Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6d614d57 by security tracker role at 2024-05-17T20:12:26+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,565 @@
+CVE-2024-5072 (Improper input validation in PAM JIT elevation feature in 
Devolutions  ...)
+       TODO: check
+CVE-2024-5066 (A vulnerability classified as critical was found in PHPGurukul 
Online  ...)
+       TODO: check
+CVE-2024-5065 (A vulnerability classified as critical has been found in 
PHPGurukul On ...)
+       TODO: check
+CVE-2024-5064 (A vulnerability was found in PHPGurukul Online Course 
Registration Sys ...)
+       TODO: check
+CVE-2024-5063 (A vulnerability was found in PHPGurukul Online Course 
Registration Sys ...)
+       TODO: check
+CVE-2024-5055 (Uncontrolled resource consumption vulnerability in XAMPP 
Windows, vers ...)
+       TODO: check
+CVE-2024-5052 (Denial of Service (DoS) vulnerability for Cerberus Enterprise 
8.0.10.3 ...)
+       TODO: check
+CVE-2024-5051 (A vulnerability has been found in SourceCodester Gas Agency 
Management ...)
+       TODO: check
+CVE-2024-5050 (A vulnerability, which was classified as critical, was found in 
Wangsh ...)
+       TODO: check
+CVE-2024-5049 (A vulnerability, which was classified as critical, has been 
found in C ...)
+       TODO: check
+CVE-2024-5048 (A vulnerability classified as critical was found in 
code-projects Budg ...)
+       TODO: check
+CVE-2024-5047 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
+       TODO: check
+CVE-2024-5046 (A vulnerability was found in SourceCodester Online Examination 
System  ...)
+       TODO: check
+CVE-2024-5045 (A vulnerability was found in SourceCodester Online Birth 
Certificate M ...)
+       TODO: check
+CVE-2024-5044 (A vulnerability was found in Emlog Pro 2.3.4. It has been 
classified a ...)
+       TODO: check
+CVE-2024-5043 (A vulnerability was found in Emlog Pro 2.3.4 and classified as 
critica ...)
+       TODO: check
+CVE-2024-5042 (A flaw was found in the Submariner project. Due to unnecessary 
role-ba ...)
+       TODO: check
+CVE-2024-5022 (The file scheme of URLs would be hidden, resulting in potential 
spoofi ...)
+       TODO: check
+CVE-2024-4998
+       REJECTED
+CVE-2024-4789 (Cost Calculator Builder Pro plugin for WordPress is vulnerable 
to Serv ...)
+       TODO: check
+CVE-2024-4214 (Improper Neutralization of Script-Related HTML Tags in a Web 
Page (Bas ...)
+       TODO: check
+CVE-2024-3292 (A race condition vulnerability exists where an authenticated, 
local at ...)
+       TODO: check
+CVE-2024-3291 (When installing Nessus Agent to a directory outside of the 
default loc ...)
+       TODO: check
+CVE-2024-3290 (A race condition vulnerability exists where an authenticated, 
local at ...)
+       TODO: check
+CVE-2024-3289 (When installing Nessus to a directory outside of the default 
location  ...)
+       TODO: check
+CVE-2024-35859 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35858 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35857 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35856 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-35855 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35854 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35853 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35852 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35851 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-35850 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-35849 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35848 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
+       TODO: check
+CVE-2024-35847 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35846 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35845 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-35844 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-35843 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35842 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2024-35841 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35840 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35839 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35838 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-35837 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35836 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35835 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35834 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-35833 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35832 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35831 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35830 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35829 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35828 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-35827 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35826 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35825 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-35824 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35823 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
+       TODO: check
+CVE-2024-35822 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-35821 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-35820 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-35819 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-35818 (In the Linux kernel, the following vulnerability has been 
resolved:  L ...)
+       TODO: check
+CVE-2024-35817 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35816 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-35815 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-35814 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-35813 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35812 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-35811 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-35810 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35809 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
+       TODO: check
+CVE-2024-35808 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35807 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
+       TODO: check
+CVE-2024-35806 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-35805 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35804 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
+       TODO: check
+CVE-2024-35803 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-35802 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-35801 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2024-35800 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
+       TODO: check
+CVE-2024-35799 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35798 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35797 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35796 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-35795 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35794 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35793 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35792 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-35791 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
+       TODO: check
+CVE-2024-35790 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-35789 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-35788 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35787 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-35786 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-35785 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
+       TODO: check
+CVE-2024-35784 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-35190 (Asterisk is an open source private branch exchange and 
telephony toolk ...)
+       TODO: check
+CVE-2024-35174 (Missing Authorization vulnerability in Flothemes Flo 
Forms.This issue  ...)
+       TODO: check
+CVE-2024-35173 (Missing Authorization vulnerability in PluginEver Serial 
Numbers for W ...)
+       TODO: check
+CVE-2024-34997 (joblib v1.4.2 was discovered to contain a deserialization 
vulnerabilit ...)
+       TODO: check
+CVE-2024-34982 (An arbitrary file upload vulnerability in the component 
/include/file. ...)
+       TODO: check
+CVE-2024-34959 (DedeCMS V5.7.113 is vulnerable to Cross Site Scripting (XSS) 
via sys_d ...)
+       TODO: check
+CVE-2024-34919 (An arbitrary file upload vulnerability in the component 
\modstudent\co ...)
+       TODO: check
+CVE-2024-34809 (Cross-Site Request Forgery (CSRF) vulnerability in Extend 
Themes Empow ...)
+       TODO: check
+CVE-2024-34807 (Cross-Site Request Forgery (CSRF) vulnerability in CodeBard 
Fast Custo ...)
+       TODO: check
+CVE-2024-34806 (Cross-Site Request Forgery (CSRF) vulnerability in Creative 
Motion Cle ...)
+       TODO: check
+CVE-2024-34756 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks 
Integrati ...)
+       TODO: check
+CVE-2024-34755 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks 
Integrati ...)
+       TODO: check
+CVE-2024-34434 (Incorrect Authorization vulnerability in realmag777 WordPress 
Meta Dat ...)
+       TODO: check
+CVE-2024-34370 (Improper Privilege Management vulnerability in WPFactory EAN 
for WooCo ...)
+       TODO: check
+CVE-2024-34241 (A cross-site scripting (XSS) vulnerability in Rocketsoft 
Rocket LMS 1. ...)
+       TODO: check
+CVE-2024-34058 (The WebTop package for NethServer 7 and 8 allows stored XSS 
(for examp ...)
+       TODO: check
+CVE-2024-33917 (Authentication Bypass by Spoofing vulnerability in 
webtechideas WTI Li ...)
+       TODO: check
+CVE-2024-33644 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2024-33569 (Improper Privilege Management vulnerability in Darren Cooney 
Instant I ...)
+       TODO: check
+CVE-2024-33567 (Improper Privilege Management vulnerability in UkrSolution 
Barcode Sca ...)
+       TODO: check
+CVE-2024-33552 (Improper Privilege Management vulnerability in 8theme XStore 
Core allo ...)
+       TODO: check
+CVE-2024-33550 (Improper Privilege Management vulnerability in JR King/Eran 
Schoellhor ...)
+       TODO: check
+CVE-2024-33549 (Improper Privilege Management vulnerability in AA-Team WZone 
allows Pr ...)
+       TODO: check
+CVE-2024-32960 (Improper Privilege Management vulnerability in Booking Ultra 
Pro allow ...)
+       TODO: check
+CVE-2024-32959 (Improper Privilege Management vulnerability in Sirv allows 
Privilege E ...)
+       TODO: check
+CVE-2024-32830 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-32827 (Authentication Bypass by Spoofing vulnerability in RafflePress 
Giveawa ...)
+       TODO: check
+CVE-2024-32809 (Unrestricted Upload of File with Dangerous Type vulnerability 
in JumpD ...)
+       TODO: check
+CVE-2024-32802 (Missing Authorization vulnerability in WordPlus BP Better 
Messages all ...)
+       TODO: check
+CVE-2024-32790 (Improper Neutralization of Script-Related HTML Tags in a Web 
Page (Bas ...)
+       TODO: check
+CVE-2024-32786 (Authentication Bypass by Spoofing vulnerability in WP Royal 
Royal Elem ...)
+       TODO: check
+CVE-2024-32774 (Improper Restriction of Excessive Authentication Attempts 
vulnerabilit ...)
+       TODO: check
+CVE-2024-32720 (Improper Restriction of Excessive Authentication Attempts 
vulnerabilit ...)
+       TODO: check
+CVE-2024-32708 (Authentication Bypass by Spoofing vulnerability in helderk 
Maintenance ...)
+       TODO: check
+CVE-2024-32692 (Missing Authorization vulnerability in QuanticaLabs Chauffeur 
Taxi Boo ...)
+       TODO: check
+CVE-2024-32685 (Client-Side Enforcement of Server-Side Security vulnerability 
in Wpmet ...)
+       TODO: check
+CVE-2024-32680 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-32523 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-32521 (Client-Side Enforcement of Server-Side Security vulnerability 
in Highf ...)
+       TODO: check
+CVE-2024-32512 (Client-Side Enforcement of Server-Side Security vulnerability 
in weFor ...)
+       TODO: check
+CVE-2024-32511 (Improper Privilege Management vulnerability in Astoundify 
Simple Regis ...)
+       TODO: check
+CVE-2024-32507 (Improper Privilege Management vulnerability in Hamid Alinia 
\u2013 ide ...)
+       TODO: check
+CVE-2024-32131 (Exposure of Sensitive Information to an Unauthorized Actor 
vulnerabili ...)
+       TODO: check
+CVE-2024-31974 (The com.solarized.firedown (aka Solarized FireDown Browser & 
Downloade ...)
+       TODO: check
+CVE-2024-31341 (Insufficient Verification of Data Authenticity vulnerability 
in Cozmos ...)
+       TODO: check
+CVE-2024-31300 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-31295 (Guessable CAPTCHA vulnerability in BestWebSoft Captcha by 
BestWebSoft  ...)
+       TODO: check
+CVE-2024-31290 (Improper Privilege Management vulnerability in CodeRevolution 
Demo My  ...)
+       TODO: check
+CVE-2024-31281 (Missing Authorization vulnerability in Andy Moyle Church Admin 
church- ...)
+       TODO: check
+CVE-2024-31237 (Improper Privilege Management vulnerability in WP Sharks 
s2Member Pro  ...)
+       TODO: check
+CVE-2024-31232 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-31231 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-30542 (Improper Privilege Management vulnerability in Wholesale 
WholesaleX al ...)
+       TODO: check
+CVE-2024-30540 (Guessable CAPTCHA vulnerability in Guido VS Contact Form 
allows Functi ...)
+       TODO: check
+CVE-2024-30527 (Improper Validation of Specified Quantity in Input 
vulnerability in Ti ...)
+       TODO: check
+CVE-2024-30522 (Authentication Bypass by Spoofing vulnerability in Stefano 
Lissa & The ...)
+       TODO: check
+CVE-2024-30509 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-30480 (Authentication Bypass by Spoofing vulnerability in Pippin 
Williamson C ...)
+       TODO: check
+CVE-2024-30479 (Authentication Bypass by Spoofing vulnerability in LionScripts 
IP Bloc ...)
+       TODO: check
+CVE-2024-27971 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-27955 (Cross-Site Request Forgery (CSRF) vulnerability in WP 
Automatic Automa ...)
+       TODO: check
+CVE-2024-27954 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-27436 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2024-27435 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27434 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-27433 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-27432 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27431 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2024-27430 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27429 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27428 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27427 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27426 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27425 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27424 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27423 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27422 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27421 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27420 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27419 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27418 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27417 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-27416 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-27415 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27414 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
+       TODO: check
+CVE-2024-27413 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
+       TODO: check
+CVE-2024-27412 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-27411 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-27410 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-27409 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-27408 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-27407 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2024-27406 (In the Linux kernel, the following vulnerability has been 
resolved:  l ...)
+       TODO: check
+CVE-2024-27405 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
+       TODO: check
+CVE-2024-27404 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-27403 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-27402 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-25906 (Authentication Bypass by Spoofing vulnerability in WP Happy 
Coders Com ...)
+       TODO: check
+CVE-2024-25595 (Authentication Bypass by Spoofing vulnerability in WPMU DEV 
Defender S ...)
+       TODO: check
+CVE-2024-24934 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-24882 (Improper Privilege Management vulnerability in Masteriyo LMS 
allows Pr ...)
+       TODO: check
+CVE-2024-24874 (Improper Neutralization of Script-Related HTML Tags in a Web 
Page (Bas ...)
+       TODO: check
+CVE-2024-24873 (: Improper Control of Interaction Frequency vulnerability in 
CodePeopl ...)
+       TODO: check
+CVE-2024-24869 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-24715 (Improper Validation of Specified Quantity in Input 
vulnerability in Th ...)
+       TODO: check
+CVE-2024-23522 (Improper Neutralization of Script-Related HTML Tags in a Web 
Page (Bas ...)
+       TODO: check
+CVE-2024-22429 (Dell BIOS contains an Improper Input Validation vulnerability. 
A local ...)
+       TODO: check
+CVE-2024-22157 (Improper Privilege Management vulnerability in WebWizards 
SalesKing al ...)
+       TODO: check
+CVE-2024-22145 (Improper Privilege Management vulnerability in InstaWP Team 
InstaWP Co ...)
+       TODO: check
+CVE-2024-22139 (Authentication Bypass by Spoofing vulnerability in Filipe 
Seabra WordP ...)
+       TODO: check
+CVE-2024-22120 (Zabbix server can perform command execution for configured 
scripts. Af ...)
+       TODO: check
+CVE-2024-21746 (Authentication Bypass by Spoofing vulnerability in Wpmet Wp 
Ultimate R ...)
+       TODO: check
+CVE-2023-5597 (A stored Cross-site Scripting (XSS) vulnerability affecting 
3DDashboar ...)
+       TODO: check
+CVE-2023-52698 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2023-52697 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52696 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52695 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52694 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52693 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52692 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52691 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52690 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52689 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52688 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2023-52687 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2023-52686 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52685 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52684 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2023-52683 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52682 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       TODO: check
+CVE-2023-52681 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
+       TODO: check
+CVE-2023-52680 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52679 (In the Linux kernel, the following vulnerability has been 
resolved:  o ...)
+       TODO: check
+CVE-2023-52678 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52677 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
+       TODO: check
+CVE-2023-52676 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2023-52675 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52674 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52673 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52672 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52671 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52670 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
+       TODO: check
+CVE-2023-52669 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
+       TODO: check
+CVE-2023-52668 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2023-52667 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2023-52666 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
+       TODO: check
+CVE-2023-52665 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2023-52664 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2023-52663 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2023-52662 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52661 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2023-52660 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2023-52659 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
+       TODO: check
+CVE-2023-52658 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2023-52657 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2023-51546 (Improper Privilege Management vulnerability in WebToffee 
WooCommerce P ...)
+       TODO: check
+CVE-2023-51483 (Improper Privilege Management vulnerability in Glowlogix WP 
Frontend P ...)
+       TODO: check
+CVE-2023-51481 (Improper Privilege Management vulnerability in powerfulwp 
Local Delive ...)
+       TODO: check
+CVE-2023-51479 (Improper Privilege Management vulnerability in Abdul Hakeem 
Build App  ...)
+       TODO: check
+CVE-2023-51476 (Improper Privilege Management vulnerability in IOSS WP MLM 
Unilevel al ...)
+       TODO: check
+CVE-2023-51424 (Improper Privilege Management vulnerability in Saleswonder 
Team Webina ...)
+       TODO: check
+CVE-2023-51401 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-51398 (Improper Privilege Management vulnerability in Brainstorm 
Force Ultima ...)
+       TODO: check
+CVE-2023-51356 (Improper Privilege Management vulnerability in Repute 
Infosystems ARMe ...)
+       TODO: check
+CVE-2023-50890 (Improper Privilege Management vulnerability in Brainstorm 
Force Ultima ...)
+       TODO: check
+CVE-2023-49753 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-48757 (Improper Privilege Management vulnerability in Crocoblock 
JetEngine al ...)
+       TODO: check
+CVE-2023-48319 (Improper Privilege Management vulnerability in Salon Booking 
System Sa ...)
+       TODO: check
+CVE-2023-47868 (Improper Privilege Management vulnerability in wpForo wpForo 
Forum all ...)
+       TODO: check
+CVE-2023-47782 (Improper Privilege Management vulnerability in Thrive Themes 
Thrive Th ...)
+       TODO: check
+CVE-2023-47683 (Improper Privilege Management vulnerability in miniOrange 
WordPress So ...)
+       TODO: check
+CVE-2023-47682 (Improper Privilege Management vulnerability in weDevs WP User 
Frontend ...)
+       TODO: check
+CVE-2023-47679 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-47178 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-46784 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-46205 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-46197 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-46145 (Improper Privilege Management vulnerability in Themify Themify 
Ultra a ...)
+       TODO: check
+CVE-2023-45652 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2023-44478 (Cross-Site Request Forgery (CSRF) vulnerability in WP Hive 
Events Rich ...)
+       TODO: check
 CVE-2024-4204 (The Bulk Posts Editing For WordPress plugin for WordPress is 
vulnerabl ...)
        NOT-FOR-US: WordPress plugin
 CVE-2024-3609 (The ReviewX \u2013 Multi-criteria Rating & Reviews for 
WooCommerce plu ...)
