Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
e8ab90bf by security tracker role at 2024-01-26T20:12:22+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,149 @@
+CVE-2024-23896 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23894 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23893 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23892 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23891 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23890 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23889 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23888 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23887 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23886 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23885 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23884 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23883 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23882 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23881 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23880 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23879 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23878 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23877 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23876 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23875 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23874 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23873 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23872 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23871 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23870 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23869 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23868 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23867 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23866 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23865 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23864 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23863 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23862 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23861 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23860 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23859 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23858 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23857 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23856 (A vulnerability has been reported in Cups Easy (Purchase &
Inventory), ...)
+ TODO: check
+CVE-2024-23820 (OpenFGA, an authorization/permission engine, is vulnerable to
a denial ...)
+ TODO: check
+CVE-2024-22551 (WhatACart v2.0.7 was discovered to contain a reflected
cross-site scri ...)
+ TODO: check
+CVE-2024-22550 (An arbitrary file upload vulnerability in the component
/alsdemo/ss/me ...)
+ TODO: check
+CVE-2024-21985 (ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13,
9.12.1P10 a ...)
+ TODO: check
+CVE-2024-21336 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
+ TODO: check
+CVE-2024-20305 (A vulnerability in the web-based management interface of Cisco
Unity C ...)
+ TODO: check
+CVE-2024-20263 (A vulnerability with the access control list (ACL) management
within a ...)
+ TODO: check
+CVE-2024-20253 (A vulnerability in multiple Cisco Unified Communications and
Contact C ...)
+ TODO: check
+CVE-2024-0944 (A vulnerability was found in Totolink T8 4.1.5cu.833_20220905.
It has ...)
+ TODO: check
+CVE-2024-0943 (A vulnerability was found in Totolink N350RT 9.3.5u.6255. It
has been ...)
+ TODO: check
+CVE-2024-0942 (A vulnerability was found in Totolink N200RE V5
9.3.5u.6255_B20211224. ...)
+ TODO: check
+CVE-2024-0941 (A vulnerability was found in Novel-Plus 4.3.0-RC1 and
classified as cr ...)
+ TODO: check
+CVE-2024-0939 (A vulnerability has been found in Beijing Baichuo Smart S210
Managemen ...)
+ TODO: check
+CVE-2024-0938 (A vulnerability, which was classified as critical, was found in
Tongda ...)
+ TODO: check
+CVE-2024-0937 (A vulnerability, which was classified as critical, has been
found in v ...)
+ TODO: check
+CVE-2024-0936 (A vulnerability classified as critical was found in
van_der_Schaar LAB ...)
+ TODO: check
+CVE-2024-0933 (A vulnerability was found in Niushop B2B2C V5 and classified as
critic ...)
+ TODO: check
+CVE-2024-0932 (A vulnerability, which was classified as critical, has been
found in T ...)
+ TODO: check
+CVE-2024-0931 (A vulnerability classified as critical was found in Tenda AC10U
15.03. ...)
+ TODO: check
+CVE-2024-0930 (A vulnerability classified as critical has been found in Tenda
AC10U 1 ...)
+ TODO: check
+CVE-2024-0929 (A vulnerability was found in Tenda AC10U
15.03.06.49_multi_TDE01. It h ...)
+ TODO: check
+CVE-2024-0928 (A vulnerability was found in Tenda AC10U
15.03.06.49_multi_TDE01. It h ...)
+ TODO: check
+CVE-2024-0927 (A vulnerability was found in Tenda AC10U
15.03.06.49_multi_TDE01. It h ...)
+ TODO: check
+CVE-2024-0926 (A vulnerability was found in Tenda AC10U
15.03.06.49_multi_TDE01 and c ...)
+ TODO: check
+CVE-2024-0925 (A vulnerability has been found in Tenda AC10U
15.03.06.49_multi_TDE01 ...)
+ TODO: check
+CVE-2024-0924 (A vulnerability, which was classified as critical, was found in
Tenda ...)
+ TODO: check
+CVE-2024-0923 (A vulnerability, which was classified as critical, has been
found in T ...)
+ TODO: check
+CVE-2024-0922 (A vulnerability classified as critical was found in Tenda AC10U
15.03. ...)
+ TODO: check
+CVE-2024-0921 (A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04
and clas ...)
+ TODO: check
+CVE-2024-0920 (A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It
has been ...)
+ TODO: check
+CVE-2024-0919 (A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It
has been ...)
+ TODO: check
+CVE-2024-0918 (A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and
classified ...)
+ TODO: check
+CVE-2022-48622 (In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI
(Windows ...)
+ TODO: check
CVE-2024-24399 (An arbitrary file upload vulnerability in LeptonCMS v7.0.0
allows auth ...)
NOT-FOR-US: LeptonCMS
CVE-2024-23630 (An arbitrary firmware upload vulnerability exists in the
Motorola MR2 ...)
@@ -214,7 +360,7 @@ CVE-2023-33757 (A lack of SSL certificate validation in
Splicecom iPCS (iOS App)
NOT-FOR-US: SpliceCom
CVE-2024-0822 (An authentication bypass vulnerability was found in
overt-engine. This ...)
NOT-FOR-US: ovirt-engine
-CVE-2024-0727 [Add NULL checks where ContentInfo data can be NULL]
+CVE-2024-0727 (Issue summary: Processing a maliciously formatted PKCS12 file
may lead ...)
- openssl <unfixed>
[bookworm] - openssl <no-dsa> (Minor issue)
[bullseye] - openssl <no-dsa> (Minor issue)
@@ -9767,7 +9913,7 @@ CVE-2023-6458 (Mattermost webapp fails to validateroute
parameters in/<TEAM_NAME
- mattermost-server <itp> (bug #823556)
CVE-2023-6393 (A flaw was found in the Quarkus Cache Runtime. When request
processing ...)
NOT-FOR-US: Quarkus
-CVE-2023-6291
+CVE-2023-6291 (A flaw was found in the redirect_uri validation logic in
Keycloak. Thi ...)
NOT-FOR-US: Keycloak
CVE-2023-6288 (Code injection in Remote Desktop Manager 2023.3.9.3 and earlier
on mac ...)
NOT-FOR-US: Devolutions
@@ -10103,7 +10249,7 @@ CVE-2023-47106 (Traefik is an open source HTTP reverse
proxy and load balancer.
- traefik <itp> (bug #983289)
CVE-2023-45781 (In parse_gap_data of utils.cc, there is a possible out of
bounds read ...)
NOT-FOR-US: Android
-CVE-2023-45779 (In TBD of TBD, there is a possible malicious update to
platform compon ...)
+CVE-2023-45779 (In the APEX module framework of AOSP, there is a possible
malicious up ...)
NOT-FOR-US: Android
CVE-2023-45777 (In checkKeyIntentParceledCorrectly of
AccountManagerService.java, ther ...)
NOT-FOR-US: Android
@@ -46653,8 +46799,8 @@ CVE-2023-29083
RESERVED
CVE-2023-29082
RESERVED
-CVE-2023-29081
- RESERVED
+CVE-2023-29081 (A vulnerability has been reported in Suite Setups built with
versions ...)
+ TODO: check
CVE-2023-29080
RESERVED
CVE-2023-29079
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits