Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0e9c20f4 by security tracker role at 2024-04-18T20:11:51+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,193 @@
+CVE-2024-3948 (A vulnerability was found in SourceCodester Home Clean Service 
System  ...)
+       TODO: check
+CVE-2024-32689 (Missing Authorization vulnerability in GenialSouls WP Social 
Comments. ...)
+       TODO: check
+CVE-2024-32686 (Insertion of Sensitive Information into Log File vulnerability 
in Inis ...)
+       TODO: check
+CVE-2024-32604 (Authorization Bypass Through User-Controlled Key vulnerability 
in Plec ...)
+       TODO: check
+CVE-2024-32603 (Deserialization of Untrusted Data vulnerability in ThemeKraft 
WooBuddy ...)
+       TODO: check
+CVE-2024-32602 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-32601 (Missing Authorization vulnerability in WP OnlineSupport, 
Essential Plu ...)
+       TODO: check
+CVE-2024-32600 (Deserialization of Untrusted Data vulnerability in Averta 
Master Slide ...)
+       TODO: check
+CVE-2024-32599 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2024-32598 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32597 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32596 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32595 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32594 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32593 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32592 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32591 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32590 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32588 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32587 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32586 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32585 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32584 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32583 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32582 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32581 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32580 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32579 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32578 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32577 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32576 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32575 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32574 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32573 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32572 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32571 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32570 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32569 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32568 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32567 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32566 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32565 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32564 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32563 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32562 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32561 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32560 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32559 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32558 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32556 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32554 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32553 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32552 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-32551 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-32477 (Deno is a JavaScript, TypeScript, and WebAssembly runtime with 
secure  ...)
+       TODO: check
+CVE-2024-32475 (Envoy is a cloud-native, open source edge and service proxy. 
When an u ...)
+       TODO: check
+CVE-2024-32474 (Sentry is an error tracking and performance monitoring 
platform. Prior ...)
+       TODO: check
+CVE-2024-32470 (Tolgee is an open-source localization platform. When API key 
created b ...)
+       TODO: check
+CVE-2024-32466 (Tolgee is an open-source localization platform. For the 
`/v2/projects/ ...)
+       TODO: check
+CVE-2024-32462 (Flatpak is a system for building, distributing, and running 
sandboxed  ...)
+       TODO: check
+CVE-2024-32335 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store 
Cross-site scri ...)
+       TODO: check
+CVE-2024-32334 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store 
Cross-site scri ...)
+       TODO: check
+CVE-2024-32333 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store 
Cross-site scri ...)
+       TODO: check
+CVE-2024-32332 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store 
Cross-site scri ...)
+       TODO: check
+CVE-2024-32327 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store 
Cross-site scri ...)
+       TODO: check
+CVE-2024-32326 (TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site 
scripting  ...)
+       TODO: check
+CVE-2024-32325 (TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site 
scripting  ...)
+       TODO: check
+CVE-2024-32142 (Missing Authorization vulnerability in Ovic Team Ovic 
Responsive WPBak ...)
+       TODO: check
+CVE-2024-32126 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2024-31229 (Server-Side Request Forgery (SSRF) vulnerability in Really 
Simple Plug ...)
+       TODO: check
+CVE-2024-30564 (An issue inandrei-tatar nora-firebase-common between v.1.0.41 
and v.1. ...)
+       TODO: check
+CVE-2024-30257 (1Panel is an open source Linux server operation and 
maintenance manage ...)
+       TODO: check
+CVE-2024-2833 (The Jobs for WordPress plugin for WordPress is vulnerable to 
Reflected ...)
+       TODO: check
+CVE-2024-2796 (A server-side request forgery (SSRF) was discovered in the 
Akana Commu ...)
+       TODO: check
+CVE-2024-29987 (Microsoft Edge (Chromium-based) Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2024-29986 (Microsoft Edge for Android (Chromium-based) Information 
Disclosure Vul ...)
+       TODO: check
+CVE-2024-29021 (Judge0 is an open-source online code execution system. The 
default con ...)
+       TODO: check
+CVE-2024-29003 (The SolarWinds Platform was susceptible to a XSS vulnerability 
that af ...)
+       TODO: check
+CVE-2024-29001 (A SolarWinds Platform SWQL Injection Vulnerability was 
identified in t ...)
+       TODO: check
+CVE-2024-28189 (Judge0 is an open-source online code execution system. The 
application ...)
+       TODO: check
+CVE-2024-28185 (Judge0 is an open-source online code execution system. The 
application ...)
+       TODO: check
+CVE-2024-28076 (The SolarWinds Platform was susceptible to a Arbitrary Open 
Redirectio ...)
+       TODO: check
+CVE-2024-27306 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
+       TODO: check
+CVE-2024-24910 (A local attacker can escalate privileges on affected Check 
Point ZoneA ...)
+       TODO: check
+CVE-2024-23557 (HCL Connections contains a user enumeration vulnerability. 
Certain act ...)
+       TODO: check
+CVE-2024-20380 (A vulnerability in the HTML parser of ClamAV could allow an 
unauthenti ...)
+       TODO: check
+CVE-2023-6897 (The EAN for WooCommerce plugin for WordPress is vulnerable to 
Insecure ...)
+       TODO: check
+CVE-2023-6892 (The EAN for WooCommerce plugin for WordPress is vulnerable to 
Stored C ...)
+       TODO: check
+CVE-2023-50885 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-49768 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2023-49742 (Missing Authorization vulnerability in Support Genix.This 
issue affect ...)
+       TODO: check
+CVE-2023-47843 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-41864 (Cross-Site Request Forgery (CSRF) vulnerability in Pepro Dev. 
Group Pe ...)
+       TODO: check
+CVE-2023-3758 (A race condition flaw was found in sssd where the GPO policy is 
not co ...)
+       TODO: check
+CVE-2023-3675 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
 CVE-2024-XXXX [tryton zipbomb DoS]
        - tryton-server 6.0.45-1
        [bookworm] - tryton-server <no-dsa> (Minor issue)
@@ -8,7 +198,7 @@ CVE-2024-3246
        - flatpak <unfixed>
        NOTE: https://www.openwall.com/lists/oss-security/2024/04/18/5
        NOTE: 
https://github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj
-CVE-2024-26921 [inet: inet_defrag: prevent sk release while still in use]
+CVE-2024-26921 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux <unfixed>
        [bookworm] - linux 6.1.85-1
        NOTE: 
https://git.kernel.org/linus/18685451fc4e546fc0e718580d32df3c0e5c8272 (6.9-rc2)
@@ -1023,7 +1213,8 @@ CVE-2024-22354 (IBM WebSphere Application Server 8.5, 9.0 
and IBM WebSphere Appl
        NOT-FOR-US: IBM
 CVE-2024-22329 (IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere 
Applicatio ...)
        NOT-FOR-US: IBM
-CVE-2024-21676 (This High severity Injection vulnerability was introduced in 
versions  ...)
+CVE-2024-21676
+       REJECTED
        NOT-FOR-US: Atlassian
 CVE-2024-21121 (Vulnerability in the Oracle VM VirtualBox product of Oracle 
Virtualiza ...)
        - virtualbox 7.0.16-dfsg-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e9c20f42a8634f063d8ed502e4de1cd236c52f3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e9c20f42a8634f063d8ed502e4de1cd236c52f3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to