Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
fafe969d by Moritz Muehlenhoff at 2024-08-03T11:53:51+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -13,83 +13,83 @@ CVE-2024-38891 (An issue in Horizon Business Services Inc.
Caterease 16.0.1.1663
CVE-2024-38887 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
TODO: check
CVE-2024-7323 (Digiwin EasyFlow .NET lacks proper access control for specific
functio ...)
- TODO: check
+ NOT-FOR-US: Digiwin EasyFlow .NET
CVE-2024-7314 (anji-plus AJ-Report is affected by an authentication bypass
vulnerabil ...)
- TODO: check
+ NOT-FOR-US: anji-plus AJ-Report
CVE-2024-7204 (Ai3 QbiBot does not properly filter user input, allowing
unauthenticat ...)
- TODO: check
+ NOT-FOR-US: Ai3 QbiBot
CVE-2024-7029 (Commands can be injected over the network and executed without
authent ...)
- TODO: check
+ NOT-FOR-US: AVTech AVM1203
CVE-2024-6704 (The Comments \u2013 wpDiscuz plugin for WordPress is vulnerable
to HTM ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-4643 (The Element Pack Elementor Addons (Header Footer, Template
Library, Dy ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2024-42349 (FOG is a cloning/imaging/rescue suite/inventory management
system. FOG ...)
- TODO: check
+ NOT-FOR-US: FOG
CVE-2024-42348 (FOG is a cloning/imaging/rescue suite/inventory management
system. FOG ...)
- TODO: check
+ NOT-FOR-US: FOG
CVE-2024-41519 (Feripro <= v2.2.3 is vulnerable to Cross Site Scripting (XSS)
via "/ad ...)
- TODO: check
+ NOT-FOR-US: Feripro
CVE-2024-41518 (An Incorrect Access Control vulnerability in
"/admin/programm/<program ...)
- TODO: check
+ NOT-FOR-US: Feripro
CVE-2024-41517 (An Incorrect Access Control vulnerability in
"/admin/benutzer/institut ...)
- TODO: check
+ NOT-FOR-US: Feripro
CVE-2024-41310 (AndServer 2.1.12 is vulnerable to Directory Traversal.)
- TODO: check
+ NOT-FOR-US: Feripro
CVE-2024-41127 (Monkeytype is a minimalistic and customizable typing test.
Monkeytype ...)
- TODO: check
+ NOT-FOR-US: Monkeytype
CVE-2024-40723 (The specific API in HWATAIServiSign Windows Version from
CHANGING Info ...)
- TODO: check
+ NOT-FOR-US: CHANGING Information Technology
CVE-2024-40722 (The specific API in TCBServiSign Windows Version from CHANGING
Informa ...)
- TODO: check
+ NOT-FOR-US: CHANGING Information Technology
CVE-2024-40721 (The specific API in TCBServiSign Windows Version from CHANGING
Informa ...)
- TODO: check
+ NOT-FOR-US: CHANGING Information Technology
CVE-2024-40720 (The specific API in TCBServiSign Windows Version from CHANGING
Informa ...)
- TODO: check
+ NOT-FOR-US: CHANGING Information Technology
CVE-2024-40719 (The encryption strength of the authorization keys in CHANGING
Informat ...)
- TODO: check
+ NOT-FOR-US: CHANGING Information Technology
CVE-2024-38890 (An issue in Horizon Business Services Inc. Caterease Software
16.0.1.1 ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38889 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38888 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38886 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38885 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38884 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38883 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38882 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38881 (An issue in Horizon Business Services Inc. Caterease
16.0.1.1663 throu ...)
- TODO: check
+ NOT-FOR-US: Caterease
CVE-2024-38879 (A vulnerability has been identified in OmniviseT3000
Application Serve ...)
- TODO: check
+ NOT-FOR-US: OmniviseT3000
CVE-2024-38878 (A vulnerability has been identified in OmniviseT3000
Application Serve ...)
- TODO: check
+ NOT-FOR-US: OmniviseT3000
CVE-2024-38877 (A vulnerability has been identified in OmniviseT3000
Application Serve ...)
- TODO: check
+ NOT-FOR-US: OmniviseT3000
CVE-2024-38876 (A vulnerability has been identified in OmniviseT3000
Application Serve ...)
- TODO: check
+ NOT-FOR-US: OmniviseT3000
CVE-2024-33896 (Cosy+ devices running a firmware 21.x below 21.2s10 or a
firmware 22.x ...)
- TODO: check
+ NOT-FOR-US: Cosy+
CVE-2024-33895 (Cosy+ devices running a firmware 21.x below 21.2s10 or a
firmware 22.x ...)
- TODO: check
+ NOT-FOR-US: Cosy+
CVE-2024-33894 (Insecure Permission vulnerability in Cosy+ devices running a
firmware ...)
- TODO: check
+ NOT-FOR-US: Cosy+
CVE-2024-33893 (Cosy+ devices running a firmware 21.x below 21.2s10 or a
firmware 22.x ...)
- TODO: check
+ NOT-FOR-US: Cosy+
CVE-2024-33892 (Insecure Permissions vulnerability in Cosy+ devices running a
firmware ...)
- TODO: check
+ NOT-FOR-US: Cosy+
CVE-2024-28298 (SQL injection vulnerability in BM SOFT BMPlanning 1.0.0.1
allows authe ...)
- TODO: check
+ NOT-FOR-US: BM SOFT BMPlanning
CVE-2024-28297 (SQL injection vulnerability in AzureSoft MyHorus 4.3.5 allows
authenti ...)
- TODO: check
+ NOT-FOR-US: AzureSoft MyHorus
CVE-2024-22169 (WD Discovery versions prior to 5.0.589 contain a
misconfiguration in t ...)
- TODO: check
+ NOT-FOR-US: Western Digital
CVE-2024-36268 (Improper Control of Generation of Code ('Code Injection')
vulnerabilit ...)
NOT-FOR-US: Apache Linkis
CVE-2024-27182 (In Apache Linkis <= 1.5.0, Arbitrary file deletion in Basic
managemen ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fafe969dab931d430efcda55f10a792ed1c0be49
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fafe969dab931d430efcda55f10a792ed1c0be49
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits