Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
75bcd492 by security tracker role at 2024-03-27T20:12:37+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,17 +1,287 @@
-CVE-2024-28085 [escape sequence Injection in wall]
+CVE-2024-30238 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-30186 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30185 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30184 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30183 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30182 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30181 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30180 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30179 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30178 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-30177 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-2996 (A vulnerability was found in Bdtask Multi-Store Inventory 
Management S ...)
+       TODO: check
+CVE-2024-2995 (A vulnerability was found in NUUO Camera up to 20240319 and 
classified ...)
+       TODO: check
+CVE-2024-2994 (A vulnerability was found in Tenda FH1203 2.0.1.6. It has been 
declare ...)
+       TODO: check
+CVE-2024-2993 (A vulnerability was found in Tenda FH1203 2.0.1.6. It has been 
classif ...)
+       TODO: check
+CVE-2024-2992 (A vulnerability was found in Tenda FH1203 2.0.1.6 and 
classified as cr ...)
+       TODO: check
+CVE-2024-2991 (A vulnerability has been found in Tenda FH1203 2.0.1.6 and 
classified  ...)
+       TODO: check
+CVE-2024-2990 (A vulnerability, which was classified as critical, was found in 
Tenda  ...)
+       TODO: check
+CVE-2024-2989 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2024-2988 (A vulnerability classified as critical was found in Tenda 
FH1203 2.0.1 ...)
+       TODO: check
+CVE-2024-2987 (A vulnerability classified as critical has been found in Tenda 
FH1202  ...)
+       TODO: check
+CVE-2024-2986 (A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has 
been r ...)
+       TODO: check
+CVE-2024-2985 (A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has 
been d ...)
+       TODO: check
+CVE-2024-2984 (A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has 
been c ...)
+       TODO: check
+CVE-2024-2983 (A vulnerability was found in Tenda FH1202 1.2.0.14(408) and 
classified ...)
+       TODO: check
+CVE-2024-2982 (A vulnerability has been found in Tenda FH1202 1.2.0.14(408) 
and class ...)
+       TODO: check
+CVE-2024-2981 (A vulnerability, which was classified as critical, was found in 
Tenda  ...)
+       TODO: check
+CVE-2024-2980 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2024-2979 (A vulnerability classified as critical was found in Tenda F1203 
2.0.1. ...)
+       TODO: check
+CVE-2024-2978 (A vulnerability classified as critical has been found in Tenda 
F1203 2 ...)
+       TODO: check
+CVE-2024-2977 (A vulnerability was found in Tenda F1203 2.0.1.6. It has been 
rated as ...)
+       TODO: check
+CVE-2024-2976 (A vulnerability was found in Tenda F1203 2.0.1.6. It has been 
declared ...)
+       TODO: check
+CVE-2024-2962 (The Networker - Tech News WordPress Theme with Dark Mode theme 
for Wor ...)
+       TODO: check
+CVE-2024-29946 (In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, 
the Dashb ...)
+       TODO: check
+CVE-2024-29945 (In Splunk Enterprise versions below 9.2.1, 9.1.4, and 9.0.9, 
the softw ...)
+       TODO: check
+CVE-2024-29936 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29935 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29934 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29933 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29932 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29931 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29930 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29929 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29892 (ZITADEL, open source authentication management software, uses 
Go templ ...)
+       TODO: check
+CVE-2024-29891 (ZITADEL users can upload their own avatar image and various 
image type ...)
+       TODO: check
+CVE-2024-29888 (Saleor is an e-commerce platform that serves high-volume 
companies. Wh ...)
+       TODO: check
+CVE-2024-29887 (Serverpod is an app and web server, built for the Flutter and 
Dart eco ...)
+       TODO: check
+CVE-2024-29886 (Serverpod is an app and web server, built for the Flutter and 
Dart eco ...)
+       TODO: check
+CVE-2024-29819 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29818 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29817 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29816 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29815 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29814 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29813 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29812 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29811 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29807 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29806 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29805 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29804 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29803 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29802 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29801 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29799 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29798 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29797 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29796 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29795 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29794 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29793 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29792 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29791 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29790 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29789 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29788 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29777 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29776 (Cross Site Scripting (XSS) vulnerability in Metagauss 
EventPrime.This  ...)
+       TODO: check
+CVE-2024-29775 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29774 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29773 (Cross-Site Request Forgery (CSRF) vulnerability in BizSwoop a 
CPF Conc ...)
+       TODO: check
+CVE-2024-29772 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29771 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29770 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29769 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29768 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29767 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29766 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29765 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29764 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29763 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29762 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29761 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29760 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29759 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-29758 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-28860 (Cilium is a networking, observability, and security solution 
with an e ...)
+       TODO: check
+CVE-2024-28853 (Ampache is a web based audio/video streaming application and 
file mana ...)
+       TODO: check
+CVE-2024-28852 (Ampache is a web based audio/video streaming application and 
file mana ...)
+       TODO: check
+CVE-2024-28784 (IBM QRadar SIEM 7.5 is vulnerable to cross-site scripting. 
This vulner ...)
+       TODO: check
+CVE-2024-28247 (The Pi-hole is a DNS sinkhole that protects your devices from 
unwanted ...)
+       TODO: check
+CVE-2024-28233 (JupyterHub is an open source multi-user server for Jupyter 
notebooks.  ...)
+       TODO: check
+CVE-2024-27270 (IBM WebSphere Application Server Liberty 23.0.0.3 through 
24.0.0.3 is  ...)
+       TODO: check
+CVE-2024-27091 (GeoNode is a geospatial content management system, a platform 
for the  ...)
+       TODO: check
+CVE-2024-25962 (Dell InsightIQ, version 5.0, contains an improper access 
control vulne ...)
+       TODO: check
+CVE-2024-23515 (Cross-Site Request Forgery (CSRF) vulnerability in Cincopa 
Post Video  ...)
+       TODO: check
+CVE-2024-23510 (Cross-Site Request Forgery (CSRF) vulnerability in Martyn 
Chamberlin D ...)
+       TODO: check
+CVE-2024-23451 (Incorrect Authorization issue exists in the API key based 
security mod ...)
+       TODO: check
+CVE-2024-23450 (A flaw was discovered in Elasticsearch, where processing a 
document in ...)
+       TODO: check
+CVE-2024-22413
+       REJECTED
+CVE-2024-20354 (A vulnerability in the handling of encrypted wireless frames 
of Cisco  ...)
+       TODO: check
+CVE-2024-20333 (A vulnerability in the web-based management interface of Cisco 
Catalys ...)
+       TODO: check
+CVE-2024-20324 (A vulnerability in the CLI of Cisco IOS XE Software could 
allow an aut ...)
+       TODO: check
+CVE-2024-20316 (A vulnerability in the data model interface (DMI) services of 
Cisco IO ...)
+       TODO: check
+CVE-2024-20314 (A vulnerability in the IPv4 Software-Defined Access 
(SD-Access) fabric ...)
+       TODO: check
+CVE-2024-20312 (A vulnerability in the Intermediate System-to-Intermediate 
System (IS- ...)
+       TODO: check
+CVE-2024-20311 (A vulnerability in the Locator ID Separation Protocol (LISP) 
feature o ...)
+       TODO: check
+CVE-2024-20309 (A vulnerability in auxiliary asynchronous port (AUX) functions 
of Cisc ...)
+       TODO: check
+CVE-2024-20308 (A vulnerability in the IKEv1 fragmentation code of Cisco IOS 
Software  ...)
+       TODO: check
+CVE-2024-20307 (A vulnerability in the IKEv1 fragmentation code of Cisco IOS 
Software  ...)
+       TODO: check
+CVE-2024-20306 (A vulnerability in the Unified Threat Defense (UTD) 
configuration CLI  ...)
+       TODO: check
+CVE-2024-20303 (A vulnerability in the multicast DNS (mDNS) gateway feature of 
Cisco I ...)
+       TODO: check
+CVE-2024-20278 (A vulnerability in the NETCONF feature of Cisco IOS XE 
Software could  ...)
+       TODO: check
+CVE-2024-20276 (A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 
Series S ...)
+       TODO: check
+CVE-2024-20271 (A vulnerability in the IP packet processing of Cisco Access 
Point (AP) ...)
+       TODO: check
+CVE-2024-20265 (A vulnerability in the boot process of Cisco Access Point (AP) 
Softwar ...)
+       TODO: check
+CVE-2024-20259 (A vulnerability in the DHCP snooping feature of Cisco IOS XE 
Software  ...)
+       TODO: check
+CVE-2024-1540 (Previously, it was possible to exfiltrate secrets in Gradio's 
CI, but  ...)
+       TODO: check
+CVE-2023-6400 (Incorrect Authorization vulnerability in OpenText\u2122 
ZENworks Confi ...)
+       TODO: check
+CVE-2023-6173 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2023-6153 (Authentication Bypass by Primary Weakness vulnerability in 
TeoSOFT Sof ...)
+       TODO: check
+CVE-2023-50961 (IBM QRadar SIEM 7.5 is vulnerable to stored cross-site 
scripting. This ...)
+       TODO: check
+CVE-2023-44999 (Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce 
WooComm ...)
+       TODO: check
+CVE-2023-39311 (Cross-Site Request Forgery (CSRF) vulnerability in ThemeFusion 
Fusion  ...)
+       TODO: check
+CVE-2023-34020 (URL Redirection to Untrusted Site ('Open Redirect') 
vulnerability in U ...)
+       TODO: check
+CVE-2024-28085 (wall in util-linux through 2.40, often installed with setgid 
tty permi ...)
        - util-linux 2.39.3-11 (bug #1067849)
        NOTE: https://www.openwall.com/lists/oss-security/2024/03/27/5
        NOTE: 
https://github.com/util-linux/util-linux/commit/404b0781f52f7c045ca811b2dceec526408ac253
 (v2.40)
-CVE-2024-26651 [sr9800: Add check for usbnet_get_endpoints]
+CVE-2024-26651 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/07161b2416f740a2cb87faa5566873f401440a61 (6.9-rc1)
-CVE-2024-26652 [net: pds_core: Fix possible double free in error handling path]
+CVE-2024-26652 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/ba18deddd6d502da71fd6b6143c53042271b82bd (6.8)
-CVE-2024-2004 [Usage of disabled protocol]
+CVE-2024-2004 (When a protocol selection parameter option disables all 
protocols with ...)
        - curl 8.7.1-1
        [bookworm] - curl <no-dsa> (Minor issue)
        [bullseye] - curl <not-affected> (Vulnerable code not present)
@@ -19,20 +289,20 @@ CVE-2024-2004 [Usage of disabled protocol]
        NOTE: https://curl.se/docs/CVE-2024-2004.html
        NOTE: Introduced by: 
https://github.com/curl/curl/commit/e6f8445edef8e7996d1cfb141d6df184efef972c 
(curl-7_85_0)
        NOTE: Fixed by: 
https://github.com/curl/curl/commit/17d302e56221f5040092db77d4f85086e8a20e0e 
(curl-8_7_0)
-CVE-2024-2379 [QUIC certificate check bypass with wolfSSL]
+CVE-2024-2379 (libcurl skips the certificate verification for a QUIC 
connection under ...)
        - curl 8.7.1-1 (unimportant)
        NOTE: https://curl.se/docs/CVE-2024-2379.html
        NOTE: Introduced by: 
https://github.com/curl/curl/commit/5d044ad9480a9f556f4b6a252d7533b1ba7fe57e 
(curl-8_6_0)
        NOTE: Fixed by: 
https://github.com/curl/curl/commit/aedbbdf18e689a5eee8dc39600914f5eda6c409c 
(curl-8_7_0)
        NOTE: curl in Debian not built with wolfSSL support
-CVE-2024-2398 [HTTP/2 push headers memory-leak]
+CVE-2024-2398 (When an application tells libcurl it wants to allow HTTP/2 
server push ...)
        - curl 8.7.1-1
        [bookworm] - curl <no-dsa> (Minor issue)
        [bullseye] - curl <no-dsa> (Minor issue)
        NOTE: https://curl.se/docs/CVE-2024-2398.html
        NOTE: Introduced by: 
https://github.com/curl/curl/commit/ea7134ac874a66107e54ff93657ac565cf2ec4aa 
(curl-7_44_0)
        NOTE: Fixed by: 
https://github.com/curl/curl/commit/deca8039991886a559b67bcd6701db800a5cf764 
(curl-8_7_0)
-CVE-2024-2466 [TLS certificate check bypass with mbedTLS]
+CVE-2024-2466 (libcurl did not check the server certificate of TLS connections 
done t ...)
        - curl 8.7.1-1 (unimportant)
        [bookworm] - curl <not-affected> (Vulnerable code not present)
        [bullseye] - curl <not-affected> (Vulnerable code not present)
@@ -36123,6 +36393,7 @@ CVE-2023-43944 (A Stored Cross Site Scripting (XSS) 
vulnerability was found in S
 CVE-2023-43909 (Hospital Management System thru commit 4770d was discovered to 
contain ...)
        NOT-FOR-US: Hospital Management System
 CVE-2023-43655 (Composer is a dependency manager for PHP. Users publishing a 
composer. ...)
+       {DLA-3777-1}
        - composer 2.6.4-1
        [bookworm] - composer <no-dsa> (Minor issue)
        [bullseye] - composer <no-dsa> (Minor issue)
@@ -74984,8 +75255,8 @@ CVE-2023-0584 (The VK Blocks plugin for WordPress is 
vulnerable to improper auth
        NOT-FOR-US: VK Blocks plugin for WordPress
 CVE-2023-0583 (The VK Blocks plugin for WordPress is vulnerable to improper 
authoriza ...)
        NOT-FOR-US: VK Blocks plugin for WordPress
-CVE-2023-0582
-       RESERVED
+CVE-2023-0582 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
 CVE-2023-0581 (The PrivateContent plugin for WordPress is vulnerable to 
protection me ...)
        NOT-FOR-US: PrivateContent plugin for WordPress
 CVE-2023-0580 (Insecure Storage of Sensitive Information vulnerability in ABB 
My Cont ...)
@@ -91771,8 +92042,8 @@ CVE-2022-45849 (Auth. (subscriber+) Reflected 
Cross-Site Scripting (XSS) vulnera
        NOT-FOR-US: WordPress plugin
 CVE-2022-45848 (Unauth. Stored Cross-Site Scripting (XSS) vulnerability 
inContest Gall ...)
        NOT-FOR-US: WordPress plugin
-CVE-2022-45847
-       RESERVED
+CVE-2022-45847 (Cross-Site Request Forgery (CSRF) vulnerability in WPAssist.Me 
WordPre ...)
+       TODO: check
 CVE-2022-45846 (Cross-Site Request Forgery (CSRF) vulnerability in Nickys 
Image Map Pr ...)
        NOT-FOR-US: WordPress plugin
 CVE-2022-45845 (Deserialization of Untrusted Data vulnerability in Nextend 
Smart Slide ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75bcd4921e7c3208ea3e0924dc6946a3e7df7261

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75bcd4921e7c3208ea3e0924dc6946a3e7df7261
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to