@@ -285,18 +847,22 @@ CVE-2024-4960 (** UNSUPPORTED WHEN ASSIGNED ** A 
vulnerability classified as cri
 CVE-2024-4956 (Path Traversal in Sonatype Nexus Repository 3 allows an 
unauthenticate ...)
        NOT-FOR-US: Sonatype Nexus Repository
 CVE-2024-4950 (Inappropriate implementation in Downloads in Google Chrome 
prior to 12 ...)
+       {DSA-5694-1}
        - chromium 125.0.6422.60-1
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-4949 (Use after free in V8 in Google Chrome prior to 125.0.6422.60 
allowed a ...)
+       {DSA-5694-1}
        - chromium 125.0.6422.60-1
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-4948 (Use after free in Dawn in Google Chrome prior to 125.0.6422.60 
allowed ...)
+       {DSA-5694-1}
        - chromium 125.0.6422.60-1
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-4947 (Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 
allowed a ...)
+       {DSA-5694-1}
        - chromium 125.0.6422.60-1
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
@@ -1248,7 +1814,7 @@ CVE-2024-4778 (Memory safety bugs present in Firefox 125. 
Some of these bugs sho
        - firefox 126.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4778
 CVE-2024-4777 (Memory safety bugs present in Firefox 125, Firefox ESR 115.10, 
and Thu ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -1274,7 +1840,7 @@ CVE-2024-4771 (A memory allocation check was missing 
which would lead to a use-a
        - firefox 126.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4771
 CVE-2024-4770 (When saving a page to PDF, certain font styles could have led 
to a pot ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -1282,7 +1848,7 @@ CVE-2024-4770 (When saving a page to PDF, certain font 
styles could have led to
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4770
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
 CVE-2024-4769 (When importing resources using Web Workers, error messages 
would disti ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -1290,7 +1856,7 @@ CVE-2024-4769 (When importing resources using Web 
Workers, error messages would
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4769
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
 CVE-2024-4768 (A bug in popup notifications' interaction with WebAuthn made it 
easier ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -1298,7 +1864,7 @@ CVE-2024-4768 (A bug in popup notifications' interaction 
with WebAuthn made it e
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4768
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4768
 CVE-2024-4767 (If the `browser.privatebrowsing.autostart` preference is 
enabled, Inde ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -1312,7 +1878,7 @@ CVE-2024-4765 (Web application manifests were stored by 
using an insecure MD5 ha
        - firefox <not-affected> (Android-specific)
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4765
 CVE-2024-4367 (A type check was missing when handling fonts in PDF.js, which 
would al ...)
-       {DSA-5691-1 DLA-3815-1}
+       {DSA-5693-1 DSA-5691-1 DLA-3815-1}
        - firefox 126.0-1
        - firefox-esr 115.11.0esr-1
        - thunderbird 1:115.11.0-1
@@ -29002,7 +29568,7 @@ CVE-2023-6516 (To keep its cache database efficient, 
`named` running as a recurs
        NOTE: Issue is specific to 9.16.y. Mark the first version from 9.17.y 
series
        NOTE: which entered unstable as the fixed version as workaround.
 CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 
4035, 6 ...)
-       {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+       {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
        - bind9 1:9.19.21-1
        - dnsmasq 2.90-1
        - knot-resolver 5.7.1-1
@@ -29044,7 +29610,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS 
protocol (in RFC 4033, 4034, 4
        NOTE: 
https://github.com/systemd/systemd-stable/commit/b43bcb51ebf9aea21b1e280e1872056994e3f53d
 (v252.23)
        NOTE: systemd: DNSSEC is default to off in systemd-resolved
 CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 
5155 whe ...)
-       {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+       {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
        - bind9 1:9.19.21-1
        - dnsmasq 2.90-1
        - knot-resolver 5.7.1-1
@@ -247570,8 +248136,8 @@ CVE-2021-22510 (Reflected XSS vulnerability in Micro 
Focus Application Automatio
        NOT-FOR-US: Jenkins plugin
 CVE-2021-22509
        RESERVED
-CVE-2021-22508
-       RESERVED
+CVE-2021-22508 (A potential vulnerability has been identified for OpenText 
Operations  ...)
+       TODO: check
 CVE-2021-22507 (Authentication bypass vulnerability in Micro Focus Operations 
Bridge M ...)
        NOT-FOR-US: Micro Focus
 CVE-2021-22506 (Advance configuration exposing Information Leakage 
vulnerability in Mi ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c

-- 
This project does not include diff previews in email notifications.
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to