Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
73520a6a by security tracker role at 2024-09-10T08:12:35+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,93 @@
+CVE-2024-8611 (A vulnerability classified as critical was found in 
itsourcecode Tailo ...)
+       TODO: check
+CVE-2024-8610 (A vulnerability classified as problematic has been found in 
SourceCode ...)
+       TODO: check
+CVE-2024-8478 (The The Affiliate Super Assistent plugin for WordPress is 
vulnerable t ...)
+       TODO: check
+CVE-2024-8268 (The Frontend Dashboard plugin for WordPress is vulnerable to 
unauthori ...)
+       TODO: check
+CVE-2024-7955 (The Starbox  WordPress plugin before 3.5.2 does not sanitise 
and escap ...)
+       TODO: check
+CVE-2024-7891 (The Floating Contact Button WordPress plugin before 2.8 does 
not sanit ...)
+       TODO: check
+CVE-2024-7784 (During internal Axis Security Development Model (ASDM) 
threat-modellin ...)
+       TODO: check
+CVE-2024-7734 (An unauthenticated remote attacker canexploit the behavior of 
thepathf ...)
+       TODO: check
+CVE-2024-7655 (The Community by PeepSo \u2013 Social Network, Membership, 
Registratio ...)
+       TODO: check
+CVE-2024-7618 (The Community by PeepSo \u2013 Social Network, Membership, 
Registratio ...)
+       TODO: check
+CVE-2024-6979 (Amin Aliakbari, member of the AXIS OS Bug Bounty Program, has 
found a  ...)
+       TODO: check
+CVE-2024-6596 (An unauthenticated remote attacker can run malicious c# code 
included  ...)
+       TODO: check
+CVE-2024-6509 (Marinus Pfund, member of the AXIS OS Bug Bounty Program,  has 
found th ...)
+       TODO: check
+CVE-2024-6342 (**UNSUPPORTED WHEN ASSIGNED** A command injection vulnerability 
in the ...)
+       TODO: check
+CVE-2024-6173 (51l3nc3, member of the AXIS OS Bug Bounty Program, has found 
that a Gu ...)
+       TODO: check
+CVE-2024-45504 (Cross-site request forgery (CSRF) vulnerability in multiple 
Alps Syste ...)
+       TODO: check
+CVE-2024-45286 (Due to lack of proper authorization checks when calling user, 
a functi ...)
+       TODO: check
+CVE-2024-45285 (The RFC enabled function module allows a low privileged user 
to perfor ...)
+       TODO: check
+CVE-2024-45284 (An authenticated attacker with high privilege can use 
functions of SLC ...)
+       TODO: check
+CVE-2024-45283 (SAP NetWeaver AS for Java allows an authorized attacker to 
obtain sens ...)
+       TODO: check
+CVE-2024-45281 (SAP BusinessObjects Business Intelligence Platform allows a 
high privi ...)
+       TODO: check
+CVE-2024-45280 (Due to insufficient encoding of user-controlled inputs, SAP 
NetWeaver  ...)
+       TODO: check
+CVE-2024-45279 (Due to insufficient input validation, CRM Blueprint 
Application Builde ...)
+       TODO: check
+CVE-2024-44411 (D-Link DI-8300 v16.07.26A1 is vulnerable to command injection 
via the  ...)
+       TODO: check
+CVE-2024-44410 (D-Link DI-8300 v16.07.26A1 is vulnerable to command injection 
via the  ...)
+       TODO: check
+CVE-2024-44121 (Under certain conditions Statutory Reports in SAP S/4 HANA 
allows an a ...)
+       TODO: check
+CVE-2024-44120 (SAP NetWeaver Enterprise Portal is vulnerable to reflected 
cross site  ...)
+       TODO: check
+CVE-2024-44117 (The RFC enabled function module allows a low privileged user 
to perfor ...)
+       TODO: check
+CVE-2024-44116 (The RFC enabled function module allows a low privileged user 
to add an ...)
+       TODO: check
+CVE-2024-44115 (The RFC enabled function module allows a low privileged user 
to add UR ...)
+       TODO: check
+CVE-2024-44114 (SAP NetWeaver Application Server for ABAP and ABAP Platform 
allow user ...)
+       TODO: check
+CVE-2024-44113 (Due to missing authorization checks, SAP Business Warehouse 
(BEx Analy ...)
+       TODO: check
+CVE-2024-44112 (Due to missing authorization check in SAP for Oil & Gas 
(Transportatio ...)
+       TODO: check
+CVE-2024-44072 (OS command injection vulnerability exists in BUFFALO wireless 
LAN rout ...)
+       TODO: check
+CVE-2024-42427 (Dell ThinOS versions 2402 and 2405, contains an Improper 
Neutralizatio ...)
+       TODO: check
+CVE-2024-42424 (Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, 
contains ...)
+       TODO: check
+CVE-2024-42380 (The RFC enabled function module allows a low privileged user 
to read a ...)
+       TODO: check
+CVE-2024-42378 (Due to weak encoding of user-controlled inputs, eProcurement 
on SAP S/ ...)
+       TODO: check
+CVE-2024-42371 (The RFC enabled function module allows a low privileged user 
to delete ...)
+       TODO: check
+CVE-2024-41729 (Due to missing authorization checks, SAP BEx Analyzer allows 
an authen ...)
+       TODO: check
+CVE-2024-41728 (Due to missing authorization check, SAP NetWeaver Application 
Server f ...)
+       TODO: check
+CVE-2024-38270 (An insufficient entropy vulnerability caused by the improper 
use of a  ...)
+       TODO: check
+CVE-2024-27365 (An issue was discovered in Samsung Mobile Processor Exynos 
Exynos 980, ...)
+       TODO: check
+CVE-2024-21528 (All versions of the package node-gettext are vulnerable to 
Prototype P ...)
+       TODO: check
+CVE-2024-0067 (Marinus Pfund, member of the AXIS OS Bug Bounty Program,  has 
found th ...)
+       TODO: check
 CVE-2024-8605 (A vulnerability classified as problematic was found in 
code-projects I ...)
        NOT-FOR-US: code-projects Inventory Management
 CVE-2024-8604 (A vulnerability classified as problematic has been found in 
SourceCode ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/73520a6ab125178edece9269f3b1e5f388bc3ae8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/73520a6ab125178edece9269f3b1e5f388bc3ae8
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to