[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jan 26 20:12:33 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e8ab90bf by security tracker role at 2024-01-26T20:12:22+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,149 @@
+CVE-2024-23896 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23894 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23893 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23892 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23891 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23890 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23889 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23888 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23887 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23886 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23885 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23884 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23883 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23882 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23881 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23880 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23879 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23878 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23877 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23876 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23875 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23874 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23873 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23872 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23871 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23870 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23869 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23868 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23867 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23866 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23865 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23864 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23863 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23862 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23861 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23860 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23859 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23858 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23857 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23856 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...)
+	TODO: check
+CVE-2024-23820 (OpenFGA, an authorization/permission engine, is vulnerable to a denial ...)
+	TODO: check
+CVE-2024-22551 (WhatACart v2.0.7 was discovered to contain a reflected cross-site scri ...)
+	TODO: check
+CVE-2024-22550 (An arbitrary file upload vulnerability in the component /alsdemo/ss/me ...)
+	TODO: check
+CVE-2024-21985 (ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10  a ...)
+	TODO: check
+CVE-2024-21336 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
+	TODO: check
+CVE-2024-20305 (A vulnerability in the web-based management interface of Cisco Unity C ...)
+	TODO: check
+CVE-2024-20263 (A vulnerability with the access control list (ACL) management within a ...)
+	TODO: check
+CVE-2024-20253 (A vulnerability in multiple Cisco Unified Communications and Contact C ...)
+	TODO: check
+CVE-2024-0944 (A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. It has  ...)
+	TODO: check
+CVE-2024-0943 (A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been  ...)
+	TODO: check
+CVE-2024-0942 (A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. ...)
+	TODO: check
+CVE-2024-0941 (A vulnerability was found in Novel-Plus 4.3.0-RC1 and classified as cr ...)
+	TODO: check
+CVE-2024-0939 (A vulnerability has been found in Beijing Baichuo Smart S210 Managemen ...)
+	TODO: check
+CVE-2024-0938 (A vulnerability, which was classified as critical, was found in Tongda ...)
+	TODO: check
+CVE-2024-0937 (A vulnerability, which was classified as critical, has been found in v ...)
+	TODO: check
+CVE-2024-0936 (A vulnerability classified as critical was found in van_der_Schaar LAB ...)
+	TODO: check
+CVE-2024-0933 (A vulnerability was found in Niushop B2B2C V5 and classified as critic ...)
+	TODO: check
+CVE-2024-0932 (A vulnerability, which was classified as critical, has been found in T ...)
+	TODO: check
+CVE-2024-0931 (A vulnerability classified as critical was found in Tenda AC10U 15.03. ...)
+	TODO: check
+CVE-2024-0930 (A vulnerability classified as critical has been found in Tenda AC10U 1 ...)
+	TODO: check
+CVE-2024-0929 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...)
+	TODO: check
+CVE-2024-0928 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...)
+	TODO: check
+CVE-2024-0927 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...)
+	TODO: check
+CVE-2024-0926 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and c ...)
+	TODO: check
+CVE-2024-0925 (A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01  ...)
+	TODO: check
+CVE-2024-0924 (A vulnerability, which was classified as critical, was found in Tenda  ...)
+	TODO: check
+CVE-2024-0923 (A vulnerability, which was classified as critical, has been found in T ...)
+	TODO: check
+CVE-2024-0922 (A vulnerability classified as critical was found in Tenda AC10U 15.03. ...)
+	TODO: check
+CVE-2024-0921 (A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and clas ...)
+	TODO: check
+CVE-2024-0920 (A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It has been  ...)
+	TODO: check
+CVE-2024-0919 (A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It has been  ...)
+	TODO: check
+CVE-2024-0918 (A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified ...)
+	TODO: check
+CVE-2022-48622 (In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows  ...)
+	TODO: check
 CVE-2024-24399 (An arbitrary file upload vulnerability in LeptonCMS v7.0.0 allows auth ...)
 	NOT-FOR-US: LeptonCMS
 CVE-2024-23630 (An arbitrary firmware upload vulnerability exists in the Motorola  MR2 ...)
@@ -214,7 +360,7 @@ CVE-2023-33757 (A lack of SSL certificate validation in Splicecom iPCS (iOS App)
 	NOT-FOR-US: SpliceCom
 CVE-2024-0822 (An authentication bypass vulnerability was found in overt-engine. This ...)
 	NOT-FOR-US: ovirt-engine
-CVE-2024-0727 [Add NULL checks where ContentInfo data can be NULL]
+CVE-2024-0727 (Issue summary: Processing a maliciously formatted PKCS12 file may lead ...)
 	- openssl <unfixed>
 	[bookworm] - openssl <no-dsa> (Minor issue)
 	[bullseye] - openssl <no-dsa> (Minor issue)
@@ -9767,7 +9913,7 @@ CVE-2023-6458 (Mattermost webapp fails to validateroute parameters in/<TEAM_NAME
 	- mattermost-server <itp> (bug #823556)
 CVE-2023-6393 (A flaw was found in the Quarkus Cache Runtime. When request processing ...)
 	NOT-FOR-US: Quarkus
-CVE-2023-6291
+CVE-2023-6291 (A flaw was found in the redirect_uri validation logic in Keycloak. Thi ...)
 	NOT-FOR-US: Keycloak
 CVE-2023-6288 (Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on mac ...)
 	NOT-FOR-US: Devolutions
@@ -10103,7 +10249,7 @@ CVE-2023-47106 (Traefik is an open source HTTP reverse proxy and load balancer.
 	- traefik <itp> (bug #983289)
 CVE-2023-45781 (In parse_gap_data of utils.cc, there is a possible out of bounds read  ...)
 	NOT-FOR-US: Android
-CVE-2023-45779 (In TBD of TBD, there is a possible malicious update to platform compon ...)
+CVE-2023-45779 (In the APEX module framework of AOSP, there is a possible malicious up ...)
 	NOT-FOR-US: Android
 CVE-2023-45777 (In checkKeyIntentParceledCorrectly of AccountManagerService.java, ther ...)
 	NOT-FOR-US: Android
@@ -46653,8 +46799,8 @@ CVE-2023-29083
 	RESERVED
 CVE-2023-29082
 	RESERVED
-CVE-2023-29081
-	RESERVED
+CVE-2023-29081 (A vulnerability has been reported in Suite Setups built with versions  ...)
+	TODO: check
 CVE-2023-29080
 	RESERVED
 CVE-2023-29079



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240126/ca2a1f2a/attachment.htm>


More information about the debian-security-tracker-commits mailing list