Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1493dbfc by security tracker role at 2024-10-28T20:12:37+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,186 @@
-CVE-2024-45802
+CVE-2024-9825 (The Chef Habitat builder-api on-prem-builder package with any 
version  ...)
+       TODO: check
+CVE-2024-9629 (The Contact Form 7 + Telegram plugin for WordPress is 
vulnerable to un ...)
+       TODO: check
+CVE-2024-8013 (A bug in query analysis of certain complex self-referential 
$lookup su ...)
+       TODO: check
+CVE-2024-6245 (Use of Default Credentials vulnerability in Maruti Suzuki 
SmartPlay on ...)
+       TODO: check
+CVE-2024-5532 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50582 (In JetBrains YouTrack before 2024.3.47707 stored XSS was 
possible due  ...)
+       TODO: check
+CVE-2024-50581 (In JetBrains YouTrack before 2024.3.47707 improper HTML 
sanitization c ...)
+       TODO: check
+CVE-2024-50580 (In JetBrains YouTrack before 2024.3.47707 multiple XSS were 
possible d ...)
+       TODO: check
+CVE-2024-50579 (In JetBrains YouTrack before 2024.3.47707 reflected XSS due to 
insecur ...)
+       TODO: check
+CVE-2024-50578 (In JetBrains YouTrack before 2024.3.47707 stored XSS was 
possible via  ...)
+       TODO: check
+CVE-2024-50577 (In JetBrains YouTrack before 2024.3.47707 stored XSS was 
possible via  ...)
+       TODO: check
+CVE-2024-50576 (In JetBrains YouTrack before 2024.3.47707 stored XSS was 
possible via  ...)
+       TODO: check
+CVE-2024-50575 (In JetBrains YouTrack before 2024.3.47707 reflected XSS was 
possible i ...)
+       TODO: check
+CVE-2024-50574 (In JetBrains YouTrack before 2024.3.47707 potential ReDoS 
exploit was  ...)
+       TODO: check
+CVE-2024-50573 (In JetBrains Hub before 2024.3.47707 improper access control 
allowed u ...)
+       TODO: check
+CVE-2024-50502 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50501 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50498 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2024-50497 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2024-50492 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2024-50491 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-50489 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
+       TODO: check
+CVE-2024-50488 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
+       TODO: check
+CVE-2024-50487 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
+       TODO: check
+CVE-2024-50486 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
+       TODO: check
+CVE-2024-50483 (Authorization Bypass Through User-Controlled Key vulnerability 
in Meet ...)
+       TODO: check
+CVE-2024-50479 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-50478 (Authentication Bypass by Primary Weakness vulnerability in 
Swoop 1-Cli ...)
+       TODO: check
+CVE-2024-50477 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
+       TODO: check
+CVE-2024-50472 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50471 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50470 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50469 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50468 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50467 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50465 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2024-50464 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50463 (URL Redirection to Untrusted Site ('Open Redirect') 
vulnerability in W ...)
+       TODO: check
+CVE-2024-50462 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50461 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50460 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50458 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50457 (: Improper Control of Filename for Include/Require Statement 
in PHP Pr ...)
+       TODO: check
+CVE-2024-50453 (Relative Path Traversal vulnerability in Webangon The Pack 
Elementor a ...)
+       TODO: check
+CVE-2024-50451 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50450 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2024-50449 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50448 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50447 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50446 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50445 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50443 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50442 (Improper Restriction of XML External Entity Reference 
vulnerability in ...)
+       TODO: check
+CVE-2024-50441 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50440 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50439 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50438 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50437 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50436 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2024-50435 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2024-50434 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2024-50433 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50432 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50431 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50429 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50416 (Deserialization of Untrusted Data vulnerability in WPClever 
WPC Shop a ...)
+       TODO: check
+CVE-2024-50408 (Deserialization of Untrusted Data vulnerability in Kiboko Labs 
Namaste ...)
+       TODO: check
+CVE-2024-49771 (MPXJ is an open source library to read and write project plans 
from a  ...)
+       TODO: check
+CVE-2024-49761 (REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 
has a ReD ...)
+       TODO: check
+CVE-2024-49755 (Duende IdentityServer is an OpenID Connect and OAuth 2.x 
framework for ...)
+       TODO: check
+CVE-2024-48826 (Tenda AC7 v.15.03.06.44 ate_iwpriv_set has pre-authentication 
command  ...)
+       TODO: check
+CVE-2024-48825 (Tenda AC7 v.15.03.06.44 ate_ifconfig_set has 
pre-authentication comman ...)
+       TODO: check
+CVE-2024-48465 (The MRBS version 1.5.0 has an SQL injection vulnerability in 
the edit_ ...)
+       TODO: check
+CVE-2024-48291 (dingfanzu CMS 1.0 was discovered to contain a Cross-Site 
Request Forge ...)
+       TODO: check
+CVE-2024-48196 (An issue in eyouCMS v.1.6.7 allows a remote attacker to obtain 
sensiti ...)
+       TODO: check
+CVE-2024-48195 (Cross Site Scripting vulnerability in eyouCMS v.1.6.7 allows a 
remote  ...)
+       TODO: check
+CVE-2024-48191 (dingfanzu CMS 1.0 was discovered to contain a Cross-Site 
Request Forge ...)
+       TODO: check
+CVE-2024-48074 (An authorized RCE vulnerability exists in the DrayTek 
Vigor2960 router ...)
+       TODO: check
+CVE-2024-47827 (Argo Workflows is an open source container-native workflow 
engine for  ...)
+       TODO: check
+CVE-2024-42930 (PbootCMS 3.2.8 is vulnerable to URL Redirect.)
+       TODO: check
+CVE-2024-42028 (A Local privilege escalation vulnerability found in a 
Self-Hosted UniF ...)
+       TODO: check
+CVE-2024-39205 (An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 
or below ...)
+       TODO: check
+CVE-2024-34537 (TYPO3 before 13.3.1 allows denial of service (interface error) 
in the  ...)
+       TODO: check
+CVE-2024-10469 (VINCE versions before 3.0.9 is vulnerable to exposure of User 
informat ...)
+       TODO: check
+CVE-2024-10455 (Reachable Assertion in BPv7 parser in \xb5D3TN v0.14.0 allows 
attacker ...)
+       TODO: check
+CVE-2024-10450 (A vulnerability has been found in SourceCodester Kortex Lite 
Advocate  ...)
+       TODO: check
+CVE-2024-10449 (A vulnerability, which was classified as critical, was found 
in Codezi ...)
+       TODO: check
+CVE-2024-10448 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2024-10447 (A vulnerability classified as critical was found in Project 
Worlds Onl ...)
+       TODO: check
+CVE-2024-10446 (A vulnerability classified as critical has been found in 
Project World ...)
+       TODO: check
+CVE-2024-10214 (Mattermost versions 9.11.X <= 9.11.1, 9.5.x <= 9.5.9 
icorrectly issues ...)
+       TODO: check
+CVE-2024-45802 (Squid is an open source caching proxy for the Web supporting 
HTTP, HTT ...)
        - squid 6.12-1
        NOTE: 
https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj
        NOTE: Not a code fix, this merely disables ESI by default (and thus in 
the Debian build)
@@ -98003,6 +98185,7 @@ CVE-2023-38871 (The commit 3730880 (April 2023) and 
v.0.9-beta1 of gugoan Econom
 CVE-2023-38870 (A SQL injection vulnerability exists in gugoan Economizzer 
commit 3730 ...)
        NOT-FOR-US: gugoan's Economizzer
 CVE-2023-42119 (Exim dnsdb Out-Of-Bounds Read Information Disclosure 
Vulnerability. Th ...)
+       {DLA-3938-1}
        - exim4 4.97~RC2-2
        [bookworm] - exim4 4.96-15+deb12u3
        [buster] - exim4 <no-dsa> (Minor issue; use Exim4 with a trustworthy 
DNS resolver able to validate the data according to the DNS record types)
@@ -98029,6 +98212,7 @@ CVE-2023-42118 (Exim libspf2 Integer Underflow Remote 
Code Execution Vulnerabili
        NOTE: finder clarifies as "ut I haven't been able to get it to do 
anything after that because
        NOTE: another buffer fills up." and 2. that this is the same issue as 
CVE-2023-42118 .
 CVE-2023-42117 (Exim Improper Neutralization of Special Elements Remote Code 
Execution ...)
+       {DLA-3938-1}
        - exim4 4.97~RC2-2
        [bookworm] - exim4 4.96-15+deb12u3
        [buster] - exim4 <no-dsa> (Only an issue if Exim4 run behind an 
untrusted proxy-protocol proxy)
@@ -164331,6 +164515,7 @@ CVE-2022-3560 (A flaw was found in pesign. The pesign 
package provides a systemd
        NOTE: https://www.openwall.com/lists/oss-security/2023/02/01/2
        NOTE: 
https://github.com/rhboot/pesign/commit/d8a8c259994d0278c59b30b41758a8dd0abff998
 (116)
 CVE-2022-3559 (A vulnerability was found in Exim and classified as 
problematic. This  ...)
+       {DLA-3938-1}
        - exim4 4.96-4
        [buster] - exim4 <no-dsa> (Minor issue)
        NOTE: https://bugs.exim.org/show_bug.cgi?id=2915
@@ -251108,6 +251293,7 @@ CVE-2021-38373 (In KDE KMail 19.12.3 (aka 5.13.3), 
the SMTP STARTTLS option is n
 CVE-2021-38372 (In KDE Trojita 0.7, man-in-the-middle attackers can create new 
folders ...)
        - trojita <itp> (bug #795701)
 CVE-2021-38371 (The STARTTLS feature in Exim through 4.94.2 allows response 
injection  ...)
+       {DLA-3938-1}
        - exim4 4.95~RC2-1 (bug #992172)
        [buster] - exim4 <no-dsa> (Minor issue)
        [stretch] - exim4 <postponed> (Minor issue, revisit when fixed upstream)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493dbfca4c80a42de40988d94d2fb79c71b561b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493dbfca4c80a42de40988d94d2fb79c71b561b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to