Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d6beafc3 by security tracker role at 2024-07-30T08:11:47+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,387 @@
+CVE-2024-7252 (Comodo Internet Security Pro cmdagent Link Following Local 
Privilege E ...)
+       TODO: check
+CVE-2024-7251 (Comodo Internet Security Pro cmdagent Link Following Local 
Privilege E ...)
+       TODO: check
+CVE-2024-7250 (Comodo Internet Security Pro cmdagent Link Following Local 
Privilege E ...)
+       TODO: check
+CVE-2024-7249 (Comodo Firewall Link Following Local Privilege Escalation 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-7248 (Comodo Internet Security Pro Directory Traversal Local 
Privilege Escal ...)
+       TODO: check
+CVE-2024-7224 (A vulnerability was found in SourceCodester Lot Reservation 
Management ...)
+       TODO: check
+CVE-2024-7223 (A vulnerability has been found in SourceCodester Lot 
Reservation Manag ...)
+       TODO: check
+CVE-2024-7222 (A vulnerability, which was classified as critical, was found in 
Source ...)
+       TODO: check
+CVE-2024-7221 (A vulnerability, which was classified as critical, has been 
found in S ...)
+       TODO: check
+CVE-2024-7220 (A vulnerability classified as critical was found in 
SourceCodester Sch ...)
+       TODO: check
+CVE-2024-7219 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
+       TODO: check
+CVE-2024-7218 (A vulnerability was found in SourceCodester School Log 
Management Syst ...)
+       TODO: check
+CVE-2024-7217 (A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It 
has been  ...)
+       TODO: check
+CVE-2024-7216 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It 
has been ...)
+       TODO: check
+CVE-2024-7215 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832 and 
classifi ...)
+       TODO: check
+CVE-2024-7214 (A vulnerability has been found in TOTOLINK LR350 
9.3.5u.6369_B20220309 ...)
+       TODO: check
+CVE-2024-7213 (A vulnerability, which was classified as critical, was found in 
TOTOLI ...)
+       TODO: check
+CVE-2024-7212 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2024-7100 (The Bold Page Builder plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-6620 (Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to 
T10.20.0 ...)
+       TODO: check
+CVE-2024-6536 (The Zephyr Project Manager WordPress plugin before 3.3.99 does 
not san ...)
+       TODO: check
+CVE-2024-6230 (The \u067e\u0644\u0627\u06af\u06cc\u0646 
\u067e\u0631\u062f\u0627\u062 ...)
+       TODO: check
+CVE-2024-6226 (The WpStickyBar  WordPress plugin through 2.1.0 does not 
sanitise and  ...)
+       TODO: check
+CVE-2024-6224 (The Send email only on Reply to My Comment WordPress plugin 
through 1. ...)
+       TODO: check
+CVE-2024-6223 (The Send email only on Reply to My Comment WordPress plugin 
through 1. ...)
+       TODO: check
+CVE-2024-6021 (The Donation Block For PayPal WordPress plugin through 2.1.0 
does not  ...)
+       TODO: check
+CVE-2024-5975 (The CZ Loan Management WordPress plugin through 1.1 does not 
properly  ...)
+       TODO: check
+CVE-2024-5809 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does 
not sanit ...)
+       TODO: check
+CVE-2024-5808 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does 
not have  ...)
+       TODO: check
+CVE-2024-5807 (The Business Card WordPress plugin through 1.0.0 does not 
prevent high ...)
+       TODO: check
+CVE-2024-5765 (The WpStickyBar  WordPress plugin through 2.1.0 does not 
properly sani ...)
+       TODO: check
+CVE-2024-4096 (The Responsive Tabs WordPress plugin through 4.0.8 does not 
sanitise a ...)
+       TODO: check
+CVE-2024-42231 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42230 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-42229 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-42228 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42227 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42226 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-42225 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-42224 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42223 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-42162 (In the Linux kernel, the following vulnerability has been 
resolved:  g ...)
+       TODO: check
+CVE-2024-42161 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42160 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-42159 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42158 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42157 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42156 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42155 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42154 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
+       TODO: check
+CVE-2024-42153 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-42152 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42151 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42150 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42149 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-42148 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42147 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-42146 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42145 (In the Linux kernel, the following vulnerability has been 
resolved:  I ...)
+       TODO: check
+CVE-2024-42144 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
+       TODO: check
+CVE-2024-42143 (In the Linux kernel, the following vulnerability has been 
resolved:  o ...)
+       TODO: check
+CVE-2024-42142 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42141 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-42140 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
+       TODO: check
+CVE-2024-42139 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-42138 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-42137 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-42136 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-42135 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
+       TODO: check
+CVE-2024-42134 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
+       TODO: check
+CVE-2024-42133 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-42132 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42131 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-42130 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42129 (In the Linux kernel, the following vulnerability has been 
resolved:  l ...)
+       TODO: check
+CVE-2024-42128 (In the Linux kernel, the following vulnerability has been 
resolved:  l ...)
+       TODO: check
+CVE-2024-42127 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42126 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-42125 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-42124 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-42123 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42122 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42121 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42120 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42119 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42118 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42117 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42116 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-42115 (In the Linux kernel, the following vulnerability has been 
resolved:  j ...)
+       TODO: check
+CVE-2024-42114 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-42113 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42112 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42111 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42110 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42109 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42108 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42107 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-42106 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-42105 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42104 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-42103 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-42102 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2024-42101 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-42100 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-42099 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-40836 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40835 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40834 (This issue was addressed by adding an additional prompt for 
user conse ...)
+       TODO: check
+CVE-2024-40833 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40832 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40829 (The issue was addressed with improved checks. This issue is 
fixed in w ...)
+       TODO: check
+CVE-2024-40828 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40827 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40824 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-40823 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40822 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2024-40821 (An access issue was addressed with additional sandbox 
restrictions. Th ...)
+       TODO: check
+CVE-2024-40818 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2024-40817 (The issue was addressed with improved UI handling. This issue 
is fixed ...)
+       TODO: check
+CVE-2024-40816 (An out-of-bounds read was addressed with improved input 
validation. Th ...)
+       TODO: check
+CVE-2024-40815 (A race condition was addressed with additional validation. 
This issue  ...)
+       TODO: check
+CVE-2024-40814 (A downgrade issue was addressed with additional code-signing 
restricti ...)
+       TODO: check
+CVE-2024-40813 (A lock screen issue was addressed with improved state 
management. This ...)
+       TODO: check
+CVE-2024-40812 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40811 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40809 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40807 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-40806 (An out-of-bounds read issue was addressed with improved input 
validati ...)
+       TODO: check
+CVE-2024-40805 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-40804 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40803 (A type confusion issue was addressed with improved checks. 
This issue  ...)
+       TODO: check
+CVE-2024-40802 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40800 (An input validation issue was addressed with improved input 
validation ...)
+       TODO: check
+CVE-2024-40799 (An out-of-bounds read issue was addressed with improved input 
validati ...)
+       TODO: check
+CVE-2024-40798 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-40796 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-40795 (This issue was addressed with improved data protection. This 
issue is  ...)
+       TODO: check
+CVE-2024-40794 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-40793 (This issue was addressed by removing the vulnerable code. This 
issue i ...)
+       TODO: check
+CVE-2024-40789 (An out-of-bounds access issue was addressed with improved 
bounds check ...)
+       TODO: check
+CVE-2024-40788 (A type confusion issue was addressed with improved memory 
handling. Th ...)
+       TODO: check
+CVE-2024-40787 (This issue was addressed by adding an additional prompt for 
user conse ...)
+       TODO: check
+CVE-2024-40786 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-40785 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2024-40784 (An integer overflow was addressed with improved input 
validation. This ...)
+       TODO: check
+CVE-2024-40783 (The issue was addressed with improved restriction of data 
container ac ...)
+       TODO: check
+CVE-2024-40782 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2024-40781 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40780 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
+       TODO: check
+CVE-2024-40779 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
+       TODO: check
+CVE-2024-40778 (An authentication issue was addressed with improved state 
management.  ...)
+       TODO: check
+CVE-2024-40777 (An out-of-bounds access issue was addressed with improved 
bounds check ...)
+       TODO: check
+CVE-2024-40776 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2024-40775 (A downgrade issue was addressed with additional code-signing 
restricti ...)
+       TODO: check
+CVE-2024-40774 (A downgrade issue was addressed with additional code-signing 
restricti ...)
+       TODO: check
+CVE-2024-40094 (GraphQL Java (aka graphql-java) before 21.5 does not properly 
consider ...)
+       TODO: check
+CVE-2024-3986 (The SportsPress  WordPress plugin before 2.7.22 does not 
sanitise and  ...)
+       TODO: check
+CVE-2024-3669 (The Web Directory Free WordPress plugin before 1.7.2 does not 
sanitise ...)
+       TODO: check
+CVE-2024-3219 (There is a MEDIUM severity vulnerability affecting CPython.  
The  \u20 ...)
+       TODO: check
+CVE-2024-3113 (The FormFlow: WhatsApp Social and Advanced Form Builder with 
Easy Lead ...)
+       TODO: check
+CVE-2024-27888 (A permissions issue was addressed by removing vulnerable code 
and addi ...)
+       TODO: check
+CVE-2024-27887 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2024-27886 (A logic issue was addressed with improved restrictions. This 
issue is  ...)
+       TODO: check
+CVE-2024-27884 (This issue was addressed with a new entitlement. This issue is 
fixed i ...)
+       TODO: check
+CVE-2024-27883 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-27882 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-27881 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-27878 (A buffer overflow issue was addressed with improved memory 
handling. T ...)
+       TODO: check
+CVE-2024-27877 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2024-27873 (An out-of-bounds write issue was addressed with improved input 
validat ...)
+       TODO: check
+CVE-2024-27872 (This issue was addressed with improved validation of symlinks. 
This is ...)
+       TODO: check
+CVE-2024-27871 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2024-27863 (An information disclosure issue was addressed with improved 
private da ...)
+       TODO: check
+CVE-2024-27862 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-27853 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2024-27826 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2024-27823 (A race condition was addressed with improved locking. This 
issue is fi ...)
+       TODO: check
+CVE-2024-27809 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-23261 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-1287 (The pmpro-member-directory WordPress plugin before 1.2.6 does 
not prev ...)
+       TODO: check
+CVE-2024-1286 (The pmpro-membership-maps WordPress plugin before 0.7 does not 
prevent ...)
+       TODO: check
+CVE-2023-52888 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2023-42959 (A race condition was addressed with improved state handling. 
This issu ...)
+       TODO: check
+CVE-2023-42958 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-42957 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-42949 (This issue was addressed with improved data protection. This 
issue is  ...)
+       TODO: check
+CVE-2023-42948 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2023-42943 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-42925 (The issue was addressed with improved restriction of data 
container ac ...)
+       TODO: check
+CVE-2023-42918 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-40398 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2023-40396 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
 CVE-2024-7200 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: SourceCodester Complaints Report Management System
 CVE-2024-7199 (A vulnerability classified as critical was found in 
SourceCodester Com ...)
@@ -7434,9 +7818,9 @@ CVE-2024-38520 (SoftEtherVPN is a an open-source 
cross-platform multi-protocol V
        NOT-FOR-US: SoftEtherVPN
 CVE-2024-38375 (@fastly/js-compute is a JavaScript SDK and runtime for 
building Fastly ...)
        NOT-FOR-US: @fastly/js-compute
-CVE-2024-38272 (There exists a vulnerability in Quickshare/Nearby where an 
attacker ca ...)
+CVE-2024-38272 (There exists a vulnerability in Quick Share/Nearby, where an 
attacker  ...)
        NOT-FOR-US: Google Quickshare/Nearby
-CVE-2024-38271 (There exists a vulnerability in Quickshare/Nearby where an 
attacker ca ...)
+CVE-2024-38271 (There exists a vulnerability in Quick Share/Nearby, where an 
attacker  ...)
