[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Apr 5 13:39:31 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8c2f14b1 by Moritz Muehlenhoff at 2024-04-05T14:39:03+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -110,57 +110,57 @@ CVE-2024-2660 (Vault and Vault Enterprise TLS certificates auth method did not c
CVE-2024-2103 (Inclusion of undocumented features vulnerability accessible when logge ...)
NOT-FOR-US: Schweitzer Engineering Laboratories
CVE-2024-29387 (projeqtor up to 11.2.0 was discovered to contain a remote code executi ...)
- TODO: check
+ NOT-FOR-US: projeqtor
CVE-2024-29386 (projeqtor up to 11.2.0 was discovered to contain a SQL injection vulne ...)
- TODO: check
+ NOT-FOR-US: projeqtor
CVE-2024-29193 (gotortc is a camera streaming application. Versions 1.8.5 and prior ar ...)
- TODO: check
+ NOT-FOR-US: gotortc
CVE-2024-29192 (gotortc is a camera streaming application. Versions 1.8.5 and prior ar ...)
- TODO: check
+ NOT-FOR-US: gotortc
CVE-2024-29191 (gotortc is a camera streaming application. Versions 1.8.5 and prior ar ...)
- TODO: check
+ NOT-FOR-US: gotortc
CVE-2024-29182 (Collabora Online is a collaborative online office suite based on Libre ...)
- TODO: check
+ NOT-FOR-US: Collabora Online
CVE-2024-28871 (LibHTP is a security-aware parser for the HTTP protocol and the relate ...)
TODO: check
CVE-2024-28787 (IBM Security Verify Access 10.0.0 through 10.0.7 and IBM Application G ...)
NOT-FOR-US: IBM
CVE-2024-27575 (Directory Traversal vulnerability in INOTEC Sicherheitstechnik GmbH IN ...)
- TODO: check
+ NOT-FOR-US: INOTEC
CVE-2024-27268 (IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.3 is ...)
NOT-FOR-US: IBM
CVE-2024-25709 (There is a stored Cross-site Scripting vulnerability in Esri Portal fo ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25708 (There is a stored Cross-site Scripting vulnerability in Esri Portal fo ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25706 (There is an HTML injection vulnerability in Esri Portal for ArcGIS <=1 ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25705 (There is a cross site scripting vulnerability in the Esri Portal for A ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25704 (There is a stored Cross-site Scripting vulnerability in Esri Portal fo ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25703 (There is a reflected cross site scripting vulnerability in the home ap ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25700 (There is a stored Cross-site Scripting vulnerability in Esri Portal fo ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25699 (There is a difficult to exploit improper authentication issue in the H ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25698 (There is a reflected cross site scripting vulnerability in the home ap ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25697 (There is a Cross-site Scripting vulnerabilityin Portal for ArcGIS in v ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25696 (There is a Cross-site Scripting vulnerability in Portal for ArcGIS in ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25695 (There is a Cross-site Scripting vulnerability in Portal for ArcGIS in ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25693 (There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25692 (There is a cross-site-request forgery vulnerability in Esri Portal for ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25690 (There is an HTML injection vulnerability in Esri Portal for ArcGIS ver ...)
- TODO: check
+ NOT-FOR-US: Esri Portal
CVE-2024-25007 (Ericsson Network Manager (ENM), versions prior to 23.1, contains a vul ...)
- TODO: check
+ NOT-FOR-US: Ericsson Network Manager
CVE-2024-22189 (quic-go is an implementation of the QUIC protocol in Go. Prior to vers ...)
- golang-github-lucas-clemente-quic-go 0.38.2-1
[bookworm] - golang-github-lucas-clemente-quic-go <no-dsa> (Minor issue)
@@ -169,21 +169,21 @@ CVE-2024-22189 (quic-go is an implementation of the QUIC protocol in Go. Prior t
NOTE: https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a (v0.42.0)
NOTE: https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management
CVE-2024-22053 (A heap overflow vulnerability in IPSec component of Ivanti Connect Sec ...)
- TODO: check
+ NOT-FOR-US: Ivanti
CVE-2024-22052 (A null pointer dereference vulnerability in IPSec component of Ivanti ...)
- TODO: check
+ NOT-FOR-US: Ivanti
CVE-2024-22023 (An XML entity expansion or XEE vulnerability in SAML component of Ivan ...)
- TODO: check
+ NOT-FOR-US: Ivanti
CVE-2024-20800 (Adobe Experience Manager versions 6.5.19 and earlier are affected by a ...)
- TODO: check
+ NOT-FOR-US: Adobe
CVE-2023-3454 (Remote code execution (RCE) vulnerability in Brocade Fabric OS after v ...)
- TODO: check
+ NOT-FOR-US: Brocade
CVE-2023-36645 (SQL injection vulnerability in ITB-GmbH TradePro v9.5, allows remote a ...)
- TODO: check
+ NOT-FOR-US: ITB-GmbH TradePro
CVE-2023-36644 (Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote atta ...)
- TODO: check
+ NOT-FOR-US: ITB-GmbH TradePro
CVE-2023-36643 (Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote atta ...)
- TODO: check
+ NOT-FOR-US: ITB-GmbH TradePro
CVE-2024-26809 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux <unfixed>
[buster] - linux <not-affected> (Vulnerable code not present)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c2f14b154cff30d9e34624a436c22aa27b03991
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c2f14b154cff30d9e34624a436c22aa27b03991
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240405/e9cc1641/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list