Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
6d614d57 by security tracker role at 2024-05-17T20:12:26+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,565 @@
+CVE-2024-5072 (Improper input validation in PAM JIT elevation feature in
Devolutions ...)
+ TODO: check
+CVE-2024-5066 (A vulnerability classified as critical was found in PHPGurukul
Online ...)
+ TODO: check
+CVE-2024-5065 (A vulnerability classified as critical has been found in
PHPGurukul On ...)
+ TODO: check
+CVE-2024-5064 (A vulnerability was found in PHPGurukul Online Course
Registration Sys ...)
+ TODO: check
+CVE-2024-5063 (A vulnerability was found in PHPGurukul Online Course
Registration Sys ...)
+ TODO: check
+CVE-2024-5055 (Uncontrolled resource consumption vulnerability in XAMPP
Windows, vers ...)
+ TODO: check
+CVE-2024-5052 (Denial of Service (DoS) vulnerability for Cerberus Enterprise
8.0.10.3 ...)
+ TODO: check
+CVE-2024-5051 (A vulnerability has been found in SourceCodester Gas Agency
Management ...)
+ TODO: check
+CVE-2024-5050 (A vulnerability, which was classified as critical, was found in
Wangsh ...)
+ TODO: check
+CVE-2024-5049 (A vulnerability, which was classified as critical, has been
found in C ...)
+ TODO: check
+CVE-2024-5048 (A vulnerability classified as critical was found in
code-projects Budg ...)
+ TODO: check
+CVE-2024-5047 (A vulnerability classified as critical has been found in
SourceCodeste ...)
+ TODO: check
+CVE-2024-5046 (A vulnerability was found in SourceCodester Online Examination
System ...)
+ TODO: check
+CVE-2024-5045 (A vulnerability was found in SourceCodester Online Birth
Certificate M ...)
+ TODO: check
+CVE-2024-5044 (A vulnerability was found in Emlog Pro 2.3.4. It has been
classified a ...)
+ TODO: check
+CVE-2024-5043 (A vulnerability was found in Emlog Pro 2.3.4 and classified as
critica ...)
+ TODO: check
+CVE-2024-5042 (A flaw was found in the Submariner project. Due to unnecessary
role-ba ...)
+ TODO: check
+CVE-2024-5022 (The file scheme of URLs would be hidden, resulting in potential
spoofi ...)
+ TODO: check
+CVE-2024-4998
+ REJECTED
+CVE-2024-4789 (Cost Calculator Builder Pro plugin for WordPress is vulnerable
to Serv ...)
+ TODO: check
+CVE-2024-4214 (Improper Neutralization of Script-Related HTML Tags in a Web
Page (Bas ...)
+ TODO: check
+CVE-2024-3292 (A race condition vulnerability exists where an authenticated,
local at ...)
+ TODO: check
+CVE-2024-3291 (When installing Nessus Agent to a directory outside of the
default loc ...)
+ TODO: check
+CVE-2024-3290 (A race condition vulnerability exists where an authenticated,
local at ...)
+ TODO: check
+CVE-2024-3289 (When installing Nessus to a directory outside of the default
location ...)
+ TODO: check
+CVE-2024-35859 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35858 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35857 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35856 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-35855 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35854 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35853 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35852 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35851 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-35850 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-35849 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35848 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
+ TODO: check
+CVE-2024-35847 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35846 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35845 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-35844 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-35843 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35842 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2024-35841 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35840 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35839 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35838 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-35837 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35836 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35835 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35834 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
+ TODO: check
+CVE-2024-35833 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35832 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35831 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35830 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35829 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35828 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-35827 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35826 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35825 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-35824 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35823 (In the Linux kernel, the following vulnerability has been
resolved: v ...)
+ TODO: check
+CVE-2024-35822 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-35821 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-35820 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-35819 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-35818 (In the Linux kernel, the following vulnerability has been
resolved: L ...)
+ TODO: check
+CVE-2024-35817 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35816 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-35815 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-35814 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-35813 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35812 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-35811 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-35810 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35809 (In the Linux kernel, the following vulnerability has been
resolved: P ...)
+ TODO: check
+CVE-2024-35808 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35807 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
+ TODO: check
+CVE-2024-35806 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
+ TODO: check
+CVE-2024-35805 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35804 (In the Linux kernel, the following vulnerability has been
resolved: K ...)
+ TODO: check
+CVE-2024-35803 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
+ TODO: check
+CVE-2024-35802 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
+ TODO: check
+CVE-2024-35801 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
+ TODO: check
+CVE-2024-35800 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
+ TODO: check
+CVE-2024-35799 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35798 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35797 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35796 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-35795 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35794 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35793 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35792 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-35791 (In the Linux kernel, the following vulnerability has been
resolved: K ...)
+ TODO: check
+CVE-2024-35790 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-35789 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-35788 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35787 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-35786 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-35785 (In the Linux kernel, the following vulnerability has been
resolved: t ...)
+ TODO: check
+CVE-2024-35784 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2024-35190 (Asterisk is an open source private branch exchange and
telephony toolk ...)
+ TODO: check
+CVE-2024-35174 (Missing Authorization vulnerability in Flothemes Flo
Forms.This issue ...)
+ TODO: check
+CVE-2024-35173 (Missing Authorization vulnerability in PluginEver Serial
Numbers for W ...)
+ TODO: check
+CVE-2024-34997 (joblib v1.4.2 was discovered to contain a deserialization
vulnerabilit ...)
+ TODO: check
+CVE-2024-34982 (An arbitrary file upload vulnerability in the component
/include/file. ...)
+ TODO: check
+CVE-2024-34959 (DedeCMS V5.7.113 is vulnerable to Cross Site Scripting (XSS)
via sys_d ...)
+ TODO: check
+CVE-2024-34919 (An arbitrary file upload vulnerability in the component
\modstudent\co ...)
+ TODO: check
+CVE-2024-34809 (Cross-Site Request Forgery (CSRF) vulnerability in Extend
Themes Empow ...)
+ TODO: check
+CVE-2024-34807 (Cross-Site Request Forgery (CSRF) vulnerability in CodeBard
Fast Custo ...)
+ TODO: check
+CVE-2024-34806 (Cross-Site Request Forgery (CSRF) vulnerability in Creative
Motion Cle ...)
+ TODO: check
+CVE-2024-34756 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks
Integrati ...)
+ TODO: check
+CVE-2024-34755 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks
Integrati ...)
+ TODO: check
+CVE-2024-34434 (Incorrect Authorization vulnerability in realmag777 WordPress
Meta Dat ...)
+ TODO: check
+CVE-2024-34370 (Improper Privilege Management vulnerability in WPFactory EAN
for WooCo ...)
+ TODO: check
+CVE-2024-34241 (A cross-site scripting (XSS) vulnerability in Rocketsoft
Rocket LMS 1. ...)
+ TODO: check
+CVE-2024-34058 (The WebTop package for NethServer 7 and 8 allows stored XSS
(for examp ...)
+ TODO: check
+CVE-2024-33917 (Authentication Bypass by Spoofing vulnerability in
webtechideas WTI Li ...)
+ TODO: check
+CVE-2024-33644 (Improper Control of Generation of Code ('Code Injection')
vulnerabilit ...)
+ TODO: check
+CVE-2024-33569 (Improper Privilege Management vulnerability in Darren Cooney
Instant I ...)
+ TODO: check
+CVE-2024-33567 (Improper Privilege Management vulnerability in UkrSolution
Barcode Sca ...)
+ TODO: check
+CVE-2024-33552 (Improper Privilege Management vulnerability in 8theme XStore
Core allo ...)
+ TODO: check
+CVE-2024-33550 (Improper Privilege Management vulnerability in JR King/Eran
Schoellhor ...)
+ TODO: check
+CVE-2024-33549 (Improper Privilege Management vulnerability in AA-Team WZone
allows Pr ...)
+ TODO: check
+CVE-2024-32960 (Improper Privilege Management vulnerability in Booking Ultra
Pro allow ...)
+ TODO: check
+CVE-2024-32959 (Improper Privilege Management vulnerability in Sirv allows
Privilege E ...)
+ TODO: check
+CVE-2024-32830 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-32827 (Authentication Bypass by Spoofing vulnerability in RafflePress
Giveawa ...)
+ TODO: check
+CVE-2024-32809 (Unrestricted Upload of File with Dangerous Type vulnerability
in JumpD ...)
+ TODO: check
+CVE-2024-32802 (Missing Authorization vulnerability in WordPlus BP Better
Messages all ...)
+ TODO: check
+CVE-2024-32790 (Improper Neutralization of Script-Related HTML Tags in a Web
Page (Bas ...)
+ TODO: check
+CVE-2024-32786 (Authentication Bypass by Spoofing vulnerability in WP Royal
Royal Elem ...)
+ TODO: check
+CVE-2024-32774 (Improper Restriction of Excessive Authentication Attempts
vulnerabilit ...)