        NOT-FOR-US: Google Quickshare/Nearby
 CVE-2024-37252 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
        NOT-FOR-US: WordPress plugin
@@ -350973,11 +351357,11 @@ CVE-2019-19763
 CVE-2019-19762
        REJECTED
 CVE-2019-19761
-       RESERVED
+       REJECTED
 CVE-2019-19760
-       RESERVED
+       REJECTED
 CVE-2019-19759
-       RESERVED
+       REJECTED
 CVE-2019-19758 (A vulnerability in the web interface of Lenovo EZ Media & 
Backup Cente ...)
        NOT-FOR-US: Lenovo
 CVE-2019-19757 (An internal product security audit of Lenovo XClarity 
Administrator (L ...)
@@ -398373,7 +398757,7 @@ CVE-2019-6187 (A stored CSV Injection vulnerability 
was reported in Lenovo XClar
 CVE-2019-6186 (A potential vulnerability was reported in Lenovo System 
Interface Foun ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6185
-       RESERVED
+       REJECTED
 CVE-2019-6184 (A potential vulnerability in the discontinued Customer 
Engagement Serv ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6183 (A denial of service vulnerability has been reported in Lenovo 
Energy M ...)
@@ -398395,7 +398779,7 @@ CVE-2019-6176 (A potential vulnerability reported in 
ThinkPad USB-C Dock Firmwar
 CVE-2019-6175 (A denial of service vulnerability was reported in Lenovo System 
Update ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6174
-       RESERVED
+       REJECTED
 CVE-2019-6173 (A DLL search path vulnerability could allow privilege 
escalation in so ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6172 (A potential vulnerability in the SMI callback function used in 
Legacy  ...)
@@ -398415,11 +398799,11 @@ CVE-2019-6166 (A vulnerability reported in Lenovo 
Service Bridge before version
 CVE-2019-6165 (A DLL search path vulnerability was reported in PaperDisplay 
Hotkey Se ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6164
-       RESERVED
+       REJECTED
 CVE-2019-6163 (A denial of service vulnerability was reported in Lenovo System 
Update ...)
        NOT-FOR-US: Lenovo System Update
 CVE-2019-6162
-       RESERVED
+       REJECTED
 CVE-2019-6161 (An internal product security audit discovered a session 
handling vulne ...)
        NOT-FOR-US: Lenovo
 CVE-2019-6160 (A vulnerability in various versions of Iomega and LenovoEMC NAS 
produc ...)
@@ -511288,13 +511672,13 @@ CVE-2017-3771 (System boot process is not 
adequately secured In Lenovo E95 and T
 CVE-2017-3770 (Privilege escalation vulnerability in LXCA versions earlier 
than 1.3.2 ...)
        NOT-FOR-US: Lenovo LXCA
 CVE-2017-3769
-       RESERVED
+       REJECTED
 CVE-2017-3768 (An unprivileged attacker with connectivity to the IMM2 could 
cause a d ...)
        NOT-FOR-US: IBM System x / IMM2
 CVE-2017-3767 (A local privilege escalation vulnerability was identified in 
the Realt ...)
        NOT-FOR-US: Lenovo
 CVE-2017-3766
-       RESERVED
+       REJECTED
 CVE-2017-3765 (In Enterprise Networking Operating System (ENOS) in Lenovo and 
IBM Rac ...)
        NOT-FOR-US: IBM RackSwitch and BladeCenter products
 CVE-2017-3764 (A vulnerability was identified in Lenovo XClarity Administrator 
(LXCA) ...)
@@ -511316,7 +511700,7 @@ CVE-2017-3757 (An unquoted service path vulnerability 
was identified in the driv
 CVE-2017-3756 (A privilege escalation vulnerability was identified in Lenovo 
Active P ...)
        NOT-FOR-US: Lenovo
 CVE-2017-3755
-       RESERVED
+       REJECTED
 CVE-2017-3754 (Some Lenovo brand notebook systems do not have write 
protections prope ...)
        NOT-FOR-US: Lenovo
 CVE-2017-3753 (A vulnerability has been identified in some Lenovo products 
that use U ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to