Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2270d99d by security tracker role at 2024-02-27T08:11:48+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,83 @@
+CVE-2024-27356 (An issue was discovered on certain GL-iNet devices. Attackers 
can down ...)
+       TODO: check
+CVE-2024-27093 (Minder is a Software Supply Chain Security Platform. In 
version 0.0.31 ...)
+       TODO: check
+CVE-2024-27089
+       REJECTED
+CVE-2024-26149 (Vyper is a pythonic Smart Contract Language for the ethereum 
virtual m ...)
+       TODO: check
+CVE-2024-25751 (A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 
with fi ...)
+       TODO: check
+CVE-2024-25248 (SQL Injection vulnerability in the orderGoodsDelivery() 
function in Ni ...)
+       TODO: check
+CVE-2024-25247 (SQL Injection vulnerability in /app/api/controller/Store.php 
in Niusho ...)
+       TODO: check
+CVE-2024-25166 (Cross Site Scripting vulnerability in 71CMS v.1.0.0 allows a 
remote at ...)
+       TODO: check
+CVE-2024-24721 (An issue was discovered on Innovaphone PBX before 14r1 
devices. The pa ...)
+       TODO: check
+CVE-2024-24720 (An issue was discovered on Innovaphone PBX before 14r1 
devices. It pro ...)
+       TODO: check
+CVE-2024-24564 (Vyper is a pythonic Smart Contract Language for the ethereum 
virtual m ...)
+       TODO: check
+CVE-2024-24100 (Code-projects Computer Book Store 1.0 is vulnerable to SQL 
Injection v ...)
+       TODO: check
+CVE-2024-24099 (Code-projects Scholars Tracking System 1.0 is vulnerable to 
SQL Inject ...)
+       TODO: check
+CVE-2024-24096 (Code-projects Computer Book Store 1.0 is vulnerable to SQL 
Injection v ...)
+       TODO: check
+CVE-2024-24095 (Code-projects Simple Stock System 1.0 is vulnerable to SQL 
Injection.)
+       TODO: check
+CVE-2024-22917 (SQL injection vulnerability in Dynamic Lab Management System 
Project i ...)
+       TODO: check
+CVE-2024-22544 (An issue was discovered in Linksys Router E1700 version 1.0.04 
(build  ...)
+       TODO: check
+CVE-2024-22543 (An issue was discovered in Linksys Router E1700 1.0.04 (build 
3), allo ...)
+       TODO: check
+CVE-2024-1698 (The NotificationX \u2013 Best FOMO, Social Proof, WooCommerce 
Sales Po ...)
+       TODO: check
+CVE-2024-1687 (The Thank You Page Customizer for WooCommerce \u2013 Increase 
Your Sal ...)
+       TODO: check
+CVE-2024-1686 (The Thank You Page Customizer for WooCommerce \u2013 Increase 
Your Sal ...)
+       TODO: check
+CVE-2024-1323 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable 
to Store ...)
+       TODO: check
+CVE-2024-0759 (Should an instance of AnythingLLM be hosted on an internal 
network and ...)
+       TODO: check
+CVE-2023-7033 (Insufficient Resource Pool vulnerability in Ethernet function 
of Mitsu ...)
+       TODO: check
+CVE-2023-41506 (An arbitrary file upload vulnerability in the Update/Edit 
Student's Pr ...)
+       TODO: check
+CVE-2023-36237 (Cross Site Request Forgery vulnerability in Bagisto before 
v.1.5.1 all ...)
+       TODO: check
+CVE-2021-46920 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2021-46919 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2021-46918 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2021-46917 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2021-46916 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2021-46915 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2021-46914 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2021-46913 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2021-46912 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2021-46911 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2021-46910 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2021-46909 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2021-46908 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2021-46907 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
+       TODO: check
 CVE-2024-26144 [Possible Sensitive Session Information Leak in Active Storage]
        - rails <unfixed>
        NOTE: 
https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2270d99d15d64406748e98b24fb5cbd859a9b33c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2270d99d15d64406748e98b24fb5cbd859a9b33c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to