[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Apr 18 21:12:03 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0e9c20f4 by security tracker role at 2024-04-18T20:11:51+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,193 @@
+CVE-2024-3948 (A vulnerability was found in SourceCodester Home Clean Service System ...)
+ TODO: check
+CVE-2024-32689 (Missing Authorization vulnerability in GenialSouls WP Social Comments. ...)
+ TODO: check
+CVE-2024-32686 (Insertion of Sensitive Information into Log File vulnerability in Inis ...)
+ TODO: check
+CVE-2024-32604 (Authorization Bypass Through User-Controlled Key vulnerability in Plec ...)
+ TODO: check
+CVE-2024-32603 (Deserialization of Untrusted Data vulnerability in ThemeKraft WooBuddy ...)
+ TODO: check
+CVE-2024-32602 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2024-32601 (Missing Authorization vulnerability in WP OnlineSupport, Essential Plu ...)
+ TODO: check
+CVE-2024-32600 (Deserialization of Untrusted Data vulnerability in Averta Master Slide ...)
+ TODO: check
+CVE-2024-32599 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+ TODO: check
+CVE-2024-32598 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32597 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32596 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32595 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32594 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32593 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32592 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32591 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32590 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32588 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32587 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32586 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32585 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32584 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32583 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32582 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32581 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32580 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32579 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32578 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32577 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32576 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32575 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32574 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32573 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32572 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32571 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32570 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32569 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32568 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32567 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32566 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32565 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32564 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32563 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32562 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32561 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32560 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32559 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32558 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32556 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32554 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32553 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32552 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-32551 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2024-32477 (Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure ...)
+ TODO: check
+CVE-2024-32475 (Envoy is a cloud-native, open source edge and service proxy. When an u ...)
+ TODO: check
+CVE-2024-32474 (Sentry is an error tracking and performance monitoring platform. Prior ...)
+ TODO: check
+CVE-2024-32470 (Tolgee is an open-source localization platform. When API key created b ...)
+ TODO: check
+CVE-2024-32466 (Tolgee is an open-source localization platform. For the `/v2/projects/ ...)
+ TODO: check
+CVE-2024-32462 (Flatpak is a system for building, distributing, and running sandboxed ...)
+ TODO: check
+CVE-2024-32335 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scri ...)
+ TODO: check
+CVE-2024-32334 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scri ...)
+ TODO: check
+CVE-2024-32333 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scri ...)
+ TODO: check
+CVE-2024-32332 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scri ...)
+ TODO: check
+CVE-2024-32327 (TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scri ...)
+ TODO: check
+CVE-2024-32326 (TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting ...)
+ TODO: check
+CVE-2024-32325 (TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting ...)
+ TODO: check
+CVE-2024-32142 (Missing Authorization vulnerability in Ovic Team Ovic Responsive WPBak ...)
+ TODO: check
+CVE-2024-32126 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-31229 (Server-Side Request Forgery (SSRF) vulnerability in Really Simple Plug ...)
+ TODO: check
+CVE-2024-30564 (An issue inandrei-tatar nora-firebase-common between v.1.0.41 and v.1. ...)
+ TODO: check
+CVE-2024-30257 (1Panel is an open source Linux server operation and maintenance manage ...)
+ TODO: check
+CVE-2024-2833 (The Jobs for WordPress plugin for WordPress is vulnerable to Reflected ...)
+ TODO: check
+CVE-2024-2796 (A server-side request forgery (SSRF) was discovered in the Akana Commu ...)
+ TODO: check
+CVE-2024-29987 (Microsoft Edge (Chromium-based) Information Disclosure Vulnerability)
+ TODO: check
+CVE-2024-29986 (Microsoft Edge for Android (Chromium-based) Information Disclosure Vul ...)
+ TODO: check
+CVE-2024-29021 (Judge0 is an open-source online code execution system. The default con ...)
+ TODO: check
+CVE-2024-29003 (The SolarWinds Platform was susceptible to a XSS vulnerability that af ...)
+ TODO: check
+CVE-2024-29001 (A SolarWinds Platform SWQL Injection Vulnerability was identified in t ...)
+ TODO: check
+CVE-2024-28189 (Judge0 is an open-source online code execution system. The application ...)
+ TODO: check
+CVE-2024-28185 (Judge0 is an open-source online code execution system. The application ...)
+ TODO: check
+CVE-2024-28076 (The SolarWinds Platform was susceptible to a Arbitrary Open Redirectio ...)
+ TODO: check
+CVE-2024-27306 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...)
+ TODO: check
+CVE-2024-24910 (A local attacker can escalate privileges on affected Check Point ZoneA ...)
+ TODO: check
+CVE-2024-23557 (HCL Connections contains a user enumeration vulnerability. Certain act ...)
+ TODO: check
+CVE-2024-20380 (A vulnerability in the HTML parser of ClamAV could allow an unauthenti ...)
+ TODO: check
+CVE-2023-6897 (The EAN for WooCommerce plugin for WordPress is vulnerable to Insecure ...)
+ TODO: check
+CVE-2023-6892 (The EAN for WooCommerce plugin for WordPress is vulnerable to Stored C ...)
+ TODO: check
+CVE-2023-50885 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-49768 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2023-49742 (Missing Authorization vulnerability in Support Genix.This issue affect ...)
+ TODO: check
+CVE-2023-47843 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-41864 (Cross-Site Request Forgery (CSRF) vulnerability in Pepro Dev. Group Pe ...)
+ TODO: check
+CVE-2023-3758 (A race condition flaw was found in sssd where the GPO policy is not co ...)
+ TODO: check
+CVE-2023-3675 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
CVE-2024-XXXX [tryton zipbomb DoS]
- tryton-server 6.0.45-1
[bookworm] - tryton-server <no-dsa> (Minor issue)
@@ -8,7 +198,7 @@ CVE-2024-3246
- flatpak <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2024/04/18/5
NOTE: https://github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj
-CVE-2024-26921 [inet: inet_defrag: prevent sk release while still in use]
+CVE-2024-26921 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <unfixed>
[bookworm] - linux 6.1.85-1
NOTE: https://git.kernel.org/linus/18685451fc4e546fc0e718580d32df3c0e5c8272 (6.9-rc2)
@@ -1023,7 +1213,8 @@ CVE-2024-22354 (IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Appl
NOT-FOR-US: IBM
CVE-2024-22329 (IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Applicatio ...)
NOT-FOR-US: IBM
-CVE-2024-21676 (This High severity Injection vulnerability was introduced in versions ...)
+CVE-2024-21676
+ REJECTED
NOT-FOR-US: Atlassian
CVE-2024-21121 (Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualiza ...)
- virtualbox 7.0.16-dfsg-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e9c20f42a8634f063d8ed502e4de1cd236c52f3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e9c20f42a8634f063d8ed502e4de1cd236c52f3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240418/f04acd13/attachment.htm>
More information about the debian-security-tracker-commits
mailing list