+ TODO: check
+CVE-2024-32720 (Improper Restriction of Excessive Authentication Attempts
vulnerabilit ...)
+ TODO: check
+CVE-2024-32708 (Authentication Bypass by Spoofing vulnerability in helderk
Maintenance ...)
+ TODO: check
+CVE-2024-32692 (Missing Authorization vulnerability in QuanticaLabs Chauffeur
Taxi Boo ...)
+ TODO: check
+CVE-2024-32685 (Client-Side Enforcement of Server-Side Security vulnerability
in Wpmet ...)
+ TODO: check
+CVE-2024-32680 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-32523 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-32521 (Client-Side Enforcement of Server-Side Security vulnerability
in Highf ...)
+ TODO: check
+CVE-2024-32512 (Client-Side Enforcement of Server-Side Security vulnerability
in weFor ...)
+ TODO: check
+CVE-2024-32511 (Improper Privilege Management vulnerability in Astoundify
Simple Regis ...)
+ TODO: check
+CVE-2024-32507 (Improper Privilege Management vulnerability in Hamid Alinia
\u2013 ide ...)
+ TODO: check
+CVE-2024-32131 (Exposure of Sensitive Information to an Unauthorized Actor
vulnerabili ...)
+ TODO: check
+CVE-2024-31974 (The com.solarized.firedown (aka Solarized FireDown Browser &
Downloade ...)
+ TODO: check
+CVE-2024-31341 (Insufficient Verification of Data Authenticity vulnerability
in Cozmos ...)
+ TODO: check
+CVE-2024-31300 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-31295 (Guessable CAPTCHA vulnerability in BestWebSoft Captcha by
BestWebSoft ...)
+ TODO: check
+CVE-2024-31290 (Improper Privilege Management vulnerability in CodeRevolution
Demo My ...)
+ TODO: check
+CVE-2024-31281 (Missing Authorization vulnerability in Andy Moyle Church Admin
church- ...)
+ TODO: check
+CVE-2024-31237 (Improper Privilege Management vulnerability in WP Sharks
s2Member Pro ...)
+ TODO: check
+CVE-2024-31232 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-31231 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-30542 (Improper Privilege Management vulnerability in Wholesale
WholesaleX al ...)
+ TODO: check
+CVE-2024-30540 (Guessable CAPTCHA vulnerability in Guido VS Contact Form
allows Functi ...)
+ TODO: check
+CVE-2024-30527 (Improper Validation of Specified Quantity in Input
vulnerability in Ti ...)
+ TODO: check
+CVE-2024-30522 (Authentication Bypass by Spoofing vulnerability in Stefano
Lissa & The ...)
+ TODO: check
+CVE-2024-30509 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-30480 (Authentication Bypass by Spoofing vulnerability in Pippin
Williamson C ...)
+ TODO: check
+CVE-2024-30479 (Authentication Bypass by Spoofing vulnerability in LionScripts
IP Bloc ...)
+ TODO: check
+CVE-2024-27971 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-27955 (Cross-Site Request Forgery (CSRF) vulnerability in WP
Automatic Automa ...)
+ TODO: check
+CVE-2024-27954 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-27436 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2024-27435 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27434 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-27433 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-27432 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27431 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2024-27430 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27429 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27428 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27427 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27426 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27425 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27424 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27423 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27422 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27421 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27420 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27419 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27418 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27417 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
+ TODO: check
+CVE-2024-27416 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
+ TODO: check
+CVE-2024-27415 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27414 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
+ TODO: check
+CVE-2024-27413 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
+ TODO: check
+CVE-2024-27412 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2024-27411 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-27410 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2024-27409 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-27408 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2024-27407 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2024-27406 (In the Linux kernel, the following vulnerability has been
resolved: l ...)
+ TODO: check
+CVE-2024-27405 (In the Linux kernel, the following vulnerability has been
resolved: u ...)
+ TODO: check
+CVE-2024-27404 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2024-27403 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2024-27402 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2024-25906 (Authentication Bypass by Spoofing vulnerability in WP Happy
Coders Com ...)
+ TODO: check
+CVE-2024-25595 (Authentication Bypass by Spoofing vulnerability in WPMU DEV
Defender S ...)
+ TODO: check
+CVE-2024-24934 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-24882 (Improper Privilege Management vulnerability in Masteriyo LMS
allows Pr ...)
+ TODO: check
+CVE-2024-24874 (Improper Neutralization of Script-Related HTML Tags in a Web
Page (Bas ...)
