[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Jan 12 09:09:49 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
51f368c9 by Moritz Muehlenhoff at 2024-01-12T09:47:35+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -17,49 +17,49 @@ CVE-2024-22027 (Improper input validation vulnerability in WordPress Quiz Maker
 CVE-2024-21982 (ONTAP versions 9.4 and higher are susceptible to a vulnerability  whic ...)
 	TODO: check
 CVE-2024-21617 (An Incomplete Cleanup vulnerability in Nonstop active routing (NSR) co ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21616 (An Improper Validation of Syntactic Correctness of Input vulnerability ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21614 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21613 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21612 (An Improper Handling of Syntactically Invalid Structure vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21611 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21607 (An Unsupported Feature in the UI vulnerability in Juniper Networks Jun ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21606 (A Double Free vulnerability in the flow processing daemon (flowd) of J ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21604 (An Allocation of Resources Without Limits or Throttling vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21603 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21602 (A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21601 (A Concurrent Execution using Shared Resource with Improper Synchroniza ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21600 (An Improper Neutralization of Equivalent Special Elements vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21599 (A Missing Release of Memory after Effective Lifetime vulnerability in  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21597 (An Exposure of Resource to Wrong Sphere vulnerability in the Packet Fo ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21596 (A Heap-based Buffer Overflow vulnerability in the Routing Protocol Dae ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21595 (An Improper Validation of Syntactic Correctness of Input vulnerability ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21594 (A Heap-based Buffer Overflow vulnerability in the Network Services Dae ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21591 (An Out-of-bounds Write vulnerability in J-Web of Juniper Networks Juno ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21589 (An Improper Access Control vulnerability in the Juniper Networks Parag ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21587 (An Improper Handling of Exceptional Conditions vulnerability in the br ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21585 (An Improper Handling of Exceptional Conditions vulnerability in BGP se ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2024-21337 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability)
 	TODO: check
 CVE-2024-20675 (Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability)
@@ -109,7 +109,7 @@ CVE-2023-40250 (Buffer Copy without Checking Size of Input ('Classic Buffer Over
 CVE-2023-37117 (A heap-use-after-free vulnerability was found in live555 version 2023. ...)
 	TODO: check
 CVE-2023-36842 (An Improper Check for Unusual or Exceptional Conditions vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Juniper
 CVE-2023-34061 (Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are v ...)
 	TODO: check
 CVE-2022-4961 (A vulnerability was found in Weitong Mall 1.0.0. It has been declared  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51f368c9565691af5e383bafa00abd23bd878bf7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51f368c9565691af5e383bafa00abd23bd878bf7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240112/3df08d82/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list