[Git][security-tracker-team/security-tracker][master] NFUS

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Nov 14 09:36:28 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1715bbcf by Moritz Muehlenhoff at 2024-11-14T10:08:28+01:00
NFUS

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,61 +1,61 @@
 CVE-2024-9186 (The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-5083 (A storedCross-site Scripting vulnerability has been discovered in Sona ...)
-	TODO: check
+	NOT-FOR-US: Sonatype
 CVE-2024-5082 (A Remote Code Execution vulnerability has been discovered in Sonatype  ...)
-	TODO: check
+	NOT-FOR-US: Sonatype
 CVE-2024-51027 (Ruijie NBR800G gateway NBR_RGOS_11.1(6)B4P9 is vulnerable to command e ...)
-	TODO: check
+	NOT-FOR-US: Ruijie NBR800G
 CVE-2024-50956 (A buffer overflow in the RecvSocketData function of Inovance HCPLC_AM4 ...)
-	TODO: check
+	NOT-FOR-US: Inovance
 CVE-2024-50955 (An issue in how XINJE XD5E-24R and XL5E-16T v3.5.3b handles TCP protoc ...)
-	TODO: check
+	NOT-FOR-US: XINJE
 CVE-2024-45879 (The file upload function in the "QWKalkulation" tool of baltic-it TOPq ...)
-	TODO: check
+	NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45878 (The "Stammdaten" menu of baltic-it TOPqw Webportal v1.35.283.2 (fixed  ...)
-	TODO: check
+	NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45877 (baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Acces ...)
-	TODO: check
+	NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45876 (The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed in vers ...)
-	TODO: check
+	NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-45875 (The create user function in baltic-it TOPqw Webportal 1.35.287.1 (fixe ...)
-	TODO: check
+	NOT-FOR-US: baltic-it TOPqw Webportal
 CVE-2024-41167 (Improper input validation in UEFI firmware in some Intel(R) Server Boa ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-40885 (Use after free in the UEFI firmware of some Intel(R) Server M20NTP BIO ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-40410 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered  ...)
-	TODO: check
+	NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40408 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered  ...)
-	TODO: check
+	NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40407 (A full path disclosure in Cybele Software Thinfinity Workspace before  ...)
-	TODO: check
+	NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40405 (Incorrect access control in Cybele Software Thinfinity Workspace befor ...)
-	TODO: check
+	NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-40404 (Cybele Software Thinfinity Workspace before v7.0.2.113 was discovered  ...)
-	TODO: check
+	NOT-FOR-US: Cybele Software Thinfinity Workspace
 CVE-2024-39811 (Improper input validation in firmware for some Intel(R) Server M20NTP  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-39766 (Improper neutralization of special elements used in SQL command in som ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-39609 (Improper Access Control in UEFI firmware for some Intel(R) Server Boar ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-39368 (Improper neutralization of special elements used in an SQL command ('S ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-39285 (Improper access control in UEFI firmware in some Intel(R) Server M20NT ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-38668 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Standard E ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-38665 (Out-of-bounds write in some Intel(R) Graphics Drivers may allow an aut ...)
 	TODO: check
 CVE-2024-38660 (Protection mechanism failure in the SPP for some Intel(R) Xeon(R) proc ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-38387 (Uncontrolled search path in the Intel(R) Graphics Driver installers fo ...)
 	TODO: check
 CVE-2024-38383 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Pro Editio ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-37027 (Improper Input validation in some Intel(R) VTune(TM) Profiler software ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-37025 (Incorrect execution-assigned permissions in some Intel(R) Advanced Lin ...)
 	TODO: check
 CVE-2024-37024 (Uncontrolled search path for some ACAT software maintained by Intel(R) ...)
@@ -83,23 +83,23 @@ CVE-2024-36242 (Protection mechanism failure in the SPP for some Intel(R) Proces
 CVE-2024-35245 (Uncontrolled search path element in some Intel(R) PROSet/Wireless WiFi ...)
 	TODO: check
 CVE-2024-35201 (Incorrect default permissions in the Intel(R) SDP Tool for Windows sof ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-34776 (Out-of-bounds write in some Intel(R) SGX SDK software may allow an aut ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-34170 (Improper buffer restrictions in some Intel(R) Graphics Drivers may all ...)
 	TODO: check
 CVE-2024-34167 (Uncontrolled search path for the Intel(R) Server Board S2600ST Family  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-34165 (Uncontrolled search path in some Intel(R) oneAPI DPC++/C++ Compiler be ...)
 	TODO: check
 CVE-2024-34164 (Uncontrolled search path element in some Intel(R) MAS software before  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-34028 (Uncontrolled search path in some Intel(R) Graphics Offline Compiler fo ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-34023 (Untrusted pointer dereference in some Intel(R) Graphics Drivers may al ...)
 	TODO: check
 CVE-2024-34022 (Improper Access Control in some Thunderbolt(TM) Share software before  ...)
-	TODO: check
+	NOT-FOR-US: Intel
 CVE-2024-33624 (Improper input validation for some Intel(R) PROSet/Wireless WiFi softw ...)
 	TODO: check
 CVE-2024-33617 (Insufficient control flow management in some Intel(R) QAT Engine for O ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1715bbcfe9bad459726f4cc18327ce64f05d4246
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241114/f86c93d9/attachment.htm>


More information about the debian-security-tracker-commits mailing list