Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6acad771 by security tracker role at 2024-03-05T20:12:27+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,9 +1,101 @@
-CVE-2022-48630 [crypto: qcom-rng - fix infinite loop on requests not multiple 
of WORD_SZ]
+CVE-2024-2188 (Cross-Site Scripting (XSS) vulnerability stored in TP-Link 
Archer AX50 ...)
+       TODO: check
+CVE-2024-2056 (Services that are running and bound to the loopback interface 
on the A ...)
+       TODO: check
+CVE-2024-2055 (The "Rich Filemanager" feature of Artica Proxy provides a 
web-based in ...)
+       TODO: check
+CVE-2024-2054 (The Artica-Proxy administrative web application will 
deserialize arbit ...)
+       TODO: check
+CVE-2024-2053 (The Artica Proxy administrative web application will 
deserialize arbit ...)
+       TODO: check
+CVE-2024-2005 (Blue Planet\xae has released software updates that address this 
vulner ...)
+       TODO: check
+CVE-2024-27931 (Deno is a JavaScript, TypeScript, and WebAssembly runtime with 
secure  ...)
+       TODO: check
+CVE-2024-27929 (ImageSharp is a managed, cross-platform, 2D graphics library. 
A heap-u ...)
+       TODO: check
+CVE-2024-27627 (A reflected cross-site scripting (XSS) vulnerability exists in 
SuperCa ...)
+       TODO: check
+CVE-2024-27626 (A Reflected Cross-Site Scripting (XSS) vulnerability has been 
identifi ...)
+       TODO: check
+CVE-2024-27625 (CMS Made Simple Version 2.2.19 is vulnerable to Cross Site 
Scripting ( ...)
+       TODO: check
+CVE-2024-27623 (CMS Made Simple version 2.2.19 is vulnerable to Server-Side 
Template I ...)
+       TODO: check
+CVE-2024-27622 (A remote code execution vulnerability has been identified in 
the User  ...)
+       TODO: check
+CVE-2024-27565 (A Server-Side Request Forgery (SSRF) in weixin.php of 
ChatGPT-wechat-p ...)
+       TODO: check
+CVE-2024-27564 (A Server-Side Request Forgery (SSRF) in pictureproxy.php of 
ChatGPT co ...)
+       TODO: check
+CVE-2024-27563 (A Server-Side Request Forgery (SSRF) in the getFileFromRepo 
function o ...)
+       TODO: check
+CVE-2024-27561 (A Server-Side Request Forgery (SSRF) in the 
installUpdateThemePluginAc ...)
+       TODO: check
+CVE-2024-26339 (swftools v0.9.2 was discovered to contain a strcpy parameter 
overlap v ...)
+       TODO: check
+CVE-2024-26337 (swftools v0.9.2 was discovered to contain a segmentation 
violation via ...)
+       TODO: check
+CVE-2024-26335 (swftools v0.9.2 was discovered to contain a segmentation 
violation via ...)
+       TODO: check
+CVE-2024-26334 (swftools v0.9.2 was discovered to contain a segmentation 
violation via ...)
+       TODO: check
+CVE-2024-24098 (Code-projects Scholars Tracking System 1.0 is vulnerable to 
SQL Inject ...)
+       TODO: check
+CVE-2024-23296 (A memory corruption issue was addressed with improved 
validation. This ...)
+       TODO: check
+CVE-2024-23256 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-23243 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-23225 (A memory corruption issue was addressed with improved 
validation. This ...)
+       TODO: check
+CVE-2024-22352 (IBM InfoSphere Information Server 11.7 stores potentially 
sensitive in ...)
+       TODO: check
+CVE-2024-22255 (VMware ESXi, Workstation, and Fusion contain an information 
disclosure ...)
+       TODO: check
+CVE-2024-22254 (VMware ESXi contains an out-of-bounds write vulnerability.A 
malicious  ...)
+       TODO: check
+CVE-2024-22253 (VMware ESXi, Workstation, and Fusion contain a use-after-free 
vulnerab ...)
+       TODO: check
+CVE-2024-22252 (VMware ESXi, Workstation, and Fusion contain a use-after-free 
vulnerab ...)
+       TODO: check
+CVE-2024-1202 (Authentication Bypass by Primary Weakness vulnerability in 
XPodas Octo ...)
+       TODO: check
+CVE-2023-7103 (Authentication Bypass by Primary Weakness vulnerability in 
ZKSoftware  ...)
+       TODO: check
+CVE-2023-5457 (A CWE-1269 \u201cProduct Released in Non-Release 
Configuration\u201d v ...)
+       TODO: check
+CVE-2023-5456 (A CWE-798 \u201cUse of Hard-coded Credentials\u201d 
vulnerability in t ...)
+       TODO: check
+CVE-2023-45600 (A CWE-613 \u201cInsufficient Session Expiration\u201d 
vulnerability in ...)
+       TODO: check
+CVE-2023-45599 (A CWE-646 \u201cReliance on File Name or Extension of 
Externally-Suppl ...)
+       TODO: check
+CVE-2023-45598 (A CWE-862 \u201cMissing Authorization\u201d vulnerability in 
the \u201 ...)
+       TODO: check
+CVE-2023-45597 (A CWE-1236 \u201cImproper Neutralization of Formula Elements 
in a CSV  ...)
+       TODO: check
+CVE-2023-45596 (A CWE-862 \u201cMissing Authorization\u201d vulnerability in 
the \u201 ...)
+       TODO: check
+CVE-2023-45595 (A CWE-434 \u201cUnrestricted Upload of File with Dangerous 
Type\u201d  ...)
+       TODO: check
+CVE-2023-45594 (A CWE-552 \u201cFiles or Directories Accessible to External 
Parties\u2 ...)
+       TODO: check
+CVE-2023-45593 (A CWE-693 \u201cProtection Mechanism Failure\u201d 
vulnerability in th ...)
+       TODO: check
+CVE-2023-45592 (A CWE-250 \u201cExecution with Unnecessary Privileges\u201d 
vulnerabil ...)
+       TODO: check
+CVE-2023-45591 (A CWE-122 \u201cHeap-based Buffer Overflow\u201d vulnerability 
in the  ...)
+       TODO: check
+CVE-2023-35899 (IBM Cloud Pak for Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 
19.0.2, 1 ...)
+       TODO: check
+CVE-2022-48630 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux 5.17.11-1
        [bullseye] - linux 5.10.120-1
        [buster] - linux 4.19.249-1
        NOTE: 
https://git.kernel.org/linus/16287397ec5c08aa58db6acf7dbc55470d78087d (5.18)
-CVE-2022-48629 [crypto: qcom-rng - ensure buffer for generate is completely 
filled]
+CVE-2022-48629 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux 5.16.18-1
        [bullseye] - linux 5.10.113-1
        [buster] - linux 4.19.249-1
@@ -2520,6 +2612,7 @@ CVE-2023-48679 (Stored cross-site scripting (XSS) 
vulnerability due to missing o
 CVE-2023-48678 (Sensitive information disclosure due to insecure folder 
permissions. T ...)
        NOT-FOR-US: Acronis
 CVE-2024-27354 (An issue was discovered in phpseclib 1.x before 1.0.23, 2.x 
before 2.0 ...)
+       {DLA-3750-1 DLA-3749-1}
        - phpseclib 1.0.23-1
        [bookworm] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
        [bullseye] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
@@ -2530,6 +2623,7 @@ CVE-2024-27354 (An issue was discovered in phpseclib 1.x 
before 1.0.23, 2.x befo
        [bookworm] - php-phpseclib3 <no-dsa> (Minor issue; can be fixed via pu)
        NOTE: 
https://github.com/phpseclib/phpseclib/commit/ad5dbdf2129f5e0fb644637770b7f33de8ca8575
 CVE-2024-27355 (An issue was discovered in phpseclib 1.x before 1.0.23, 2.x 
before 2.0 ...)
+       {DLA-3750-1 DLA-3749-1}
        - phpseclib 1.0.23-1
        [bookworm] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
        [bullseye] - phpseclib <no-dsa> (Minor issue; can be fixed via pu)
@@ -5466,6 +5560,7 @@ CVE-2024-24921 (A vulnerability has been identified in 
Simcenter Femap (All vers
 CVE-2024-24920 (A vulnerability has been identified in Simcenter Femap (All 
versions < ...)
        NOT-FOR-US: Siemens
 CVE-2024-24814 (mod_auth_openidc is an OpenID Certified\u2122 authentication 
and autho ...)
+       {DLA-3751-1}
        - libapache2-mod-auth-openidc <unfixed> (bug #1064183)
        NOTE: 
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv
        NOTE: 
https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d
 (v2.4.15.2)
@@ -64602,8 +64697,8 @@ CVE-2023-26284 (IBM MQ Certified Container 9.3.0.1 
through 9.3.0.3 and 9.3.1.0 t
        NOT-FOR-US: IBM
 CVE-2023-26283 (IBM WebSphere Application Server 9.0 is vulnerable to 
cross-site scrip ...)
        NOT-FOR-US: IBM
-CVE-2023-26282
-       RESERVED
+CVE-2023-26282 (IBM Watson CP4D Data Stores 4.6.0 through 4.6.3 could allow a 
user wit ...)
+       TODO: check
 CVE-2023-26281 (IBM HTTP Server 8.5 used by IBM WebSphere Application Server 
could all ...)
        NOT-FOR-US: IBM
 CVE-2023-26280
@@ -66685,8 +66780,8 @@ CVE-2023-25683 (IBM PowerVM Hypervisor FW950.00 through 
FW950.71, FW1010.00 thro
        NOT-FOR-US: IBM
 CVE-2023-25682 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 
6.0.3.8 a ...)
        NOT-FOR-US: IBM
-CVE-2023-25681
-       RESERVED
+CVE-2023-25681 (LDAP users on IBM Spectrum Virtualize 8.5 which are configured 
to requ ...)
+       TODO: check
 CVE-2023-25680 (IBM Robotic Process Automation 21.0.1 through 21.0.5 is 
vulnerable to  ...)
        NOT-FOR-US: IBM
 CVE-2023-25679
@@ -85479,8 +85574,8 @@ CVE-2022-46090
        RESERVED
 CVE-2022-46089
        RESERVED
-CVE-2022-46088
-       RESERVED
+CVE-2022-46088 (Online Flight Booking Management System v1.0 was discovered to 
contain ...)
+       TODO: check
 CVE-2022-46087 (CloudSchool v3.0.1 is vulnerable to Cross Site Scripting 
(XSS). A norm ...)
        NOT-FOR-US: CloudSchool
 CVE-2022-46086
@@ -157585,8 +157680,8 @@ CVE-2022-22401 (IBM Aspera Faspex 5.0.5 could allow a 
remote attacker to gather
        NOT-FOR-US: IBM
 CVE-2022-22400
        RESERVED
-CVE-2022-22399
-       RESERVED
+CVE-2022-22399 (IBM Aspera Faspex 5.0.0 and 5.0.1 is vulnerable to HTTP header 
injecti ...)
+       TODO: check
 CVE-2022-22398
        RESERVED
 CVE-2022-22397



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6acad77195088ad5e8dea96c8994c243a5acb460

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6acad77195088ad5e8dea96c8994c243a5acb460
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to