[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jul 30 09:12:04 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d6beafc3 by security tracker role at 2024-07-30T08:11:47+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,387 @@
+CVE-2024-7252 (Comodo Internet Security Pro cmdagent Link Following Local Privilege E ...)
+	TODO: check
+CVE-2024-7251 (Comodo Internet Security Pro cmdagent Link Following Local Privilege E ...)
+	TODO: check
+CVE-2024-7250 (Comodo Internet Security Pro cmdagent Link Following Local Privilege E ...)
+	TODO: check
+CVE-2024-7249 (Comodo Firewall Link Following Local Privilege Escalation Vulnerabilit ...)
+	TODO: check
+CVE-2024-7248 (Comodo Internet Security Pro Directory Traversal Local Privilege Escal ...)
+	TODO: check
+CVE-2024-7224 (A vulnerability was found in SourceCodester Lot Reservation Management ...)
+	TODO: check
+CVE-2024-7223 (A vulnerability has been found in SourceCodester Lot Reservation Manag ...)
+	TODO: check
+CVE-2024-7222 (A vulnerability, which was classified as critical, was found in Source ...)
+	TODO: check
+CVE-2024-7221 (A vulnerability, which was classified as critical, has been found in S ...)
+	TODO: check
+CVE-2024-7220 (A vulnerability classified as critical was found in SourceCodester Sch ...)
+	TODO: check
+CVE-2024-7219 (A vulnerability classified as critical has been found in SourceCodeste ...)
+	TODO: check
+CVE-2024-7218 (A vulnerability was found in SourceCodester School Log Management Syst ...)
+	TODO: check
+CVE-2024-7217 (A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been  ...)
+	TODO: check
+CVE-2024-7216 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It has been ...)
+	TODO: check
+CVE-2024-7215 (A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832 and classifi ...)
+	TODO: check
+CVE-2024-7214 (A vulnerability has been found in TOTOLINK LR350 9.3.5u.6369_B20220309 ...)
+	TODO: check
+CVE-2024-7213 (A vulnerability, which was classified as critical, was found in TOTOLI ...)
+	TODO: check
+CVE-2024-7212 (A vulnerability, which was classified as critical, has been found in T ...)
+	TODO: check
+CVE-2024-7100 (The Bold Page Builder plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-6620 (Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to T10.20.0 ...)
+	TODO: check
+CVE-2024-6536 (The Zephyr Project Manager WordPress plugin before 3.3.99 does not san ...)
+	TODO: check
+CVE-2024-6230 (The \u067e\u0644\u0627\u06af\u06cc\u0646 \u067e\u0631\u062f\u0627\u062 ...)
+	TODO: check
+CVE-2024-6226 (The WpStickyBar  WordPress plugin through 2.1.0 does not sanitise and  ...)
+	TODO: check
+CVE-2024-6224 (The Send email only on Reply to My Comment WordPress plugin through 1. ...)
+	TODO: check
+CVE-2024-6223 (The Send email only on Reply to My Comment WordPress plugin through 1. ...)
+	TODO: check
+CVE-2024-6021 (The Donation Block For PayPal WordPress plugin through 2.1.0 does not  ...)
+	TODO: check
+CVE-2024-5975 (The CZ Loan Management WordPress plugin through 1.1 does not properly  ...)
+	TODO: check
+CVE-2024-5809 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does not sanit ...)
+	TODO: check
+CVE-2024-5808 (The WP Ajax Contact Form WordPress plugin through 2.2.2 does not have  ...)
+	TODO: check
+CVE-2024-5807 (The Business Card WordPress plugin through 1.0.0 does not prevent high ...)
+	TODO: check
+CVE-2024-5765 (The WpStickyBar  WordPress plugin through 2.1.0 does not properly sani ...)
+	TODO: check
+CVE-2024-4096 (The Responsive Tabs WordPress plugin through 4.0.8 does not sanitise a ...)
+	TODO: check
+CVE-2024-42231 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42230 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	TODO: check
+CVE-2024-42229 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-42228 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42227 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42226 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	TODO: check
+CVE-2024-42225 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2024-42224 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42223 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2024-42162 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	TODO: check
+CVE-2024-42161 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42160 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2024-42159 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42158 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42157 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42156 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42155 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42154 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	TODO: check
+CVE-2024-42153 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2024-42152 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42151 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42150 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42149 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2024-42148 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42147 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-42146 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42145 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
+	TODO: check
+CVE-2024-42144 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	TODO: check
+CVE-2024-42143 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	TODO: check
+CVE-2024-42142 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42141 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2024-42140 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2024-42139 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2024-42138 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2024-42137 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2024-42136 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-42135 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
+	TODO: check
+CVE-2024-42134 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
+	TODO: check
+CVE-2024-42133 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2024-42132 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42131 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2024-42130 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42129 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	TODO: check
+CVE-2024-42128 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	TODO: check
+CVE-2024-42127 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42126 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	TODO: check
+CVE-2024-42125 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2024-42124 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-42123 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42122 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42121 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42120 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42119 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42118 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42117 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42116 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2024-42115 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
+	TODO: check
+CVE-2024-42114 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2024-42113 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42112 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42111 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42110 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42109 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42108 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42107 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2024-42106 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2024-42105 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42104 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2024-42103 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2024-42102 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
+	TODO: check
+CVE-2024-42101 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2024-42100 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-42099 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-40836 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40835 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40834 (This issue was addressed by adding an additional prompt for user conse ...)
+	TODO: check
+CVE-2024-40833 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40832 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40829 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2024-40828 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40827 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40824 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2024-40823 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40822 (This issue was addressed by restricting options offered on a locked de ...)
+	TODO: check
+CVE-2024-40821 (An access issue was addressed with additional sandbox restrictions. Th ...)
+	TODO: check
+CVE-2024-40818 (This issue was addressed by restricting options offered on a locked de ...)
+	TODO: check
+CVE-2024-40817 (The issue was addressed with improved UI handling. This issue is fixed ...)
+	TODO: check
+CVE-2024-40816 (An out-of-bounds read was addressed with improved input validation. Th ...)
+	TODO: check
+CVE-2024-40815 (A race condition was addressed with additional validation. This issue  ...)
+	TODO: check
+CVE-2024-40814 (A downgrade issue was addressed with additional code-signing restricti ...)
+	TODO: check
+CVE-2024-40813 (A lock screen issue was addressed with improved state management. This ...)
+	TODO: check
+CVE-2024-40812 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40811 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40809 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40807 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2024-40806 (An out-of-bounds read issue was addressed with improved input validati ...)
+	TODO: check
+CVE-2024-40805 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2024-40804 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40803 (A type confusion issue was addressed with improved checks. This issue  ...)
+	TODO: check
+CVE-2024-40802 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40800 (An input validation issue was addressed with improved input validation ...)
+	TODO: check
+CVE-2024-40799 (An out-of-bounds read issue was addressed with improved input validati ...)
+	TODO: check
+CVE-2024-40798 (This issue was addressed with improved redaction of sensitive informat ...)
+	TODO: check
+CVE-2024-40796 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2024-40795 (This issue was addressed with improved data protection. This issue is  ...)
+	TODO: check
+CVE-2024-40794 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2024-40793 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2024-40789 (An out-of-bounds access issue was addressed with improved bounds check ...)
+	TODO: check
+CVE-2024-40788 (A type confusion issue was addressed with improved memory handling. Th ...)
+	TODO: check
+CVE-2024-40787 (This issue was addressed by adding an additional prompt for user conse ...)
+	TODO: check
+CVE-2024-40786 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2024-40785 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2024-40784 (An integer overflow was addressed with improved input validation. This ...)
+	TODO: check
+CVE-2024-40783 (The issue was addressed with improved restriction of data container ac ...)
+	TODO: check
+CVE-2024-40782 (A use-after-free issue was addressed with improved memory management.  ...)
+	TODO: check
+CVE-2024-40781 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-40780 (An out-of-bounds read was addressed with improved bounds checking. Thi ...)
+	TODO: check
+CVE-2024-40779 (An out-of-bounds read was addressed with improved bounds checking. Thi ...)
+	TODO: check
+CVE-2024-40778 (An authentication issue was addressed with improved state management.  ...)
+	TODO: check
+CVE-2024-40777 (An out-of-bounds access issue was addressed with improved bounds check ...)
+	TODO: check
+CVE-2024-40776 (A use-after-free issue was addressed with improved memory management.  ...)
+	TODO: check
+CVE-2024-40775 (A downgrade issue was addressed with additional code-signing restricti ...)
+	TODO: check
+CVE-2024-40774 (A downgrade issue was addressed with additional code-signing restricti ...)
+	TODO: check
+CVE-2024-40094 (GraphQL Java (aka graphql-java) before 21.5 does not properly consider ...)
+	TODO: check
+CVE-2024-3986 (The SportsPress  WordPress plugin before 2.7.22 does not sanitise and  ...)
+	TODO: check
+CVE-2024-3669 (The Web Directory Free WordPress plugin before 1.7.2 does not sanitise ...)
+	TODO: check
+CVE-2024-3219 (There is a MEDIUM severity vulnerability affecting CPython.  The  \u20 ...)
+	TODO: check
+CVE-2024-3113 (The FormFlow: WhatsApp Social and Advanced Form Builder with Easy Lead ...)
+	TODO: check
+CVE-2024-27888 (A permissions issue was addressed by removing vulnerable code and addi ...)
+	TODO: check
+CVE-2024-27887 (A path handling issue was addressed with improved validation. This iss ...)
+	TODO: check
+CVE-2024-27886 (A logic issue was addressed with improved restrictions. This issue is  ...)
+	TODO: check
+CVE-2024-27884 (This issue was addressed with a new entitlement. This issue is fixed i ...)
+	TODO: check
+CVE-2024-27883 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2024-27882 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2024-27881 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2024-27878 (A buffer overflow issue was addressed with improved memory handling. T ...)
+	TODO: check
+CVE-2024-27877 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2024-27873 (An out-of-bounds write issue was addressed with improved input validat ...)
+	TODO: check
+CVE-2024-27872 (This issue was addressed with improved validation of symlinks. This is ...)
+	TODO: check
+CVE-2024-27871 (A path handling issue was addressed with improved validation. This iss ...)
+	TODO: check
+CVE-2024-27863 (An information disclosure issue was addressed with improved private da ...)
+	TODO: check
+CVE-2024-27862 (A logic issue was addressed with improved state management. This issue ...)
+	TODO: check
+CVE-2024-27853 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2024-27826 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2024-27823 (A race condition was addressed with improved locking. This issue is fi ...)
+	TODO: check
+CVE-2024-27809 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2024-23261 (A logic issue was addressed with improved state management. This issue ...)
+	TODO: check
+CVE-2024-1287 (The pmpro-member-directory WordPress plugin before 1.2.6 does not prev ...)
+	TODO: check
+CVE-2024-1286 (The pmpro-membership-maps WordPress plugin before 0.7 does not prevent ...)
+	TODO: check
+CVE-2023-52888 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2023-42959 (A race condition was addressed with improved state handling. This issu ...)
+	TODO: check
+CVE-2023-42958 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2023-42957 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2023-42949 (This issue was addressed with improved data protection. This issue is  ...)
+	TODO: check
+CVE-2023-42948 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2023-42943 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2023-42925 (The issue was addressed with improved restriction of data container ac ...)
+	TODO: check
+CVE-2023-42918 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2023-40398 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2023-40396 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
 CVE-2024-7200 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: SourceCodester Complaints Report Management System
 CVE-2024-7199 (A vulnerability classified as critical was found in SourceCodester Com ...)
@@ -7434,9 +7818,9 @@ CVE-2024-38520 (SoftEtherVPN is a an open-source cross-platform multi-protocol V
 	NOT-FOR-US: SoftEtherVPN
 CVE-2024-38375 (@fastly/js-compute is a JavaScript SDK and runtime for building Fastly ...)
 	NOT-FOR-US: @fastly/js-compute
-CVE-2024-38272 (There exists a vulnerability in Quickshare/Nearby where an attacker ca ...)
+CVE-2024-38272 (There exists a vulnerability in Quick Share/Nearby, where an attacker  ...)
 	NOT-FOR-US: Google Quickshare/Nearby
-CVE-2024-38271 (There exists a vulnerability in Quickshare/Nearby where an attacker ca ...)
+CVE-2024-38271 (There exists a vulnerability in Quick Share/Nearby, where an attacker  ...)
 	NOT-FOR-US: Google Quickshare/Nearby
 CVE-2024-37252 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
 	NOT-FOR-US: WordPress plugin
@@ -350973,11 +351357,11 @@ CVE-2019-19763
 CVE-2019-19762
 	REJECTED
 CVE-2019-19761
-	RESERVED
+	REJECTED
 CVE-2019-19760
-	RESERVED
+	REJECTED
 CVE-2019-19759
-	RESERVED
+	REJECTED
 CVE-2019-19758 (A vulnerability in the web interface of Lenovo EZ Media & Backup Cente ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-19757 (An internal product security audit of Lenovo XClarity Administrator (L ...)
@@ -398373,7 +398757,7 @@ CVE-2019-6187 (A stored CSV Injection vulnerability was reported in Lenovo XClar
 CVE-2019-6186 (A potential vulnerability was reported in Lenovo System Interface Foun ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6185
-	RESERVED
+	REJECTED
 CVE-2019-6184 (A potential vulnerability in the discontinued Customer Engagement Serv ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6183 (A denial of service vulnerability has been reported in Lenovo Energy M ...)
@@ -398395,7 +398779,7 @@ CVE-2019-6176 (A potential vulnerability reported in ThinkPad USB-C Dock Firmwar
 CVE-2019-6175 (A denial of service vulnerability was reported in Lenovo System Update ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6174
-	RESERVED
+	REJECTED
 CVE-2019-6173 (A DLL search path vulnerability could allow privilege escalation in so ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6172 (A potential vulnerability in the SMI callback function used in Legacy  ...)
@@ -398415,11 +398799,11 @@ CVE-2019-6166 (A vulnerability reported in Lenovo Service Bridge before version
 CVE-2019-6165 (A DLL search path vulnerability was reported in PaperDisplay Hotkey Se ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6164
-	RESERVED
+	REJECTED
 CVE-2019-6163 (A denial of service vulnerability was reported in Lenovo System Update ...)
 	NOT-FOR-US: Lenovo System Update
 CVE-2019-6162
-	RESERVED
+	REJECTED
 CVE-2019-6161 (An internal product security audit discovered a session handling vulne ...)
 	NOT-FOR-US: Lenovo
 CVE-2019-6160 (A vulnerability in various versions of Iomega and LenovoEMC NAS produc ...)
@@ -511288,13 +511672,13 @@ CVE-2017-3771 (System boot process is not adequately secured In Lenovo E95 and T
 CVE-2017-3770 (Privilege escalation vulnerability in LXCA versions earlier than 1.3.2 ...)
 	NOT-FOR-US: Lenovo LXCA
 CVE-2017-3769
-	RESERVED
+	REJECTED
 CVE-2017-3768 (An unprivileged attacker with connectivity to the IMM2 could cause a d ...)
 	NOT-FOR-US: IBM System x / IMM2
 CVE-2017-3767 (A local privilege escalation vulnerability was identified in the Realt ...)
 	NOT-FOR-US: Lenovo
 CVE-2017-3766
-	RESERVED
+	REJECTED
 CVE-2017-3765 (In Enterprise Networking Operating System (ENOS) in Lenovo and IBM Rac ...)
 	NOT-FOR-US: IBM RackSwitch and BladeCenter products
 CVE-2017-3764 (A vulnerability was identified in Lenovo XClarity Administrator (LXCA) ...)
@@ -511316,7 +511700,7 @@ CVE-2017-3757 (An unquoted service path vulnerability was identified in the driv
 CVE-2017-3756 (A privilege escalation vulnerability was identified in Lenovo Active P ...)
 	NOT-FOR-US: Lenovo
 CVE-2017-3755
-	RESERVED
+	REJECTED
 CVE-2017-3754 (Some Lenovo brand notebook systems do not have write protections prope ...)
 	NOT-FOR-US: Lenovo
 CVE-2017-3753 (A vulnerability has been identified in some Lenovo products that use U ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6beafc38ab6ab25f255100430f0f6044977078f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240730/13ca52e8/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list