+ TODO: check
+CVE-2024-24873 (: Improper Control of Interaction Frequency vulnerability in
CodePeopl ...)
+ TODO: check
+CVE-2024-24869 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-24715 (Improper Validation of Specified Quantity in Input
vulnerability in Th ...)
+ TODO: check
+CVE-2024-23522 (Improper Neutralization of Script-Related HTML Tags in a Web
Page (Bas ...)
+ TODO: check
+CVE-2024-22429 (Dell BIOS contains an Improper Input Validation vulnerability.
A local ...)
+ TODO: check
+CVE-2024-22157 (Improper Privilege Management vulnerability in WebWizards
SalesKing al ...)
+ TODO: check
+CVE-2024-22145 (Improper Privilege Management vulnerability in InstaWP Team
InstaWP Co ...)
+ TODO: check
+CVE-2024-22139 (Authentication Bypass by Spoofing vulnerability in Filipe
Seabra WordP ...)
+ TODO: check
+CVE-2024-22120 (Zabbix server can perform command execution for configured
scripts. Af ...)
+ TODO: check
+CVE-2024-21746 (Authentication Bypass by Spoofing vulnerability in Wpmet Wp
Ultimate R ...)
+ TODO: check
+CVE-2023-5597 (A stored Cross-site Scripting (XSS) vulnerability affecting
3DDashboar ...)
+ TODO: check
+CVE-2023-52698 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2023-52697 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52696 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52695 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52694 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52693 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52692 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52691 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52690 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52689 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52688 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
+ TODO: check
+CVE-2023-52687 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2023-52686 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52685 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52684 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2023-52683 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52682 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ TODO: check
+CVE-2023-52681 (In the Linux kernel, the following vulnerability has been
resolved: e ...)
+ TODO: check
+CVE-2023-52680 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52679 (In the Linux kernel, the following vulnerability has been
resolved: o ...)
+ TODO: check
+CVE-2023-52678 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52677 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
+ TODO: check
+CVE-2023-52676 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2023-52675 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52674 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52673 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52672 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52671 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52670 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
+ TODO: check
+CVE-2023-52669 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
+ TODO: check
+CVE-2023-52668 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
+ TODO: check
+CVE-2023-52667 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2023-52666 (In the Linux kernel, the following vulnerability has been
resolved: k ...)
+ TODO: check
+CVE-2023-52665 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
+ TODO: check
+CVE-2023-52664 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
+ TODO: check
+CVE-2023-52663 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
+ TODO: check
+CVE-2023-52662 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52661 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
+ TODO: check
+CVE-2023-52660 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
+ TODO: check
+CVE-2023-52659 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
+ TODO: check
+CVE-2023-52658 (In the Linux kernel, the following vulnerability has been
resolved: R ...)
+ TODO: check
+CVE-2023-52657 (In the Linux kernel, the following vulnerability has been
resolved: R ...)
+ TODO: check
+CVE-2023-51546 (Improper Privilege Management vulnerability in WebToffee
WooCommerce P ...)
+ TODO: check
+CVE-2023-51483 (Improper Privilege Management vulnerability in Glowlogix WP
Frontend P ...)
+ TODO: check
+CVE-2023-51481 (Improper Privilege Management vulnerability in powerfulwp
Local Delive ...)
+ TODO: check
+CVE-2023-51479 (Improper Privilege Management vulnerability in Abdul Hakeem
Build App ...)
+ TODO: check
+CVE-2023-51476 (Improper Privilege Management vulnerability in IOSS WP MLM
Unilevel al ...)
+ TODO: check
+CVE-2023-51424 (Improper Privilege Management vulnerability in Saleswonder
Team Webina ...)
+ TODO: check
+CVE-2023-51401 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-51398 (Improper Privilege Management vulnerability in Brainstorm
Force Ultima ...)
+ TODO: check
+CVE-2023-51356 (Improper Privilege Management vulnerability in Repute
Infosystems ARMe ...)
+ TODO: check
+CVE-2023-50890 (Improper Privilege Management vulnerability in Brainstorm
Force Ultima ...)
+ TODO: check
+CVE-2023-49753 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-48757 (Improper Privilege Management vulnerability in Crocoblock
JetEngine al ...)
+ TODO: check
+CVE-2023-48319 (Improper Privilege Management vulnerability in Salon Booking
System Sa ...)
+ TODO: check
+CVE-2023-47868 (Improper Privilege Management vulnerability in wpForo wpForo
Forum all ...)
+ TODO: check
+CVE-2023-47782 (Improper Privilege Management vulnerability in Thrive Themes
Thrive Th ...)
+ TODO: check
+CVE-2023-47683 (Improper Privilege Management vulnerability in miniOrange
WordPress So ...)
+ TODO: check
+CVE-2023-47682 (Improper Privilege Management vulnerability in weDevs WP User
Frontend ...)
+ TODO: check
+CVE-2023-47679 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-47178 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-46784 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-46205 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-46197 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-46145 (Improper Privilege Management vulnerability in Themify Themify
Ultra a ...)
+ TODO: check
+CVE-2023-45652 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2023-44478 (Cross-Site Request Forgery (CSRF) vulnerability in WP Hive
Events Rich ...)
+ TODO: check
CVE-2024-4204 (The Bulk Posts Editing For WordPress plugin for WordPress is
vulnerabl ...)
NOT-FOR-US: WordPress plugin
CVE-2024-3609 (The ReviewX \u2013 Multi-criteria Rating & Reviews for
WooCommerce plu ...)
@@ -285,18 +847,22 @@ CVE-2024-4960 (** UNSUPPORTED WHEN ASSIGNED ** A
vulnerability classified as cri
CVE-2024-4956 (Path Traversal in Sonatype Nexus Repository 3 allows an
unauthenticate ...)
NOT-FOR-US: Sonatype Nexus Repository
CVE-2024-4950 (Inappropriate implementation in Downloads in Google Chrome
prior to 12 ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4949 (Use after free in V8 in Google Chrome prior to 125.0.6422.60
allowed a ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4948 (Use after free in Dawn in Google Chrome prior to 125.0.6422.60
allowed ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4947 (Type Confusion in V8 in Google Chrome prior to 125.0.6422.60
allowed a ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
@@ -1248,7 +1814,7 @@ CVE-2024-4778 (Memory safety bugs present in Firefox 125.
Some of these bugs sho
- firefox 126.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4778
CVE-2024-4777 (Memory safety bugs present in Firefox 125, Firefox ESR 115.10,
and Thu ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1274,7 +1840,7 @@ CVE-2024-4771 (A memory allocation check was missing
which would lead to a use-a
- firefox 126.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4771
CVE-2024-4770 (When saving a page to PDF, certain font styles could have led
to a pot ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1282,7 +1848,7 @@ CVE-2024-4770 (When saving a page to PDF, certain font
styles could have led to
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4770
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
CVE-2024-4769 (When importing resources using Web Workers, error messages
would disti ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1290,7 +1856,7 @@ CVE-2024-4769 (When importing resources using Web
Workers, error messages would
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4769
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
CVE-2024-4768 (A bug in popup notifications' interaction with WebAuthn made it
easier ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1298,7 +1864,7 @@ CVE-2024-4768 (A bug in popup notifications' interaction
with WebAuthn made it e
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4768
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4768
CVE-2024-4767 (If the `browser.privatebrowsing.autostart` preference is
enabled, Inde ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1312,7 +1878,7 @@ CVE-2024-4765 (Web application manifests were stored by
using an insecure MD5 ha
- firefox <not-affected> (Android-specific)
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4765
CVE-2024-4367 (A type check was missing when handling fonts in PDF.js, which
would al ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -29002,7 +29568,7 @@ CVE-2023-6516 (To keep its cache database efficient,
`named` running as a recurs
NOTE: Issue is specific to 9.16.y. Mark the first version from 9.17.y
series
NOTE: which entered unstable as the fixed version as workaround.
CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034,
4035, 6 ...)
- {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+ {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
- bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
@@ -29044,7 +29610,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS
protocol (in RFC 4033, 4034, 4
NOTE:
https://github.com/systemd/systemd-stable/commit/b43bcb51ebf9aea21b1e280e1872056994e3f53d
(v252.23)
NOTE: systemd: DNSSEC is default to off in systemd-resolved
CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC
5155 whe ...)
- {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+ {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
- bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
@@ -247570,8 +248136,8 @@ CVE-2021-22510 (Reflected XSS vulnerability in Micro
Focus Application Automatio
NOT-FOR-US: Jenkins plugin
CVE-2021-22509
RESERVED
-CVE-2021-22508
- RESERVED
+CVE-2021-22508 (A potential vulnerability has been identified for OpenText
Operations ...)
+ TODO: check
CVE-2021-22507 (Authentication bypass vulnerability in Micro Focus Operations
Bridge M ...)
NOT-FOR-US: Micro Focus
CVE-2021-22506 (Advance configuration exposing Information Leakage
vulnerability in Mi ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c
--
This project does not include diff previews in email notifications.
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits