Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
8c74e04d by security tracker role at 2024-02-02T08:11:56+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,163 @@
+CVE-2024-24945 (A stored cross-site scripting (XSS) vulnerability in Travel
Journal Us ...)
+ TODO: check
+CVE-2024-24756 (Crafatar serves Minecraft avatars based on the skin for use in
externa ...)
+ TODO: check
+CVE-2024-24755 (discourse-group-membership-ip-block is a discourse plugin that
adds su ...)
+ TODO: check
+CVE-2024-24524 (Cross Site Request Forgery (CSRF) vulnerability in flusity-CMS
v.2.33, ...)
+ TODO: check
+CVE-2024-24482 (Aprktool before 2.9.3 on Windows allows ../ and /.. directory
traversa ...)
+ TODO: check
+CVE-2024-24041 (A stored cross-site scripting (XSS) vulnerability in Travel
Journal Us ...)
+ TODO: check
+CVE-2024-23978 (Heap-based buffer overflow vulnerability exists in HOME SPOT
CUBE2 V10 ...)
+ TODO: check
+CVE-2024-23746 (Miro Desktop 0.8.18 on macOS allows Electron code injection.)
+ TODO: check
+CVE-2024-23052 (An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202
allows a ...)
+ TODO: check
+CVE-2024-23034 (Cross Site Scripting vulnerability in the input parameter in
eyoucms v ...)
+ TODO: check
+CVE-2024-23033 (Cross Site Scripting vulnerability in the path parameter in
eyoucms v. ...)
+ TODO: check
+CVE-2024-23032 (Cross Site Scripting vulnerability in num parameter in eyoucms
v.1.6.5 ...)
+ TODO: check
+CVE-2024-23031 (Cross Site Scripting (XSS) vulnerability in is_water parameter
in eyou ...)
+ TODO: check
+CVE-2024-22927 (Cross Site Scripting (XSS) vulnerability in the func parameter
in eyou ...)
+ TODO: check
+CVE-2024-22903 (Vinchin Backup & Recovery v7.2 was discovered to contain an
authentica ...)
+ TODO: check
+CVE-2024-22902 (Vinchin Backup & Recovery v7.2 was discovered to be configured
with de ...)
+ TODO: check
+CVE-2024-22901 (Vinchin Backup & Recovery v7.2 was discovered to use default
MYSQL cre ...)
+ TODO: check
+CVE-2024-22900 (Vinchin Backup & Recovery v7.2 was discovered to contain an
authentica ...)
+ TODO: check
+CVE-2024-22899 (Vinchin Backup & Recovery v7.2 was discovered to contain an
authentica ...)
+ TODO: check
+CVE-2024-22779 (Directory Traversal vulnerability in Kihron ServerRPExposer
v.1.0.2 an ...)
+ TODO: check
+CVE-2024-22533 (Before Beetl v3.15.12, the rendering template has a
server-side templa ...)
+ TODO: check
+CVE-2024-22320 (IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1,
8.11, 8.11. ...)
+ TODO: check
+CVE-2024-22319 (IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1,
8.11, 8.11. ...)
+ TODO: check
+CVE-2024-22096 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4,an ...)
+ TODO: check
+CVE-2024-22016 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4,an ...)
+ TODO: check
+CVE-2024-21869 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4, th ...)
+ TODO: check
+CVE-2024-21866 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4, th ...)
+ TODO: check
+CVE-2024-21863 (in OpenHarmony v4.0.0 and prior versions allow a local
attacker cause ...)
+ TODO: check
+CVE-2024-21860 (in OpenHarmony v4.0.0 and prior versions allow an adjacent
attacker a ...)
+ TODO: check
+CVE-2024-21852 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4,an ...)
+ TODO: check
+CVE-2024-21851 (in OpenHarmony v4.0.0 and prior versions allow a local
attacker cause ...)
+ TODO: check
+CVE-2024-21845 (in OpenHarmony v4.0.0 and prior versions allow a local
attacker cause ...)
+ TODO: check
+CVE-2024-21794 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4,an ...)
+ TODO: check
+CVE-2024-21780 (Stack-based buffer overflow vulnerability exists in HOME SPOT
CUBE2 V1 ...)
+ TODO: check
+CVE-2024-21764 (In Rapid Software LLC's Rapid SCADA versions prior toVersion
5.8.4, th ...)
+ TODO: check
+CVE-2024-21485 (Versions of the package dash-core-components before 2.13.0;
all versio ...)
+ TODO: check
+CVE-2024-21399 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-1162 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable
to Cross ...)
+ TODO: check
+CVE-2024-1143 (Central Dogma versions prior to 0.64.0 is vulnerable to
Cross-Site Scr ...)
+ TODO: check
+CVE-2024-1073 (The SlimStat Analytics plugin for WordPress is vulnerable to
Stored Cr ...)
+ TODO: check
+CVE-2024-1047 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable
to unaut ...)
+ TODO: check
+CVE-2024-1040 (Gessler GmbH WEB-MASTER user account is stored using a weak
hashing al ...)
+ TODO: check
+CVE-2024-1039 (Gessler GmbH WEB-MASTER has a restoration account that uses
weak hard ...)
+ TODO: check
+CVE-2024-0685 (The Ninja Forms Contact Form \u2013 The Drag and Drop Form
Builder for ...)
+ TODO: check
+CVE-2024-0325 (In Helix Sync versions prior to 2024.1, a local command
injection was ...)
+ TODO: check
+CVE-2024-0285 (in OpenHarmony v4.0.0 and prior versions allow a local attacker
cause ...)
+ TODO: check
+CVE-2023-6221 (The cloud provider MachineSense uses for integration and
deployment fo ...)
+ TODO: check
+CVE-2023-50962 (IBM PowerSC 1.3, 2.0, and 2.1 MFA does not implement the "HTTP
Strict ...)
+ TODO: check
+CVE-2023-50941 (IBM PowerSC 1.3, 2.0, and 2.1 does not provide logout
functionality, w ...)
+ TODO: check
+CVE-2023-50940 (IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource
Sharing (CORS ...)
+ TODO: check
+CVE-2023-50939 (IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected
cryptographic ...)
+ TODO: check
+CVE-2023-50938 (IBM PowerSC 1.3, 2.0, and 2.1 could allow a remote attacker to
hijack ...)
+ TODO: check
+CVE-2023-50937 (IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected
cryptographic ...)
+ TODO: check
+CVE-2023-50936 (IBM PowerSC 1.3, 2.0, and 2.1 does not invalidate session
after logout ...)
+ TODO: check
+CVE-2023-50935 (IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict
access to a U ...)
+ TODO: check
+CVE-2023-50934 (IBM PowerSC 1.3, 2.0, and 2.1 uses single-factor
authentication which ...)
+ TODO: check
+CVE-2023-50933 (IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection.
A remot ...)
+ TODO: check
+CVE-2023-50328 (IBM PowerSC 1.3, 2.0, and 2.1 may allow a remote attacker to
view sess ...)
+ TODO: check
+CVE-2023-50327 (IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which
could a ...)
+ TODO: check
+CVE-2023-50326 (IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account
lockout setti ...)
+ TODO: check
+CVE-2023-4472 (Objectplanet Opinio version 7.22 and prior uses a
cryptographically we ...)
+ TODO: check
+CVE-2023-49617 (The MachineSense application programmable interface (API) is
improperl ...)
+ TODO: check
+CVE-2023-49610 (MachineSense FeverWarn Raspberry Pi-based devices lack input
sanitizat ...)
+ TODO: check
+CVE-2023-49118 (in OpenHarmony v3.2.4 and prior versions allow a local
attacker causes ...)
+ TODO: check
+CVE-2023-49115 (MachineSense devices use unauthenticated MQTT messaging to
monitor dev ...)
+ TODO: check
+CVE-2023-48793 (Zoho ManageEngine ADAudit Plus through 7250 allows SQL
Injection in th ...)
+ TODO: check
+CVE-2023-48792 (Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to
SQL Injec ...)
+ TODO: check
+CVE-2023-47867 (MachineSense FeverWarn devices are configured as Wi-Fi hosts
in a way ...)
+ TODO: check
+CVE-2023-47257 (ConnectWise ScreenConnect through 23.8.4 allows
man-in-the-middle atta ...)
+ TODO: check
+CVE-2023-47256 (ConnectWise ScreenConnect through 23.8.4 allows local users to
connect ...)
+ TODO: check
+CVE-2023-46706 (Multiple MachineSense devices have credentials unable to be
changed by ...)
+ TODO: check
+CVE-2023-46344 (A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161,
and pos ...)
+ TODO: check
+CVE-2023-46159 (IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an
authenticated ...)
+ TODO: check
+CVE-2023-45734 (in OpenHarmony v3.2.4 and prior versions allow an adjacent
attacker ar ...)
+ TODO: check
+CVE-2023-43756 (in OpenHarmony v3.2.4 and prior versions allow a local
attacker causes ...)
+ TODO: check
+CVE-2023-38263 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an
authentica ...)
+ TODO: check
+CVE-2023-38020 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an
authentica ...)
+ TODO: check
+CVE-2023-38019 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a
remote atta ...)
+ TODO: check
+CVE-2023-36496 (Delegated Admin Privilege virtual attribute provider plugin,
when enab ...)
+ TODO: check
+CVE-2023-32333 (IBM Maximo Asset Management 7.6.1.3 could allow a remote
attacker to l ...)
+ TODO: check
CVE-2024-24754 (Bref enable serverless PHP on AWS Lambda. When Bref is used
with the E ...)
NOT-FOR-US: Bref
CVE-2024-24753 (Bref enable serverless PHP on AWS Lambda. When Bref is used in
combina ...)
@@ -867,7 +1027,7 @@ CVE-2024-0444 [GStreamer-SA-2024-0001: AV1 codec parser
potential buffer overflo
NOTE: https://gstreamer.freedesktop.org/security/sa-2024-0001.html
NOTE:
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5970
NOTE: Fixed by:
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/394d5066f8a7b728df02fe9084e955b2f7d7f6fe
(1.22.9)
-CVE-2023-46045 [buffer overflow via a crafted config6a file]
+CVE-2023-46045 (Graphviz 2.36 before 10.0.0 has an out-of-bounds read via a
crafted co ...)
- graphviz 2.42.2-8 (unimportant)
NOTE: Crosses no security boundary, config files are under local control
NOTE: https://gitlab.com/graphviz/graphviz/-/issues/2441
@@ -2820,42 +2980,43 @@ CVE-2024-20923
CVE-2024-20925
- openjfx <not-affected> (Only affects JavaFX 8)
CVE-2024-20945
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20926 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK,
Oracle Gr ...)
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20921
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20919
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20952 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK,
Oracle Gr ...)
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20918 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK,
Oracle Gr ...)
- {DSA-5604-1 DLA-3728-1}
+ {DSA-5613-1 DSA-5604-1 DLA-3728-1}
- openjdk-8 8u402-ga-1
- openjdk-11 11.0.22+7-1
- openjdk-17 17.0.10+7-1
- openjdk-21 21.0.2+13-1
CVE-2024-20932 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK,
Oracle Gr ...)
+ {DSA-5613-1}
- openjdk-17 17.0.10+7-1
CVE-2024-23347 (Prior to v176, when opening a new project Meta Spark Studio
would exec ...)
NOT-FOR-US: Meta Spark Studio
@@ -21283,7 +21444,7 @@ CVE-2023-44766 (A Cross Site Scripting (XSS)
vulnerability in Concrete CMS v.9.2
NOT-FOR-US: Concrete CMS
CVE-2023-44765 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS
versions 8. ...)
NOT-FOR-US: Concrete CMS
-CVE-2023-44764 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS
v.9.2.1 all ...)
+CVE-2023-44764 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS
before 9.2. ...)
NOT-FOR-US: Concrete CMS
CVE-2023-44762 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS
from versio ...)
NOT-FOR-US: Concrete CMS
@@ -95104,8 +95265,8 @@ CVE-2022-40746 (IBM i Access Family 1.1.2 through 1.1.4
and 1.1.4.3 through 1.1.
NOT-FOR-US: IBM
CVE-2022-40745
RESERVED
-CVE-2022-40744
- RESERVED
+CVE-2022-40744 (IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site
scripting. ...)
+ TODO: check
CVE-2022-40743 (Improper Input Validation vulnerability for the xdebug plugin
in Apach ...)
- trafficserver 9.1.4+ds-1
[bullseye] - trafficserver <not-affected> (Vulnerable code not present)
@@ -216208,10 +216369,10 @@ CVE-2021-22284 (Incorrect Permission Assignment for
Critical Resource vulnerabil
NOT-FOR-US: ABB
CVE-2021-22283 (Improper Initialization vulnerability in ABB Relion protection
relays ...)
NOT-FOR-US: ABB
-CVE-2021-22282
- RESERVED
-CVE-2021-22281
- RESERVED
+CVE-2021-22282 (Improper copy algorithm in the project extraction component in
B&R Aut ...)
+ TODO: check
+CVE-2021-22281 (: Relative Path Traversal vulnerability in B&R Industrial
Automation A ...)
+ TODO: check
CVE-2021-22280
RESERVED
CVE-2021-22279 (A Missing Authentication vulnerability in RobotWare for the
OmniCore r ...)
@@ -242474,10 +242635,10 @@ CVE-2020-24684
RESERVED
CVE-2020-24683 (The affected versions of S+ Operations (version 2.1 SP1 and
earlier) u ...)
NOT-FOR-US: ABB
-CVE-2020-24682
- RESERVED
-CVE-2020-24681
- RESERVED
+CVE-2020-24682 (Unquoted Search Path or Element vulnerability in B&R
Industrial Automa ...)
+ TODO: check
+CVE-2020-24681 (Incorrect Permission Assignment for Critical Resource
vulnerability in ...)
+ TODO: check
CVE-2020-24680 (In S+ Operations and S+ Historian, the passwords of internal
users (no ...)
NOT-FOR-US: ABB
CVE-2020-24679 (A S+ Operations and S+ Historian service is subject to a DoS
by specia ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c74e04d93542ebeb4922d464982b48a3ee45f4e
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c74e04d93542ebeb4922d464982b48a3ee45f4e
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits