Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0ab42c8b by security tracker role at 2024-02-12T08:11:57+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,55 @@
+CVE-2024-25744 (In the Linux kernel before 6.6.7, an untrusted VMM can trigger 
int80 s ...)
+       TODO: check
+CVE-2024-25741 (printer_write in drivers/usb/gadget/function/f_printer.c in 
the Linux  ...)
+       TODO: check
+CVE-2024-25740 (A memory leak flaw was found in the UBI driver in 
drivers/mtd/ubi/atta ...)
+       TODO: check
+CVE-2024-25739 (create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux 
kernel throug ...)
+       TODO: check
+CVE-2024-25728 (ExpressVPN before 12.73.0 on Windows, when split tunneling is 
used, se ...)
+       TODO: check
+CVE-2024-25419 (flusity-CMS v2.33 was discovered to contain a Cross-Site 
Request Forge ...)
+       TODO: check
+CVE-2024-25418 (flusity-CMS v2.33 was discovered to contain a Cross-Site 
Request Forge ...)
+       TODO: check
+CVE-2024-25417 (flusity-CMS v2.33 was discovered to contain a Cross-Site 
Request Forge ...)
+       TODO: check
+CVE-2024-25100 (Deserialization of Untrusted Data vulnerability in WP Swings 
Coupon Re ...)
+       TODO: check
+CVE-2024-24933 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24932 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24931 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24930 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24928 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24927 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24926 (Deserialization of Untrusted Data vulnerability in 
UnitedThemes Brookl ...)
+       TODO: check
+CVE-2024-24889 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-24797 (Deserialization of Untrusted Data vulnerability in G5Theme ERE 
Recentl ...)
+       TODO: check
+CVE-2024-24796 (Deserialization of Untrusted Data vulnerability in MagePeople 
Team Eve ...)
+       TODO: check
+CVE-2024-23513 (Deserialization of Untrusted Data vulnerability in 
PropertyHive.This i ...)
+       TODO: check
+CVE-2024-1433 (A vulnerability, which was classified as problematic, was found 
in KDE ...)
+       TODO: check
+CVE-2023-52429 (dm_table_create in drivers/md/dm-table.c in the Linux kernel 
through 6 ...)
+       TODO: check
+CVE-2023-51403 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-51370 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-50875 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-47526 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
 CVE-2024-25722 (qanything_kernel/connector/database/mysql/mysql_client.py in 
qanything ...)
        NOT-FOR-US: qanything.ai QAnything
 CVE-2024-25718 (In the Samly package before 1.4.0 for Elixir, 
Samly.State.Store.get_as ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ab42c8b2fb3919b1381183f3f868d2755b630bd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ab42c8b2fb3919b1381183f3f868d2755b630bd
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to