Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
1715bbcf by Moritz Muehlenhoff at 2024-11-14T10:08:28+01:00
NFUS
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,61 +1,61 @@
CVE-2024-9186 (The Recover WooCommerce Cart Abandonment, Newsletter, Email
Marketing, ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-5083 (A storedCross-site Scripting vulnerability has been discovered
in Sona ...)
- TODO: check
+ NOT-FOR-US: Sonatype
CVE-2024-5082 (A Remote Code Execution vulnerability has been discovered in
Sonatype ...)
- TODO: check
+ NOT-FOR-US: Sonatype
CVE-2024-51027 (Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to
command e ...)
- TODO: check
+ NOT-FOR-US: Ruijie NBR800G
CVE-2024-50956 (A buffer overflow in the RecvSocketData function of Inovance
HCPLC_AM4 ...)
- TODO: check
+ NOT-FOR-US: Inovance
CVE-2024-50955 (An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles
TCP protoc ...)
- TODO: check
+ NOT-FOR-US: XINJE
CVE-2024-45879 (The file upload function in the "QWKalkulation" tool of
baltic-it TOPq ...)
- TODO: check
+ NOT-FOR-US: baltic-it TOPqw Webportal
CVE-2024-45878 (The "Stammdaten" menu of baltic-it TOPqw Webportal v1.35.283.2
(fixed ...)
- TODO: check
+ NOT-FOR-US: baltic-it TOPqw Webportal
CVE-2024-45877 (baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to
Incorrect Acces ...)
- TODO: check
+ NOT-FOR-US: baltic-it TOPqw Webportal
CVE-2024-45876 (The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed
in vers ...)
- TODO: check
+ NOT-FOR-US: baltic-it TOPqw Webportal
CVE-2024-45875 (The create user function in baltic-it TOPqw Webportal
1.35.287.1 (fixe ...)
- TODO: check
+ NOT-FOR-US: baltic-it TOPqw Webportal
CVE-2024-41167 (Improper input validation in UEFI firmware in some Intel(R)
Server Boa ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-40885 (Use after free in the UEFI firmware of some Intel(R) Server
M20NTP BIO ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-40410 (Cybele Software Thinfinity Workspace before v7.0.2.113 was
discovered ...)
- TODO: check
+ NOT-FOR-US: Cybele Software Thinfinity Workspace
CVE-2024-40408 (Cybele Software Thinfinity Workspace before v7.0.2.113 was
discovered ...)
- TODO: check
+ NOT-FOR-US: Cybele Software Thinfinity Workspace
CVE-2024-40407 (A full path disclosure in Cybele Software Thinfinity Workspace
before ...)
- TODO: check
+ NOT-FOR-US: Cybele Software Thinfinity Workspace
CVE-2024-40405 (Incorrect access control in Cybele Software Thinfinity
Workspace befor ...)
- TODO: check
+ NOT-FOR-US: Cybele Software Thinfinity Workspace
CVE-2024-40404 (Cybele Software Thinfinity Workspace before v7.0.2.113 was
discovered ...)
- TODO: check
+ NOT-FOR-US: Cybele Software Thinfinity Workspace
CVE-2024-39811 (Improper input validation in firmware for some Intel(R) Server
M20NTP ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-39766 (Improper neutralization of special elements used in SQL
command in som ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-39609 (Improper Access Control in UEFI firmware for some Intel(R)
Server Boar ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-39368 (Improper neutralization of special elements used in an SQL
command ('S ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-39285 (Improper access control in UEFI firmware in some Intel(R)
Server M20NT ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-38668 (Uncontrolled search path for some Intel(R) Quartus(R) Prime
Standard E ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-38665 (Out-of-bounds write in some Intel(R) Graphics Drivers may
allow an aut ...)
TODO: check
CVE-2024-38660 (Protection mechanism failure in the SPP for some Intel(R)
Xeon(R) proc ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-38387 (Uncontrolled search path in the Intel(R) Graphics Driver
installers fo ...)
TODO: check
CVE-2024-38383 (Uncontrolled search path for some Intel(R) Quartus(R) Prime
Pro Editio ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-37027 (Improper Input validation in some Intel(R) VTune(TM) Profiler
software ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-37025 (Incorrect execution-assigned permissions in some Intel(R)
Advanced Lin ...)
TODO: check
CVE-2024-37024 (Uncontrolled search path for some ACAT software maintained by
Intel(R) ...)
@@ -83,23 +83,23 @@ CVE-2024-36242 (Protection mechanism failure in the SPP for
some Intel(R) Proces
CVE-2024-35245 (Uncontrolled search path element in some Intel(R)
PROSet/Wireless WiFi ...)
TODO: check
CVE-2024-35201 (Incorrect default permissions in the Intel(R) SDP Tool for
Windows sof ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-34776 (Out-of-bounds write in some Intel(R) SGX SDK software may
allow an aut ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-34170 (Improper buffer restrictions in some Intel(R) Graphics Drivers
may all ...)
TODO: check
CVE-2024-34167 (Uncontrolled search path for the Intel(R) Server Board S2600ST
Family ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-34165 (Uncontrolled search path in some Intel(R) oneAPI DPC++/C++
Compiler be ...)
TODO: check
CVE-2024-34164 (Uncontrolled search path element in some Intel(R) MAS software
before ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-34028 (Uncontrolled search path in some Intel(R) Graphics Offline
Compiler fo ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-34023 (Untrusted pointer dereference in some Intel(R) Graphics
Drivers may al ...)
TODO: check
CVE-2024-34022 (Improper Access Control in some Thunderbolt(TM) Share software
before ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2024-33624 (Improper input validation for some Intel(R) PROSet/Wireless
WiFi softw ...)
TODO: check
CVE-2024-33617 (Insufficient control flow management in some Intel(R) QAT
Engine for O ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits