[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Mar 12 20:26:01 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
11d3ebd8 by Salvatore Bonaccorso at 2024-03-12T21:25:33+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,11 +1,11 @@
 CVE-2024-2394 (A vulnerability was found in SourceCodester Employee Management System ...)
-	TODO: check
+	NOT-FOR-US: SourceCodester Employee Management System
 CVE-2024-2393 (A vulnerability was found in SourceCodester CRUD without Page Reload 1 ...)
-	TODO: check
+	NOT-FOR-US: SourceCodester CRUD without Page Reload
 CVE-2024-2391 (A vulnerability was found in EVE-NG 5.0.1-13 and classified as problem ...)
-	TODO: check
+	NOT-FOR-US: EVE-NG
 CVE-2024-2371 (Information exposure vulnerability in Korenix JetI/O 6550 affecting fi ...)
-	TODO: check
+	NOT-FOR-US: Korenix JetI/O 6550
 CVE-2024-2130 (The CWW Companion plugin for WordPress is vulnerable to Stored Cross-S ...)
 	TODO: check
 CVE-2024-2049 (Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Premium E ...)
@@ -13,197 +13,197 @@ CVE-2024-2049 (Server-Side Request Forgery (SSRF) in Citrix SD-WAN Standard/Prem
 CVE-2024-2031 (The Video Conferencing with Zoom plugin for WordPress is vulnerable to ...)
 	TODO: check
 CVE-2024-28553 (Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the entr ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-28535 (Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the mitI ...)
-	TODO: check
+	NOT-FOR-US: Tenda
 CVE-2024-28340 (An information leak in the currentsetting.htm component of Netgear CBR ...)
-	TODO: check
+	NOT-FOR-US: Netgear
 CVE-2024-28339 (An information leak in the debuginfo.htm component of Netgear CBR40 2. ...)
-	TODO: check
+	NOT-FOR-US: Netgear
 CVE-2024-28338 (A login bypass in TOTOLINK A8000RU V7.1cu.643_B20200521 allows attacke ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2024-28186 (FreeScout is an open source help desk and shared inbox built with PHP. ...)
-	TODO: check
+	NOT-FOR-US: FreeScout
 CVE-2024-28121 (stimulus_reflex is a system to extend the capabilities of both Rails a ...)
 	TODO: check
 CVE-2024-28114 (Peering Manager is a BGP session management tool. There is a Server Si ...)
-	TODO: check
+	NOT-FOR-US: Peering Manager
 CVE-2024-28113 (Peering Manager is a BGP session management tool. In Peering Manager < ...)
-	TODO: check
+	NOT-FOR-US: Peering Manager
 CVE-2024-28112 (Peering Manager is a BGP session management tool. Affected versions of ...)
-	TODO: check
+	NOT-FOR-US: Peering Manager
 CVE-2024-28098 (The vulnerability allows authenticated users with only produce or cons ...)
-	TODO: check
+	NOT-FOR-US: Apache Pulsar
 CVE-2024-27907 (A vulnerability has been identified in Simcenter Femap (All versions < ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-27894 (The Pulsar Functions Worker includes a capability that permits authent ...)
-	TODO: check
+	NOT-FOR-US: Apache Pulsar
 CVE-2024-27758 (In RPyC before 6.0.0, when a server exposes a method that calls the at ...)
 	TODO: check
 CVE-2024-27317 (In Pulsar Functions Worker, authenticated users can upload functions i ...)
-	TODO: check
+	NOT-FOR-US: Apache Pulsar
 CVE-2024-27279 (Directory traversal vulnerability exists in a-blog cms Ver.3.1.x serie ...)
-	TODO: check
+	NOT-FOR-US: a-blog cms
 CVE-2024-27135 (Improper input validation in the Pulsar Function Worker allows a malic ...)
-	TODO: check
+	NOT-FOR-US: Apache Pulsar
 CVE-2024-26288 (An unauthenticated remote attacker can influence the communication due ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26204 (Outlook for Android Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26203 (Azure Data Studio Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26201 (Microsoft Intune Linux Agent Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26199 (Microsoft Office Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26198 (Microsoft Exchange Server Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26197 (Windows Standards-Based Storage Management Service Denial of Service V ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26190 (Microsoft QUIC Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26185 (Windows Compressed Folder Tampering Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26182 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26181 (Windows Kernel Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26178 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26177 (Windows Kernel Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26176 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26174 (Windows Kernel Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26173 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26170 (Windows Composite Image File System (CimFS) Elevation of Privilege Vul ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26169 (Windows Error Reporting Service Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26166 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26165 (Visual Studio Code Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26164 (Microsoft Django Backend for SQL Server Remote Code Execution Vulnerab ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26162 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26161 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26160 (Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerab ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26159 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-26005 (An unauthenticated remote attackercan gain service level privileges th ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26004 (An unauthenticated remote attacker can DoS a control agent due to acce ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26003 (An unauthenticated remote attacker can DoS the control agent due to a  ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26002 (An improper input validation in the Qualcom plctool allows a local att ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26001 (An unauthenticated remote attacker can writememory out of bounds due t ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-26000 (An unauthenticated remote attacker can read memory out of bounds due t ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25999 (An unauthenticated local attacker can perform a privilege escalation d ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25998 (An unauthenticated remote attacker can perform a command injectionin t ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25997 (An unauthenticated remote attacker can perform a log injection due to  ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25996 (An unauthenticated remote attacker can perform a remote code execution ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25995 (An unauthenticated remote attacker can modify configurations to perfor ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-25994 (An unauthenticated remote attacker can upload a arbitrary script file  ...)
-	TODO: check
+	NOT-FOR-US: VDE
 CVE-2024-23112 (An authorization bypass through user-controlled key vulnerability [CWE ...)
-	TODO: check
+	NOT-FOR-US: FortiGuard
 CVE-2024-22045 (A vulnerability has been identified in SINEMA Remote Connect Client (A ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-22044 (A vulnerability has been identified in SENTRON 3KC ATC6 Expansion Modu ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-22041 (A vulnerability has been identified in Cerberus PRO EN Engineering Too ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-22040 (A vulnerability has been identified in Cerberus PRO EN Engineering Too ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-22039 (A vulnerability has been identified in Cerberus PRO EN Engineering Too ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-21761 (An improper authorization vulnerability [CWE-285] in FortiPortal versi ...)
-	TODO: check
+	NOT-FOR-US: FortiGuard
 CVE-2024-21483 (A vulnerability has been identified in SENTRON 7KM PAC3120 AC/DC (7KM3 ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2024-21451 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21450 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21448 (Microsoft Teams for Android Information Disclosure Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21446 (NTFS Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21445 (Windows USB Print Driver Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21444 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21443 (Windows Kernel Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21442 (Windows USB Print Driver Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21441 (Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vu ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21440 (Microsoft ODBC Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21439 (Windows Telephony Server Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21438 (Microsoft AllJoyn API Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21437 (Windows Graphics Component Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21436 (Windows Installer Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21435 (Windows OLE Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21434 (Microsoft Windows SCSI Class System File Elevation of Privilege Vulner ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21433 (Windows Print Spooler Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21432 (Windows Update Stack Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21431 (Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vul ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21430 (Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnera ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21429 (Windows USB Hub Driver Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21427 (Windows Kerberos Security Feature Bypass Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21426 (Microsoft SharePoint Server Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21421 (Azure SDK Spoofing Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21419 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21418 (Software for Open Networking in the Cloud (SONiC) Elevation of Privile ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21411 (Skype for Consumer Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21408 (Windows Hyper-V Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21407 (Windows Hyper-V Remote Code Execution Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21400 (Microsoft Azure Kubernetes Service Confidential Container Elevation of ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21392 (.NET and Visual Studio Denial of Service Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21390 (Microsoft Authenticator Elevation of Privilege Vulnerability)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21334 (Open Management Infrastructure (OMI) Remote Code Execution Vulnerabili ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-21330 (Open Management Infrastructure (OMI) Elevation of Privilege Vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: Microsoft
 CVE-2024-20671 (Microsoft Defender Security Feature Bypass Vulnerability)
 	TODO: check
 CVE-2024-1765 (Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an u ...)
@@ -324,13 +324,13 @@ CVE-2024-2193 [GhostRace: Speculative Race Conditions]
 	NOTE: https://www.vusec.net/projects/ghostrace/
 	NOTE: https://xenbits.xen.org/xsa/advisory-453.html
 CVE-2024-28199 (phlex is an open source framework for building object-oriented views i ...)
-	TODO: check
+	NOT-FOR-US: phlex framework
 CVE-2024-28163 (Under certain conditions, Support Web Pages of SAP NetWeaver Process I ...)
 	NOT-FOR-US: SAP
 CVE-2024-28120 (codeium-chrome is an open source code completion plugin for the chrome ...)
-	TODO: check
+	NOT-FOR-US: codeium-chrome
 CVE-2024-27938 (Postal is an open source SMTP server. Postal versions less than 3.0.0  ...)
-	TODO: check
+	NOT-FOR-US: Postal SMTP server (not the same as src:postal)
 CVE-2024-27902 (Applications based on SAP GUI for HTML in SAP NetWeaver AS ABAP - vers ...)
 	NOT-FOR-US: SAP
 CVE-2024-27900 (Due to missing authorization check, attacker with business user accoun ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d3ebd8ea0aefe19e3b7a31421f317b651d4b9c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d3ebd8ea0aefe19e3b7a31421f317b651d4b9c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240312/ad2fc1ce/attachment.htm>


More information about the debian-security-tracker-commits mailing list