Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
861da87f by security tracker role at 2024-04-02T08:12:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,227 @@
+CVE-2024-3165 (System->Maintenance-> Log Files in dotCMS dashboard is 
providing the u ...)
+       TODO: check
+CVE-2024-3164 (In dotCMS dashboard, the Tools and Log Files tabs under System 
\u2192  ...)
+       TODO: check
+CVE-2024-3160 (** DISPUTED ** A vulnerability, which was classified as 
problematic, w ...)
+       TODO: check
+CVE-2024-3148 (A vulnerability, which was classified as critical, has been 
found in D ...)
+       TODO: check
+CVE-2024-3147 (A vulnerability classified as problematic was found in DedeCMS 
5.7. Th ...)
+       TODO: check
+CVE-2024-3146 (A vulnerability classified as problematic has been found in 
DedeCMS 5. ...)
+       TODO: check
+CVE-2024-3145 (A vulnerability was found in DedeCMS 5.7. It has been rated as 
problem ...)
+       TODO: check
+CVE-2024-3144 (A vulnerability was found in DedeCMS 5.7. It has been declared 
as prob ...)
+       TODO: check
+CVE-2024-3143 (A vulnerability was found in DedeCMS 5.7. It has been 
classified as pr ...)
+       TODO: check
+CVE-2024-3142 (A vulnerability was found in Clavister E10 and E80 up to 
20240323 and  ...)
+       TODO: check
+CVE-2024-3141 (A vulnerability has been found in Clavister E10 and E80 up to 
20240323 ...)
+       TODO: check
+CVE-2024-3140 (A vulnerability, which was classified as problematic, was found 
in Sou ...)
+       TODO: check
+CVE-2024-3139 (A vulnerability, which was classified as critical, has been 
found in S ...)
+       TODO: check
+CVE-2024-3138 (** DISPUTED ** A vulnerability was found in francoisjacquet 
RosarioSIS ...)
+       TODO: check
+CVE-2024-3137 (Improper Privilege Management in uvdesk/community-skeleton)
+       TODO: check
+CVE-2024-31005 (An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker 
to execu ...)
+       TODO: check
+CVE-2024-31004 (An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker 
to execu ...)
+       TODO: check
+CVE-2024-31003 (Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 
allows a rem ...)
+       TODO: check
+CVE-2024-31002 (Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 
allows a rem ...)
+       TODO: check
+CVE-2024-2925 (The Beaver Builder \u2013 WordPress Page Builder plugin for 
WordPress  ...)
+       TODO: check
+CVE-2024-2924 (The Creative Addons for Elementor plugin for WordPress is 
vulnerable t ...)
+       TODO: check
+CVE-2024-2839 (The Colibri Page Builder plugin for WordPress is vulnerable to 
Stored  ...)
+       TODO: check
+CVE-2024-2791 (The Metform Elementor Contact Form Builder plugin for WordPress 
is vul ...)
+       TODO: check
+CVE-2024-2369 (The Page Builder Gutenberg Blocks  WordPress plugin before 
3.1.7 does  ...)
+       TODO: check
+CVE-2024-29276 (An issue was discovered in seeyonOA version 8, allows remote 
attackers ...)
+       TODO: check
+CVE-2024-29086 (in OpenHarmony v3.2.4 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2024-29074 (in OpenHarmony v3.2.4 and prior versions allow a local 
attacker arbitr ...)
+       TODO: check
+CVE-2024-28951 (in OpenHarmony v4.0.0 and prior versions allow a local 
attacker arbitr ...)
+       TODO: check
+CVE-2024-28226 (in OpenHarmony v4.0.0 and prior versions allow a remote 
attacker cause ...)
+       TODO: check
+CVE-2024-27334 (Kofax Power PDF JPG File Parsing Out-Of-Bounds Read 
Information Disclo ...)
+       TODO: check
+CVE-2024-27333 (Kofax Power PDF GIF File Parsing Out-Of-Bounds Read 
Information Disclo ...)
+       TODO: check
+CVE-2024-27332 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27331 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27330 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27329 (PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27328 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27327 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote 
Code Ex ...)
+       TODO: check
+CVE-2024-27326 (PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27325 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27324 (PDF-XChange Editor TIF File Parsing Out-Of-Bounds Read 
Information Dis ...)
+       TODO: check
+CVE-2024-27323 (PDF-XChange Editor Updater Improper Certificate Validation 
Remote Code ...)
+       TODO: check
+CVE-2024-26684 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26683 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-26682 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-26681 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26680 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26679 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-26678 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-26677 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
+       TODO: check
+CVE-2024-26676 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
+       TODO: check
+CVE-2024-26675 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-26674 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-26673 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26672 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26671 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-26670 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
+       TODO: check
+CVE-2024-26669 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26668 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-26667 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26666 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-26665 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
+       TODO: check
+CVE-2024-26664 (In the Linux kernel, the following vulnerability has been 
resolved:  h ...)
+       TODO: check
+CVE-2024-26663 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
+       TODO: check
+CVE-2024-26662 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26661 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26660 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26659 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-26658 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-26657 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-26656 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-25187 (Server Side Request Forgery (SSRF) vulnerability in 71cms 
v1.0.0, allo ...)
+       TODO: check
+CVE-2024-24581 (in OpenHarmony v4.0.0 and prior versions allow a local 
attacker arbitr ...)
+       TODO: check
+CVE-2024-23119 (Centreon insertGraphTemplate SQL Injection Remote Code 
Execution Vulne ...)
+       TODO: check
+CVE-2024-23118 (Centreon updateContactHostCommands SQL Injection Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-23117 (Centreon updateContactServiceCommands SQL Injection Remote 
Code Execut ...)
+       TODO: check
+CVE-2024-23116 (Centreon updateLCARelation SQL Injection Remote Code Execution 
Vulnera ...)
+       TODO: check
+CVE-2024-23115 (Centreon updateGroups SQL Injection Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-22180 (in OpenHarmony v4.0.0 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2024-22177 (in OpenHarmony v3.2.4 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2024-22098 (in OpenHarmony v3.2.4 and prior versions allow a local 
attacker arbitr ...)
+       TODO: check
+CVE-2024-22092 (in OpenHarmony v3.2.4 and prior versions allow a remote 
attacker bypas ...)
+       TODO: check
+CVE-2024-21834 (in OpenHarmony v3.2.4 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2024-20854 (Improper handling of insufficient privileges vulnerability in 
Samsung  ...)
+       TODO: check
+CVE-2024-20853 (Improper verification of intent by broadcast receiver 
vulnerability in ...)
+       TODO: check
+CVE-2024-20852 (Improper verification of intent by broadcast receiver 
vulnerability in ...)
+       TODO: check
+CVE-2024-20851 (Improper access control vulnerability in Samsung Data Store 
prior to v ...)
+       TODO: check
+CVE-2024-20850 (Use of Implicit Intent for Sensitive Communication in Samsung 
Pay prio ...)
+       TODO: check
+CVE-2024-20849 (Out-of-bound Write vulnerability in chunk parsing 
implementation of li ...)
+       TODO: check
+CVE-2024-20848 (Out-of-bound Write vulnerability in text parsing 
implementation of lib ...)
+       TODO: check
+CVE-2024-20847 (Improper Access Control vulnerability in StorageManagerService 
prior t ...)
+       TODO: check
+CVE-2024-20846 (Out-of-bounds write vulnerability while decoding hcr of 
libsavsac.so p ...)
+       TODO: check
+CVE-2024-20845 (Out-of-bounds write vulnerability while releasing memory in 
libsavsac. ...)
+       TODO: check
+CVE-2024-20844 (Out-of-bounds write vulnerability while parsing remaining 
codewords in ...)
+       TODO: check
+CVE-2024-20843 (Out-of-bound write vulnerability in command parsing 
implementation of  ...)
+       TODO: check
+CVE-2024-20842 (Improper Input Validation vulnerability in handling apdu of 
libsec-ril ...)
+       TODO: check
+CVE-2024-20799 (Adobe Experience Manager versions 6.5.19 and earlier are 
affected by a ...)
+       TODO: check
+CVE-2024-1863 (Sante PACS Server Token Endpoint SQL Injection Remote Code 
Execution V ...)
+       TODO: check
+CVE-2024-1504 (The SecuPress Free \u2014 WordPress Security plugin for 
WordPress is v ...)
+       TODO: check
+CVE-2024-1274 (The My Calendar WordPress plugin before 3.4.24 does not 
sanitise and e ...)
+       TODO: check
+CVE-2024-1179 (TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer 
Overflow  ...)
+       TODO: check
+CVE-2024-0637 (Centreon updateDirectory SQL Injection Remote Code Execution 
Vulnerabi ...)
+       TODO: check
+CVE-2023-52636 (In the Linux kernel, the following vulnerability has been 
resolved:  l ...)
+       TODO: check
+CVE-2023-52635 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
+       TODO: check
+CVE-2023-52634 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52633 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2023-52632 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52631 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2023-52630 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2023-51573 (Voltronic Power ViewPower Pro updateManagerPassword Exposed 
Dangerous  ...)
+       TODO: check
+CVE-2023-51572 (Voltronic Power ViewPower Pro getMacAddressByIp Command 
Injection Remo ...)
+       TODO: check
+CVE-2023-51571 (Voltronic Power ViewPower Pro SocketService Missing 
Authentication Den ...)
+       TODO: check
+CVE-2023-51570 (Voltronic Power ViewPower Pro Deserialization of Untrusted 
Data Remote ...)
+       TODO: check
 CVE-2024-28219
        - pillow <unfixed>
        NOTE: 
https://pillow.readthedocs.io/en/stable/releasenotes/10.3.0.html#security
@@ -3010,7 +3234,7 @@ CVE-2024-29419 (There is a Cross-site scripting (XSS) 
vulnerability in the Wirel
        NOT-FOR-US: TOTOLINK
 CVE-2024-28868 (Umbraco is an ASP.NET content management system. Umbraco 10 
prior to 1 ...)
        NOT-FOR-US: Umbraco
-CVE-2024-28735 (An incorrect access control issue in Unit4 Financials by Coda 
v.2023Q4 ...)
+CVE-2024-28735 (Unit4 Financials by Coda versions prior to 2023Q4 suffer from 
an incor ...)
        NOT-FOR-US: Unit4 Financials by Coda
 CVE-2024-28396 (An issue in MyPrestaModules ordersexport v.6.0.2 and before 
allows a r ...)
        NOT-FOR-US: PrestaShop module
@@ -3481,7 +3705,7 @@ CVE-2024-29089 (Improper Neutralization of Input During 
Web Page Generation ('Cr
        NOT-FOR-US: WordPress plugin
 CVE-2024-29027 (Parse Server is an open source backend that can be deployed to 
any inf ...)
        NOT-FOR-US: Parse Server
-CVE-2024-28734 (Cross Site Scripting vulnerability in Unit4 Financials by Coda 
v.2024Q ...)
+CVE-2024-28734 (Cross Site Scripting vulnerability in Unit4 Financials by Coda 
prior t ...)
        NOT-FOR-US: Unit4 Financials by Coda
 CVE-2024-28595 (SQL Injection vulnerability in Employee Management System v1.0 
allows  ...)
        NOT-FOR-US: Employee Management System
@@ -13646,7 +13870,7 @@ CVE-2024-1312 (A use-after-free flaw was found in the 
Linux kernel's Memory Mana
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/657b5146955eba331e01b9a6ae89ce2e716ba306 (6.5-rc4)
-CVE-2024-1300
+CVE-2024-1300 (A vulnerability in the Eclipse Vert.x toolkit causes a memory 
leak in  ...)
        NOT-FOR-US: Eclipse Vertx
 CVE-2024-1066 (An issue has been discovered in GitLab EE affecting all 
versions from  ...)
        - gitlab 16.6.7-1
@@ -135441,7 +135665,7 @@ CVE-2022-31631
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=81740
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/921b6813da3237a83e908998483f46ae3d8bacba 
(php-8.0.27)
        NOTE: Improvement: 
https://github.com/php/php-src/commit/a6a80eefe0413c91acd922bc58590a4db7979af0
-CVE-2022-31630 (In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using 
imagelo ...)
+CVE-2022-31630 (In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using 
imagelo ...)
        {DSA-5277-1}
        - php8.1 8.1.12-1
        - php7.4 <removed>



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/861da87f37247b3a1c731cf0d9cae37a94392e6c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/861da87f37247b3a1c731cf0d9cae37a94392e6c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to