[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Feb 20 20:50:56 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
99121d70 by Salvatore Bonaccorso at 2024-02-20T21:50:08+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,13 +1,13 @@
CVE-2024-26270 (The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-26268 (User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.2 ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-26267 (In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versio ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-26265 (The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, an ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-26135 (MeshCentral is a full computer management web site. Versions prior to ...)
- TODO: check
+ NOT-FOR-US: MeshCentral
CVE-2024-26132 (Element Android is an Android Matrix Client. A third-party malicious a ...)
TODO: check
CVE-2024-26131 (Element Android is an Android Matrix Client. Element Android version 1 ...)
@@ -17,23 +17,23 @@ CVE-2024-25631 (Cilium is a networking, observability, and security solution wit
CVE-2024-25630 (Cilium is a networking, observability, and security solution with an e ...)
- cilium <itp> (bug #858303)
CVE-2024-25610 (In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versio ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25609 (HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25608 (HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25607 (The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay P ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25606 (XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older u ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25605 (The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25604 (Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-25366 (Buffer Overflow vulnerability in mz-automation.de libiec61859 v.1.4.0 ...)
TODO: check
CVE-2024-25274 (An arbitrary file upload vulnerability in the component /sysFile/uploa ...)
- TODO: check
+ NOT-FOR-US: Novel-Plus
CVE-2024-25262 (texlive-bin commit c515e was discovered to contain heap buffer overflo ...)
TODO: check
CVE-2024-25260 (elfutils v0.189 was discovered to contain a NULL pointer dereference v ...)
@@ -47,13 +47,13 @@ CVE-2024-25197 (Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble
CVE-2024-25196 (Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble versi ...)
TODO: check
CVE-2024-25150 (Information disclosure vulnerability in the Control Panel in Liferay P ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2024-24794 (A use-after-free vulnerability exists in the DICOM Element Parsing as ...)
TODO: check
CVE-2024-24793 (A use-after-free vulnerability exists in the DICOM Element Parsing as ...)
TODO: check
CVE-2024-24763 (JumpServer is an open source bastion host and an operation and mainten ...)
- TODO: check
+ NOT-FOR-US: JumpServer
CVE-2024-24475 (An issue in Qemu before v.8.2.0 allows a remote attacker to execute ar ...)
TODO: check
CVE-2024-24474 (Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a remote a ...)
@@ -69,11 +69,11 @@ CVE-2024-23310 (A use-after-free vulnerability exists in the sopen_FAMOS_read fu
CVE-2024-23305 (An out-of-bounds write vulnerability exists in the BrainVisionMarker P ...)
TODO: check
CVE-2024-22824 (An issue in Timo v.2.0.3 allows a remote attacker to execute arbitrary ...)
- TODO: check
+ NOT-FOR-US: Timo
CVE-2024-22250 (Session Hijack vulnerability in Deprecated VMware Enhanced Authenticat ...)
- TODO: check
+ NOT-FOR-US: VMware
CVE-2024-22245 (Arbitrary Authentication Relay and Session Hijack vulnerabilities in t ...)
- TODO: check
+ NOT-FOR-US: VMware
CVE-2024-22097 (A double-free vulnerability exists in the BrainVision Header Parsing f ...)
TODO: check
CVE-2024-22054 (A malformed discovery packet sent by a malicious actor with preexistin ...)
@@ -83,21 +83,21 @@ CVE-2024-21812 (An integer overflow vulnerability exists in the sopen_FAMOS_read
CVE-2024-21795 (A heap-based buffer overflow vulnerability exists in the .egi parsing ...)
TODO: check
CVE-2024-21726 (Inadequate content filtering leads to XSS vulnerabilities in various c ...)
- TODO: check
+ NOT-FOR-US: Joomla!
CVE-2024-21725 (Inadequate escaping of mail addresses lead to XSS vulnerabilities in v ...)
- TODO: check
+ NOT-FOR-US: Joomla!
CVE-2024-21724 (Inadequate input validation for media selection fields lead to XSS vul ...)
- TODO: check
+ NOT-FOR-US: Joomla!
CVE-2024-21723 (Inadequate parsing of URLs could result into an open redirect.)
- TODO: check
+ NOT-FOR-US: Joomla!
CVE-2024-21722 (The MFA management features did not properly terminate existing user s ...)
- TODO: check
+ NOT-FOR-US: Joomla!
CVE-2024-21682 (This High severity Injection vulnerability was introduced in Assets Di ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2024-21678 (This High severity Stored XSS vulnerability was introduced in version ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2024-1661 (A vulnerability classified as problematic was found in Totolink X6000R ...)
- TODO: check
+ NOT-FOR-US: Totolink
CVE-2024-1608 (In OPPO Usercenter Credit SDK, there's a possible escalation of privil ...)
TODO: check
CVE-2024-1586 (The Schema & Structured Data for WP & AMP plugin for WordPress is vuln ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/99121d704558a0d91586836fcc5c03d2c8cef49e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/99121d704558a0d91586836fcc5c03d2c8cef49e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240220/e8ff0484/attachment.htm>
More information about the debian-security-tracker-commits
mailing list