Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
500677f5 by security tracker role at 2024-09-10T20:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,359 @@
+CVE-2024-8655 (A vulnerability was found in Mercury MNVR816 up to 2.0.1.0.5. 
It has b ...)
+       TODO: check
+CVE-2024-8654 (MongoDB Server may access non-initialized region of memory 
leading to  ...)
+       TODO: check
+CVE-2024-8645 (SPRT dissector crash in Wireshark 4.2.0 to 4.0.5 and 4.0.0 to 
4.0.15 a ...)
+       TODO: check
+CVE-2024-8543 (The Slider comparison image before and after plugin for 
WordPress is v ...)
+       TODO: check
+CVE-2024-8504 (An attacker with authenticated access to VICIdial as an "agent" 
can ex ...)
+       TODO: check
+CVE-2024-8503 (An unauthenticated attacker can leverage a time-based SQL 
injection vu ...)
+       TODO: check
+CVE-2024-8369 (The EventPrime \u2013 Events Calendar, Bookings and Tickets 
plugin for ...)
+       TODO: check
+CVE-2024-8258 (Improper Control of Generation of Code ('Code Injection') in 
Electron  ...)
+       TODO: check
+CVE-2024-8241 (The Nova Blocks by Pixelgrade plugin for WordPress is 
vulnerable to St ...)
+       TODO: check
+CVE-2024-8232 (SpiderControl SCADA Web Server has a vulnerability that could 
allow an ...)
+       TODO: check
+CVE-2024-7770 (The Bit File Manager \u2013 100% Free & Open Source File 
Manager and C ...)
+       TODO: check
+CVE-2024-7699 (An low privileged remote attacker can execute OS commands with 
root pr ...)
+       TODO: check
+CVE-2024-7698 (A low privileged remote attacker canget access to CSRF tokens 
of highe ...)
+       TODO: check
+CVE-2024-6876 (Out-of-Bounds read vulnerability in OSCAT Basic Library allows 
an loca ...)
+       TODO: check
+CVE-2024-6282 (The Master Addons \u2013 Free Widgets, Hover Effects, Toggle, 
Conditio ...)
+       TODO: check
+CVE-2024-45845 (nix 2.24 through 2.24.5 allows directory traversal via a 
symlink in a  ...)
+       TODO: check
+CVE-2024-45596 (Directus is a real-time API and App dashboard for managing SQL 
databas ...)
+       TODO: check
+CVE-2024-45595 (D-Tale is a visualizer for Pandas data structures. Users 
hosting D-Tal ...)
+       TODO: check
+CVE-2024-45593 (Nix is a package manager for Linux and other Unix systems. A 
bug in Ni ...)
+       TODO: check
+CVE-2024-45592 (auditor-bundle, formerly known as DoctrineAuditBundle, 
integrates audi ...)
+       TODO: check
+CVE-2024-45591 (XWiki Platform is a generic wiki platform. The REST API 
exposes the hi ...)
+       TODO: check
+CVE-2024-45590 (body-parser is Node.js body parsing middleware. body-parser 
<1.20.3 is ...)
+       TODO: check
+CVE-2024-45412 (Yeti bridges the gap between CTI and DFIR practitioners by 
providing a ...)
+       TODO: check
+CVE-2024-45409 (The Ruby SAML library is for implementing the client side of a 
SAML au ...)
+       TODO: check
+CVE-2024-45407 (Sunshine is a self-hosted game stream host for Moonlight. 
Clients that ...)
+       TODO: check
+CVE-2024-45393 (Computer Vision Annotation Tool (CVAT) is an interactive video 
and ima ...)
+       TODO: check
+CVE-2024-45323 (An improper access control vulnerability[CWE-284] in FortiEDR 
Manager  ...)
+       TODO: check
+CVE-2024-45044 (Bareos is open source software for backup, archiving, and 
recovery of  ...)
+       TODO: check
+CVE-2024-45032 (A vulnerability has been identified in Industrial Edge 
Management Pro  ...)
+       TODO: check
+CVE-2024-44893 (An issue in the component /jeecg-boot/jmreport/dict/list of 
JimuReport ...)
+       TODO: check
+CVE-2024-44872 (A reflected cross-site scripting (XSS) vulnerability in 
moziloCMS v3.0 ...)
+       TODO: check
+CVE-2024-44871 (An arbitrary file upload vulnerability in the component 
/admin/index.p ...)
+       TODO: check
+CVE-2024-44867 (phpok v3.0 was discovered to contain an arbitrary file read 
vulnerabil ...)
+       TODO: check
+CVE-2024-44815 (An issue in Hathway Skyworth Router CM5100 v.4.1.1.24 allows a 
physica ...)
+       TODO: check
+CVE-2024-44677 (eladmin v2.7 and before is vulnerable to Server-Side Request 
Forgery ( ...)
+       TODO: check
+CVE-2024-44676 (eladmin v2.7 and before is vulnerable to Cross Site Scripting 
(XSS) wh ...)
+       TODO: check
+CVE-2024-44667 (Shenzhen Haichangxing Technology Co., Ltd HCX H822 4G LTE 
Router M7628 ...)
+       TODO: check
+CVE-2024-44087 (A vulnerability has been identified in Automation License 
Manager V5 ( ...)
+       TODO: check
+CVE-2024-43800 (serve-static serves static files. serve-static passes 
untrusted user i ...)
+       TODO: check
+CVE-2024-43799 (Send is a library for streaming files from the file system as 
a http r ...)
+       TODO: check
+CVE-2024-43796 (Express.js minimalist web framework for node. In express < 
4.20.0, pas ...)
+       TODO: check
+CVE-2024-43781 (A vulnerability has been identified in SINUMERIK 828D V4 (All 
versions ...)
+       TODO: check
+CVE-2024-43647 (A vulnerability has been identified in SIMATIC S7-200 SMART 
CPU CR40 ( ...)
+       TODO: check
+CVE-2024-43495 (Windows libarchive Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-43492 (Microsoft AutoUpdate (MAU) Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-43491 (Microsoft is aware of a vulnerability in Servicing Stack that 
has roll ...)
+       TODO: check
+CVE-2024-43487 (Windows Mark of the Web Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-43482 (Microsoft Outlook for iOS Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-43479 (Microsoft Power Automate Desktop Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-43476 (Microsoft Dynamics 365 (on-premises) Cross-site Scripting 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-43475 (Microsoft Windows Admin Center Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2024-43474 (Microsoft SQL Server Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-43470 (Azure Network Watcher VM Agent Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-43469 (Azure CycleCloud Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-43467 (Windows Remote Desktop Licensing Service Remote Code Execution 
Vulnera ...)
+       TODO: check
+CVE-2024-43466 (Microsoft SharePoint Server Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-43465 (Microsoft Excel Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-43464 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-43463 (Microsoft Office Visio Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-43461 (Windows MSHTML Platform Spoofing Vulnerability)
+       TODO: check
+CVE-2024-43458 (Windows Networking Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-43457 (Windows Setup and Deployment Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-43455 (Windows Remote Desktop Licensing Service Spoofing 
Vulnerability)
+       TODO: check
+CVE-2024-43454 (Windows Remote Desktop Licensing Service Remote Code Execution 
Vulnera ...)
+       TODO: check
+CVE-2024-43393 (A low privileged remote attacker can perform configuration 
changes of  ...)
+       TODO: check
+CVE-2024-43392 (A low privileged remote attacker can perform configuration 
changes of  ...)
+       TODO: check
+CVE-2024-43391 (A low privileged remote attacker can perform configuration 
changes of  ...)
+       TODO: check
+CVE-2024-43390 (A low privileged remote attacker can perform configuration 
changes of  ...)
+       TODO: check
+CVE-2024-43389 (A low privileged remote attacker can perform configuration 
changes of  ...)
+       TODO: check
+CVE-2024-43388 (A low privileged remote attacker with write permissions can 
reconfigur ...)
+       TODO: check
+CVE-2024-43387 (A low privileged remote attacker can read and write files as 
root due  ...)
+       TODO: check
+CVE-2024-43386 (A low privileged remote attacker can trigger the execution of 
arbitrar ...)
+       TODO: check
+CVE-2024-43385 (A low privileged remote attacker can trigger theexecution of 
arbitrary ...)
+       TODO: check
+CVE-2024-43040 (Renwoxing Enterprise Intelligent Management System before v3.0 
was dis ...)
+       TODO: check
+CVE-2024-42425 (Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, 
contains ...)
+       TODO: check
+CVE-2024-42423 (Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 
contains  ...)
+       TODO: check
+CVE-2024-42345 (A vulnerability has been identified in SINEMA Remote Connect 
Server (A ...)
+       TODO: check
+CVE-2024-42344 (A vulnerability has been identified in SINEMA Remote Connect 
Client (A ...)
+       TODO: check
+CVE-2024-41171 (A vulnerability has been identified in SINUMERIK 828D V4 (All 
versions ...)
+       TODO: check
+CVE-2024-41170 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+       TODO: check
+CVE-2024-40754 (Heap-based Buffer Overflow vulnerability in Samsung Open 
Source Escarg ...)
+       TODO: check
+CVE-2024-39583 (Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains 
a Use of ...)
+       TODO: check
+CVE-2024-39582 (Dell PowerScale InsightIQ, version 5.0, contain a Use of hard 
coded Cr ...)
+       TODO: check
+CVE-2024-39581 (Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains 
a File o ...)
+       TODO: check
+CVE-2024-39580 (Dell PowerScale InsightIQ, versions 5.0 through 5.1, contains 
an Impro ...)
+       TODO: check
+CVE-2024-39574 (Dell PowerScale InsightIQ, version 5.1, contain an Improper 
Privilege  ...)
+       TODO: check
+CVE-2024-38263 (Windows Remote Desktop Licensing Service Remote Code Execution 
Vulnera ...)
+       TODO: check
+CVE-2024-38260 (Windows Remote Desktop Licensing Service Remote Code Execution 
Vulnera ...)
+       TODO: check
+CVE-2024-38259 (Microsoft Management Console Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-38258 (Windows Remote Desktop Licensing Service Information 
Disclosure Vulner ...)
+       TODO: check
+CVE-2024-38257 (Microsoft AllJoyn API Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-38256 (Windows Kernel-Mode Driver Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2024-38254 (Windows Authentication Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-38253 (Windows Win32 Kernel Subsystem Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38252 (Windows Win32 Kernel Subsystem Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38250 (Windows Graphics Component Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38249 (Windows Graphics Component Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38248 (Windows Storage Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38247 (Windows Graphics Component Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38246 (Win32k Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38245 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38244 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38243 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38242 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38241 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38240 (Windows Remote Access Connection Manager Elevation of 
Privilege Vulner ...)
+       TODO: check
+CVE-2024-38239 (Windows Kerberos Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38238 (Kernel Streaming Service Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38237 (Kernel Streaming WOW Thunk Service Driver Elevation of 
Privilege Vulne ...)
+       TODO: check
+CVE-2024-38236 (DHCP Server Service Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-38235 (Windows Hyper-V Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-38234 (Windows Networking Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-38233 (Windows Networking Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-38232 (Windows Networking Denial of Service Vulnerability)
+       TODO: check
+CVE-2024-38231 (Windows Remote Desktop Licensing Service Denial of Service 
Vulnerabili ...)
+       TODO: check
+CVE-2024-38230 (Windows Standards-Based Storage Management Service Denial of 
Service V ...)
+       TODO: check
+CVE-2024-38228 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-38227 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-38226 (Microsoft Publisher Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-38225 (Microsoft Dynamics 365 Business Central Elevation of Privilege 
Vulnera ...)
+       TODO: check
+CVE-2024-38220 (Azure Stack Hub Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38217 (Windows Mark of the Web Security Feature Bypass Vulnerability)
+       TODO: check
+CVE-2024-38216 (Azure Stack Hub Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38194 (An authenticated attacker can exploit an improper 
authorization vulner ...)
+       TODO: check
+CVE-2024-38188 (Azure Network Watcher VM Agent Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-38119 (Windows Network Address Translation (NAT) Remote Code 
Execution Vulner ...)
+       TODO: check
+CVE-2024-38046 (PowerShell Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-38045 (Windows TCP/IP Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-38018 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-38014 (Windows Installer Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-37995 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37994 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37993 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37992 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37991 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37990 (A vulnerability has been identified in SIMATIC Reader RF610R 
CMIIT (6G ...)
+       TODO: check
+CVE-2024-37980 (Microsoft SQL Server Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-37966 (Microsoft SQL Server Native Scoring Information Disclosure 
Vulnerabili ...)
+       TODO: check
+CVE-2024-37965 (Microsoft SQL Server Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-37728 (Arbitrary File Read vulnerability in Xi'an Daxi Information 
Technology ...)
+       TODO: check
+CVE-2024-37342 (Microsoft SQL Server Native Scoring Information Disclosure 
Vulnerabili ...)
+       TODO: check
+CVE-2024-37341 (Microsoft SQL Server Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-37340 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-37339 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-37338 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-37337 (Microsoft SQL Server Native Scoring Information Disclosure 
Vulnerabili ...)
+       TODO: check
+CVE-2024-37335 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-36511 (An improperly implemented security check for standard 
vulnerability [C ...)
+       TODO: check
+CVE-2024-35783 (A vulnerability has been identified in SIMATIC BATCH V9.1 (All 
version ...)
+       TODO: check
+CVE-2024-35282 (A cleartext storage of sensitive information in memory 
vulnerability [ ...)
+       TODO: check
+CVE-2024-34831 (cross-site scripting (XSS) vulnerability in Gibbon Core 
v26.0.00 allow ...)
+       TODO: check
+CVE-2024-33698 (A vulnerability has been identified in SIMATIC Information 
Server 2022 ...)
+       TODO: check
+CVE-2024-33508 (An improper neutralization of special elements used in a 
command('Comm ...)
+       TODO: check
+CVE-2024-32006 (A vulnerability has been identified in SINEMA Remote Connect 
Client (A ...)
+       TODO: check
+CVE-2024-31960 (An issue was discovered in Samsung Mobile Processor Exynos 
1480, Exyno ...)
+       TODO: check
+CVE-2024-31490 (An exposure of sensitive information to an unauthorized actor 
in Forti ...)
+       TODO: check
+CVE-2024-31489 (AAn improper certificate validation vulnerability [CWE-295] in 
FortiCl ...)
+       TODO: check
+CVE-2024-30073 (Windows Security Zone Mapping Security Feature Bypass 
Vulnerability)
+       TODO: check
+CVE-2024-27257 (IBM OpenPages 8.3 and 9.0 potentially exposes information 
about client ...)
+       TODO: check
+CVE-2024-26191 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-26186 (Microsoft SQL Server Native Scoring Remote Code Execution 
Vulnerabilit ...)
+       TODO: check
+CVE-2024-25074 (An issue was discovered in Samsung Semiconductor Mobile 
Processor, Aut ...)
+       TODO: check
+CVE-2024-25073 (An issue was discovered in Samsung Semiconductor Mobile 
Processor, Aut ...)
+       TODO: check
+CVE-2024-21753 (A improper limitation of a pathname to a restricted directory 
('path t ...)
+       TODO: check
+CVE-2024-21416 (Windows TCP/IP Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2023-6841 (A denial of service vulnerability was found in keycloak where 
the amou ...)
+       TODO: check
+CVE-2023-49069 (A vulnerability has been identified in Mendix Runtime V10 (All 
version ...)
+       TODO: check
+CVE-2023-44254 (An authorization bypass through user-controlled key[CWE-639] 
vulnerabi ...)
+       TODO: check
+CVE-2023-37234 (Loftware Spectrum through 4.6 has unprotected JMX Registry.)
+       TODO: check
+CVE-2023-37233 (Loftware Spectrum before 4.6 HF14 allows authenticated XXE 
attacks.)
+       TODO: check
+CVE-2023-37232 (Loftware Spectrum through 4.6 exposes Sensitive Information 
(Logs) to  ...)
+       TODO: check
+CVE-2023-37231 (Loftware Spectrum before 4.6 HF14 uses a Hard-coded Password.)
+       TODO: check
+CVE-2023-37230 (Loftware Spectrum (testDeviceConnection) before 5.1 allows 
SSRF.)
+       TODO: check
+CVE-2023-37229 (Loftware Spectrum before 5.1 allows SSRF.)
+       TODO: check
+CVE-2023-37227 (Loftware Spectrum before 4.6 HF13 Deserializes Untrusted Data.)
+       TODO: check
+CVE-2023-37226 (Loftware Spectrum before 4.6 HF14 has Missing Authentication 
for a Cri ...)
+       TODO: check
+CVE-2023-36103 (Command Injection vulnerability in goform/SetIPTVCfg interface 
of Tend ...)
+       TODO: check
+CVE-2023-2919 (The Tutor LMS plugin for WordPress is vulnerable to Cross-Site 
Request ...)
+       TODO: check
 CVE-2024-8611 (A vulnerability classified as critical was found in 
itsourcecode Tailo ...)
        NOT-FOR-US: itsourcecode Tailoring Management System
 CVE-2024-8610 (A vulnerability classified as problematic has been found in 
SourceCode ...)
@@ -346,7 +702,7 @@ CVE-2024-44839 (RapidCMS v1.3.1 was discovered to contain a 
SQL injection vulner
        NOT-FOR-US: RapidCMS
 CVE-2024-44838 (RapidCMS v1.3.1 was discovered to contain a SQL injection 
vulnerabilit ...)
        NOT-FOR-US: RapidCMS
-CVE-2024-8443
+CVE-2024-8443 (A heap-based buffer overflow vulnerability was found in the 
libopensc  ...)
        - opensc <unfixed>
        [bookworm] - opensc <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2310494
@@ -3050,7 +3406,7 @@ CVE-2024-43790 (Vim is an open source command line text 
editor. When performing
        NOTE: Crash in CLI tool, no security impact
        NOTE: https://github.com/vim/vim/security/advisories/GHSA-v2x2-cjcg-f9jm
        NOTE: https://github.com/vim/vim/commit/cacb6693c10bb19f28a50eca47bc 
(v9.1.0689)
-CVE-2024-43477 (Improper access control in Decentralized Identity Services 
allows an u ...)
+CVE-2024-43477 (Improper access control in Decentralized Identity Services 
resulted in ...)
        NOT-FOR-US: Microsoft
 CVE-2024-43105 (Mattermost Plugin Channel Export versions <=1.0.0 fail to 
restrict con ...)
        NOT-FOR-US: Mattermost plugin
@@ -5289,13 +5645,13 @@ CVE-2024-43374 (The UNIX editor Vim prior to version 
9.1.0678 has a use-after-fr
        NOTE: Crash in CLI tool, no security impact
        NOTE: https://github.com/vim/vim/security/GHSA-2w8m-443v-cgvw
        NOTE: 
https://github.com/vim/vim/commit/0a6e57b09bc8c76691b367a5babfb79b31b770e8 
(v9.1.0678)
-CVE-2024-23185
+CVE-2024-23185 (Very large headers can cause resource exhaustion when parsing 
message. ...)
        {DSA-5752-1 DLA-3860-1}
        - dovecot 1:2.3.21.1+dfsg1-1 (bug #1078877)
        NOTE: https://www.openwall.com/lists/oss-security/2024/08/15/4
        NOTE: Fixed by: 
https://github.com/dovecot/core/commit/f020e139c519121d9630a966310ea8e100ee33b7 
(2.3.21.1)
        NOTE: Fixed by: 
https://github.com/dovecot/core/commit/ce88c33abc37e408592eff70aeefa28f803effb9 
(2.3.21.1)
-CVE-2024-23184
+CVE-2024-23184 (Having a large number of address headers (From, To, Cc, Bcc, 
etc.) bec ...)
        {DSA-5752-1 DLA-3860-1}
        - dovecot 1:2.3.21.1+dfsg1-1 (bug #1078876)
        [buster] - dovecot <not-affected> (Vulnerable code not present)
@@ -32421,7 +32777,7 @@ CVE-2023-50180 (An exposure of sensitive system 
information to an unauthorized c
        NOT-FOR-US: ForiGuard
 CVE-2023-46714 (A stack-based buffer overflow [CWE-121] vulnerability in 
Fortinet Fort ...)
        NOT-FOR-US: FortiGuard
-CVE-2023-46280 (A vulnerability has been identified in SINEC NMS (All versions 
< V3.0) ...)
+CVE-2023-46280 (A vulnerability has been identified in S7-PCT (All versions), 
Security ...)
        NOT-FOR-US: Siemens
 CVE-2023-45586 (An insufficient verification of data authenticity 
vulnerability [CWE-3 ...)
        NOT-FOR-US: FortiGuard
@@ -60528,9 +60884,9 @@ CVE-2023-49125 (A vulnerability has been identified in 
Parasolid V35.0 (All vers
        NOT-FOR-US: Siemens
 CVE-2023-48432 (An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 
9.0, and ...)
        NOT-FOR-US: Zimbra
-CVE-2023-48364 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions),  ...)
+CVE-2023-48364 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions <  ...)
        NOT-FOR-US: Siemens
-CVE-2023-48363 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions),  ...)
+CVE-2023-48363 (A vulnerability has been identified in OpenPCS 7 V9.1 (All 
versions <  ...)
        NOT-FOR-US: Siemens
 CVE-2023-45207 (An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 
9.0, and ...)
        NOT-FOR-US: Zimbra
@@ -82295,7 +82651,7 @@ CVE-2023-45812 (The Apollo Router is a configurable, 
high-performance graph rout
 CVE-2023-45146 (XXL-RPC is a high performance, distributed RPC framework. With 
it, a T ...)
        NOT-FOR-US: XXL-RPC
 CVE-2023-45145 (Redis is an in-memory database that persists on disk. On 
startup, Redi ...)
-       {DSA-5610-1 DLA-3627-1}
+       {DSA-5610-1 DLA-3885-1 DLA-3627-1}
        - redis 5:7.0.14-1 (bug #1054225)
        NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx
        NOTE: 
https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 
(unstable)
@@ -84561,7 +84917,7 @@ CVE-2023-45303 (ThingsBoard before 3.5 allows 
Server-Side Template Injection if
        NOT-FOR-US: ThingsBoard
 CVE-2023-45282 (In NASA Open MCT (aka openmct) before 3.1.0, prototype 
pollution can o ...)
        NOT-FOR-US: NASA Open MCT (aka openmct)
-CVE-2023-45246 (Sensitive information disclosure and manipulation due to 
improper auth ...)
+CVE-2023-45246 (Sensitive information disclosure and manipulation due to 
missing autho ...)
        NOT-FOR-US: Acronis
 CVE-2023-45245 (Sensitive information disclosure due to missing authorization. 
The fol ...)
        NOT-FOR-US: Acronis
@@ -106270,10 +106626,10 @@ CVE-2023-30769 (Vulnerability discovered is related 
to the peer-to-peer (p2p) co
        NOTE: 
https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks
 CVE-2023-30757 (A vulnerability has been identified in Totally Integrated 
Automation P ...)
        NOT-FOR-US: Siemens
-CVE-2023-30756
-       RESERVED
-CVE-2023-30755
-       RESERVED
+CVE-2023-30756 (A vulnerability has been identified in SIMATIC CP 1242-7 V2 
(incl. SIP ...)
+       TODO: check
+CVE-2023-30755 (A vulnerability has been identified in SIMATIC CP 1242-7 V2 
(incl. SIP ...)
+       TODO: check
 CVE-2023-30754 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 
AdFoxly  ...)
        NOT-FOR-US: WordPress plugin
 CVE-2023-30753 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in 
Phan Chu ...)
@@ -111995,7 +112351,7 @@ CVE-2023-1626 (A vulnerability was found in Jianming 
Antivirus 16.2.2022.418. It
 CVE-2023-28857 (Apereo CAS is an open source multilingual single sign-on 
solution for  ...)
        NOT-FOR-US: Apereo CAS
 CVE-2023-28856 (Redis is an open source, in-memory database that persists on 
disk. Aut ...)
-       {DLA-3396-1}
+       {DLA-3885-1 DLA-3396-1}
        - redis 5:7.0.11-1 (bug #1034613)
        NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6
        NOTE: 
https://github.com/redis/redis/commit/1c1bd618c95e26a8ff5c12e70cbf0117233ef073 
(7.0.11)
@@ -112076,8 +112432,8 @@ CVE-2023-28829 (A vulnerability has been identified 
in SIMATIC NET PC Software V
        NOT-FOR-US: Siemens
 CVE-2023-28828 (A vulnerability has been identified in Polarion ALM (All 
versions < V2 ...)
        NOT-FOR-US: Siemens
-CVE-2023-28827
-       RESERVED
+CVE-2023-28827 (A vulnerability has been identified in SIMATIC CP 1242-7 V2 
(incl. SIP ...)
+       TODO: check
 CVE-2023-28379 (A memory corruption vulnerability exists in the HTTP Server 
form bound ...)
        NOT-FOR-US: Weston Embedded uC-HTTP
 CVE-2023-27395 (A heap-based buffer overflow vulnerability exists in the 
vpnserver Wpc ...)
@@ -123555,6 +123911,7 @@ CVE-2023-25157 (GeoServer is an open source software 
server written in Java that
 CVE-2023-25156 (Kiwi TCMS, an open source test management system, does not 
impose rate ...)
        NOT-FOR-US: Kiwi TCMS
 CVE-2023-25155 (Redis is an in-memory database that persists on disk. 
Authenticated us ...)
+       {DLA-3885-1}
        - redis 5:7.0.9-1 (bug #1032279)
        [buster] - redis <postponed> (Minor issue, DoS)
        NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83
@@ -141352,8 +141709,8 @@ CVE-2022-45858 (A use of a weak cryptographic 
algorithm vulnerability [CWE-327]
        NOT-FOR-US: FortiGuard
 CVE-2022-45857 (An incorrect user management vulnerability [CWE-286] in the 
FortiManag ...)
        NOT-FOR-US: Fortinet
-CVE-2022-45856
-       RESERVED
+CVE-2022-45856 (An improper certificate validation vulnerability [CWE-295] in 
FortiCli ...)
+       TODO: check
 CVE-2022-45855 (SpringEL injection in the metrics source in Apache Ambari 
version 2.7. ...)
        NOT-FOR-US: Apache Ambari
 CVE-2022-45854 (An improper check for unusual conditions in Zyxel NWA110AX 
firmware ve ...)
@@ -153126,7 +153483,7 @@ CVE-2022-42786 (Multiple W&T Products of the 
ComServer Series are prone to an XS
        NOT-FOR-US: Wiesemann & Theis GmbH products
 CVE-2022-42785 (Multiple W&T products of the ComServer Series are prone to an 
authenti ...)
        NOT-FOR-US: Wiesemann & Theis GmbH products
-CVE-2022-42784 (A vulnerability has been identified in LOGO! 12/24RCE (All 
versions >= ...)
+CVE-2022-42784 (A vulnerability has been identified in LOGO! 12/24RCE 
(6ED1052-1MD08-0 ...)
        NOT-FOR-US: Siemens
 CVE-2022-3457 (Origin Validation Error in GitHub repository ikus060/rdiffweb 
prior to ...)
        - rdiffweb <itp> (bug #969974)
@@ -170517,11 +170874,11 @@ CVE-2022-2507 (In affected versions of Octopus 
Deploy it is possible to render u
        NOT-FOR-US: Octopus Deploy
 CVE-2022-2506
        RESERVED
-CVE-2022-36363 (A vulnerability has been identified in LOGO! 12/24RCE (All 
versions),  ...)
+CVE-2022-36363 (A vulnerability has been identified in LOGO! 12/24RCE 
(6ED1052-1MD08-0 ...)
        NOT-FOR-US: LOGO!
-CVE-2022-36362 (A vulnerability has been identified in LOGO! 12/24RCE (All 
versions),  ...)
+CVE-2022-36362 (A vulnerability has been identified in LOGO! 12/24RCE 
(6ED1052-1MD08-0 ...)
        NOT-FOR-US: LOGO!
-CVE-2022-36361 (A vulnerability has been identified in LOGO! 12/24RCE (All 
versions),  ...)
+CVE-2022-36361 (A vulnerability has been identified in LOGO! 12/24RCE 
(6ED1052-1MD08-0 ...)
        NOT-FOR-US: LOGO!
 CVE-2022-36360 (A vulnerability has been identified in LOGO! 8 BM (incl. 
SIPLUS varian ...)
        NOT-FOR-US: LOGO!
@@ -171514,7 +171871,7 @@ CVE-2022-36023 (Hyperledger Fabric is an 
enterprise-grade permissioned distribut
 CVE-2022-36022 (Deeplearning4J is a suite of tools for deploying and training 
deep lea ...)
        NOT-FOR-US: Deeplearning4J
 CVE-2022-36021 (Redis is an in-memory database that persists on disk. 
Authenticated us ...)
-       {DLA-3361-1}
+       {DLA-3885-1 DLA-3361-1}
        - redis 5:7.0.9-1
        NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv
        NOTE: 
https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84
@@ -188161,7 +188518,7 @@ CVE-2022-30161 (Windows Lightweight Directory Access 
Protocol (LDAP) Remote Code
        NOT-FOR-US: Microsoft
 CVE-2022-30160 (Windows Advanced Local Procedure Call (ALPC) Elevation of 
Privilege Vu ...)
        NOT-FOR-US: Microsoft
-CVE-2022-30159 (Microsoft Office Information Disclosure Vulnerability. This 
CVE ID is  ...)
+CVE-2022-30159 (Microsoft Office Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2022-30158 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -188205,7 +188562,7 @@ CVE-2022-30139 (Windows Lightweight Directory Access 
Protocol (LDAP) Remote Code
        NOT-FOR-US: Microsoft
 CVE-2022-30138 (Windows Print Spooler Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2022-30137 (<p><strong>Executive Summary</strong></p> <p>An Elevation of 
Privilege ...)
+CVE-2022-30137 (Executive Summary An Elevation of Privilege (EOP) 
vulnerability has be ...)
        NOT-FOR-US: Microsoft
 CVE-2022-30136 (Windows Network File System Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -191230,7 +191587,7 @@ CVE-2022-29151 (Windows Cluster Shared Volume (CSV) 
Elevation of Privilege Vulne
        NOT-FOR-US: Microsoft
 CVE-2022-29150 (Windows Cluster Shared Volume (CSV) Elevation of Privilege 
Vulnerabili ...)
        NOT-FOR-US: Microsoft
-CVE-2022-29149 (Azure Open Management Infrastructure (OMI) Elevation of 
Privilege Vuln ...)
+CVE-2022-29149 (Open Management Infrastructure (OMI) Elevation of Privilege 
Vulnerabil ...)
        NOT-FOR-US: Microsoft
 CVE-2022-29148 (Visual Studio Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
@@ -203870,7 +204227,7 @@ CVE-2022-24836 (Nokogiri is an open source XML and 
HTML library for Ruby. Nokogi
 CVE-2022-24835
        RESERVED
 CVE-2022-24834 (Redis is an in-memory database that persists on disk. A 
specially craf ...)
-       {DSA-5610-1}
+       {DSA-5610-1 DLA-3885-1}
        - redis 5:7.0.12-1
        [buster] - redis <no-dsa> (Minor issue)
        NOTE: https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
@@ -304703,7 +305060,7 @@ CVE-2020-25238 (A vulnerability has been identified 
in PCS neo (Administration C
        NOT-FOR-US: Siemens
 CVE-2020-25237 (A vulnerability has been identified in SINEC NMS (All versions 
< V1.0  ...)
        NOT-FOR-US: Siemens
-CVE-2020-25236 (A vulnerability has been identified in LOGO! 12/24RCE (All 
versions),  ...)
+CVE-2020-25236 (A vulnerability has been identified in LOGO! 12/24RCE 
(6ED1052-1MD08-0 ...)
        NOT-FOR-US: Siemens
 CVE-2020-25235 (A vulnerability has been identified in LOGO! 8 BM (incl. 
SIPLUS varian ...)
        NOT-FOR-US: Siemens
@@ -322552,7 +322909,7 @@ CVE-2020-17051 (Windows Network File System Remote 
Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2020-17050
        RESERVED
-CVE-2020-17049 (<p>A security feature bypass vulnerability exists in the way 
Key Distr ...)
+CVE-2020-17049 (A security feature bypass vulnerability exists in the way Key 
Distribu ...)
        NOT-FOR-US: Microsoft
 CVE-2020-17048 (Chakra Scripting Engine Memory Corruption Vulnerability)
        NOT-FOR-US: Microsoft
@@ -381417,19 +381774,19 @@ CVE-2013-7475 (The contact-form-plugin plugin 
before 3.52 for WordPress has XSS.
        NOT-FOR-US: contact-form-plugin plugin for WordPress
 CVE-2012-6713 (The job-manager plugin before 0.7.19 for WordPress has multiple 
XSS is ...)
        NOT-FOR-US: job-manager plugin for WordPress
-CVE-2019-14931 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14931 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14930 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14930 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14929 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14929 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14928 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14928 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14927 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14927 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14926 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14926 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
-CVE-2019-14925 (An issue was discovered on Mitsubishi Electric ME-RTU devices 
through  ...)
+CVE-2019-14925 (An issue was discovered on Mitsubishi Electric Europe B.V. 
ME-RTU devi ...)
        NOT-FOR-US: Mitsubishi Electric ME-RTU devices
 CVE-2019-14924 (An issue was discovered in GCDWebServer before 3.5.3. The 
method moveI ...)
        NOT-FOR-US: GCDWebServer
@@ -394500,7 +394857,7 @@ CVE-2019-10925 (A vulnerability has been identified 
in SIMATIC MV400 family (All
        NOT-FOR-US: Siemens
 CVE-2019-10924 (A vulnerability has been identified in LOGO! Soft Comfort (All 
version ...)
        NOT-FOR-US: Siemens
-CVE-2019-10923 (A vulnerability has been identified in  SIMATIC S7-400 CPU 
414-3 PN/DP ...)
+CVE-2019-10923 (An attacker with network access to an affected product may 
cause a den ...)
        NOT-FOR-US: Siemens
 CVE-2019-10922 (A vulnerability has been identified in SIMATIC PCS 7 V8.0 and 
earlier  ...)
        NOT-FOR-US: Siemens
@@ -434935,9 +435292,9 @@ CVE-2018-16062 (dwarf_getaranges in 
dwarf_getaranges.c in libdw in elfutils befo
        - elfutils 0.175-1 (bug #907562)
        NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=23541
        NOTE: 
https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9
-CVE-2018-16061 (Mitsubishi Electric SmartRTU devices allow XSS via the 
username parame ...)
+CVE-2018-16061 (Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via 
the use ...)
        NOT-FOR-US: Mitsubishi
-CVE-2018-16060 (Mitsubishi Electric SmartRTU devices allow remote attackers to 
obtain  ...)
+CVE-2018-16060 (Mitsubishi Electric Europe B.V. SmartRTU devices allow remote 
attacker ...)
        NOT-FOR-US: Mitsubishi
 CVE-2018-16059 (Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow 
Director ...)
        NOT-FOR-US: Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/500677f5baf6f7252e55a12ee817f41dd3640073

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/500677f5baf6f7252e55a12ee817f41dd3640073
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to