[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Feb 27 08:12:01 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2270d99d by security tracker role at 2024-02-27T08:11:48+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,83 @@
+CVE-2024-27356 (An issue was discovered on certain GL-iNet devices. Attackers can down ...)
+	TODO: check
+CVE-2024-27093 (Minder is a Software Supply Chain Security Platform. In version 0.0.31 ...)
+	TODO: check
+CVE-2024-27089
+	REJECTED
+CVE-2024-26149 (Vyper is a pythonic Smart Contract Language for the ethereum virtual m ...)
+	TODO: check
+CVE-2024-25751 (A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with fi ...)
+	TODO: check
+CVE-2024-25248 (SQL Injection vulnerability in the orderGoodsDelivery() function in Ni ...)
+	TODO: check
+CVE-2024-25247 (SQL Injection vulnerability in /app/api/controller/Store.php in Niusho ...)
+	TODO: check
+CVE-2024-25166 (Cross Site Scripting vulnerability in 71CMS v.1.0.0 allows a remote at ...)
+	TODO: check
+CVE-2024-24721 (An issue was discovered on Innovaphone PBX before 14r1 devices. The pa ...)
+	TODO: check
+CVE-2024-24720 (An issue was discovered on Innovaphone PBX before 14r1 devices. It pro ...)
+	TODO: check
+CVE-2024-24564 (Vyper is a pythonic Smart Contract Language for the ethereum virtual m ...)
+	TODO: check
+CVE-2024-24100 (Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection v ...)
+	TODO: check
+CVE-2024-24099 (Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Inject ...)
+	TODO: check
+CVE-2024-24096 (Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection v ...)
+	TODO: check
+CVE-2024-24095 (Code-projects Simple Stock System 1.0 is vulnerable to SQL Injection.)
+	TODO: check
+CVE-2024-22917 (SQL injection vulnerability in Dynamic Lab Management System Project i ...)
+	TODO: check
+CVE-2024-22544 (An issue was discovered in Linksys Router E1700 version 1.0.04 (build  ...)
+	TODO: check
+CVE-2024-22543 (An issue was discovered in Linksys Router E1700 1.0.04 (build 3), allo ...)
+	TODO: check
+CVE-2024-1698 (The NotificationX \u2013 Best FOMO, Social Proof, WooCommerce Sales Po ...)
+	TODO: check
+CVE-2024-1687 (The Thank You Page Customizer for WooCommerce \u2013 Increase Your Sal ...)
+	TODO: check
+CVE-2024-1686 (The Thank You Page Customizer for WooCommerce \u2013 Increase Your Sal ...)
+	TODO: check
+CVE-2024-1323 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2024-0759 (Should an instance of AnythingLLM be hosted on an internal network and ...)
+	TODO: check
+CVE-2023-7033 (Insufficient Resource Pool vulnerability in Ethernet function of Mitsu ...)
+	TODO: check
+CVE-2023-41506 (An arbitrary file upload vulnerability in the Update/Edit Student's Pr ...)
+	TODO: check
+CVE-2023-36237 (Cross Site Request Forgery vulnerability in Bagisto before v.1.5.1 all ...)
+	TODO: check
+CVE-2021-46920 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2021-46919 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2021-46918 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2021-46917 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2021-46916 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2021-46915 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2021-46914 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2021-46913 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2021-46912 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2021-46911 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2021-46910 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2021-46909 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2021-46908 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2021-46907 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	TODO: check
 CVE-2024-26144 [Possible Sensitive Session Information Leak in Active Storage]
 	- rails <unfixed>
 	NOTE: https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2270d99d15d64406748e98b24fb5cbd859a9b33c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2270d99d15d64406748e98b24fb5cbd859a9b33c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240227/e9869564/attachment.htm>


More information about the debian-security-tracker-commits mailing list