improved input
validat ...)
+ TODO: check
+CVE-2024-27872 (This issue was addressed with improved validation of symlinks.
This is ...)
+ TODO: check
+CVE-2024-27871 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2024-27863 (An information disclosure issue was addressed with improved
private da ...)
+ TODO: check
+CVE-2024-27862 (A logic issue was addressed with improved state management.
This issue ...)
+ TODO: check
+CVE-2024-27853 (This issue was addressed with improved checks. This issue is
fixed in ...)
+ TODO: check
+CVE-2024-27826 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-27823 (A race condition was addressed with improved locking. This
issue is fi ...)
+ TODO: check
+CVE-2024-27809 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2024-23261 (A logic issue was addressed with improved state management.
This issue ...)
+ TODO: check
+CVE-2024-1287 (The pmpro-member-directory WordPress plugin before 1.2.6 does
not prev ...)
+ TODO: check
+CVE-2024-1286 (The pmpro-membership-maps WordPress plugin before 0.7 does not
prevent ...)
+ TODO: check
+CVE-2023-52888 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2023-42959 (A race condition was addressed with improved state handling.
This issu ...)
+ TODO: check
+CVE-2023-42958 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-42957 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-42949 (This issue was addressed with improved data protection. This
issue is ...)
+ TODO: check
+CVE-2023-42948 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2023-42943 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2023-42925 (The issue was addressed with improved restriction of data
container ac ...)
+ TODO: check
+CVE-2023-42918 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2023-40398 (This issue was addressed with improved checks. This issue is
fixed in ...)
+ TODO: check
+CVE-2023-40396 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
CVE-2024-7200 (A vulnerability, which was classified as problematic, has been
found i ...)
NOT-FOR-US: SourceCodester Complaints Report Management System
CVE-2024-7199 (A vulnerability classified as critical was found in
SourceCodester Com ...)
@@ -7434,9 +7818,9 @@ CVE-2024-38520 (SoftEtherVPN is a an open-source
cross-platform multi-protocol V
NOT-FOR-US: SoftEtherVPN
CVE-2024-38375 (@fastly/js-compute is a JavaScript SDK and runtime for
building Fastly ...)
NOT-FOR-US: @fastly/js-compute
-CVE-2024-38272 (There exists a vulnerability in Quickshare/Nearby where an
attacker ca ...)
+CVE-2024-38272 (There exists a vulnerability in Quick Share/Nearby, where an
attacker ...)
NOT-FOR-US: Google Quickshare/Nearby
-CVE-2024-38271 (There exists a vulnerability in Quickshare/Nearby where an
attacker ca ...)
+CVE-2024-38271 (There exists a vulnerability in Quick Share/Nearby, where an
attacker ...)
NOT-FOR-US: Google Quickshare/Nearby
CVE-2024-37252 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
NOT-FOR-US: WordPress plugin
@@ -350973,11 +351357,11 @@ CVE-2019-19763
CVE-2019-19762
REJECTED
CVE-2019-19761
- RESERVED
+ REJECTED
CVE-2019-19760
- RESERVED
+ REJECTED
CVE-2019-19759
- RESERVED
+ REJECTED
CVE-2019-19758 (A vulnerability in the web interface of Lenovo EZ Media &
Backup Cente ...)
NOT-FOR-US: Lenovo
CVE-2019-19757 (An internal product security audit of Lenovo XClarity
Administrator (L ...)
@@ -398373,7 +398757,7 @@ CVE-2019-6187 (A stored CSV Injection vulnerability
was reported in Lenovo XClar
CVE-2019-6186 (A potential vulnerability was reported in Lenovo System
Interface Foun ...)
NOT-FOR-US: Lenovo
CVE-2019-6185
- RESERVED
+ REJECTED
CVE-2019-6184 (A potential vulnerability in the discontinued Customer
Engagement Serv ...)
NOT-FOR-US: Lenovo
CVE-2019-6183 (A denial of service vulnerability has been reported in Lenovo
Energy M ...)
@@ -398395,7 +398779,7 @@ CVE-2019-6176 (A potential vulnerability reported in
ThinkPad USB-C Dock Firmwar
CVE-2019-6175 (A denial of service vulnerability was reported in Lenovo System
Update ...)
NOT-FOR-US: Lenovo
CVE-2019-6174
- RESERVED
+ REJECTED
CVE-2019-6173 (A DLL search path vulnerability could allow privilege
escalation in so ...)
NOT-FOR-US: Lenovo
CVE-2019-6172 (A potential vulnerability in the SMI callback function used in
Legacy ...)
@@ -398415,11 +398799,11 @@ CVE-2019-6166 (A vulnerability reported in Lenovo
Service Bridge before version
CVE-2019-6165 (A DLL search path vulnerability was reported in PaperDisplay
Hotkey Se ...)
NOT-FOR-US: Lenovo
CVE-2019-6164
- RESERVED
+ REJECTED
CVE-2019-6163 (A denial of service vulnerability was reported in Lenovo System
Update ...)
NOT-FOR-US: Lenovo System Update
CVE-2019-6162
- RESERVED
+ REJECTED
CVE-2019-6161 (An internal product security audit discovered a session
handling vulne ...)
NOT-FOR-US: Lenovo
CVE-2019-6160 (A vulnerability in various versions of Iomega and LenovoEMC NAS
produc ...)
@@ -511288,13 +511672,13 @@ CVE-2017-3771 (System boot process is not
adequately secured In Lenovo E95 and T
CVE-2017-3770 (Privilege escalation vulnerability in LXCA versions earlier
than 1.3.2 ...)
NOT-FOR-US: Lenovo LXCA
CVE-2017-3769
- RESERVED
+ REJECTED
CVE-2017-3768 (An unprivileged attacker with connectivity to the IMM2 could
cause a d ...)
NOT-FOR-US: IBM System x / IMM2
CVE-2017-3767 (A local privilege escalation vulnerability was identified in
the Realt ...)
NOT-FOR-US: Lenovo
CVE-2017-3766
- RESERVED
+ REJECTED
CVE-2017-3765 (In Enterprise Networking Operating System (ENOS) in Lenovo and
IBM Rac ...)
NOT-FOR-US: IBM RackSwitch and BladeCenter products
CVE-2017-3764 (A vulnerability was identified in Lenovo XClarity Administrator
(LXCA) ...)
@@ -511316,7 +511700,7 @@ CVE-2017-3757 (An unquoted service path vulnerability
was identified in the driv
CVE-2017-3756 (A privilege escalation vulnerability was identified in Lenovo
Active P ...)
NOT-FOR-US: Lenovo
CVE-2017-3755
- RESERVED
+ REJECTED
CVE-2017-3754 (Some Lenovo brand notebook systems do not have write
protections prope ...)
NOT-FOR-US: Lenovo
CVE-2017-3753 (A vulnerability has been identified in some Lenovo products
that use U ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits