[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Jun 3 09:12:12 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8a8c25d0 by security tracker role at 2024-06-03T08:11:50+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,63 @@
+CVE-2024-5590 (A vulnerability was found in Netentsec NS-ASG Application Security Gat ...)
+ TODO: check
+CVE-2024-5589 (A vulnerability was found in Netentsec NS-ASG Application Security Gat ...)
+ TODO: check
+CVE-2024-5311 (DigiWin EasyFlow .NET lacks validation for certain input parameters. A ...)
+ TODO: check
+CVE-2024-37031 (The Active Admin (aka activeadmin) framework before 3.2.2 for Ruby on ...)
+ TODO: check
+CVE-2024-36964 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-36963 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-36962 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-36961 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-36960 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-36042 (Silverpeas before 6.3.5 allows authentication bypass by omitting the P ...)
+ TODO: check
+CVE-2024-35643 (Cross Site Scripting (XSS) vulnerability in Xabier Miranda WP Back But ...)
+ TODO: check
+CVE-2024-35642 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-35641 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-35640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-31493 (An improper removal of sensitive information before storage or transfe ...)
+ TODO: check
+CVE-2024-23107 (An exposure of sensitive information to an unauthorized actor vulnerab ...)
+ TODO: check
+CVE-2024-20075 (In eemgpu, there is a possible out of bounds write due to a missing bo ...)
+ TODO: check
+CVE-2024-20074 (In dmc, there is a possible out of bounds write due to a missing bound ...)
+ TODO: check
+CVE-2024-20073 (In wlan service, there is a possible out of bounds write due to improp ...)
+ TODO: check
+CVE-2024-20072 (In wlan driver, there is a possible out of bounds write due to imprope ...)
+ TODO: check
+CVE-2024-20071 (In wlan driver, there is a possible out of bounds read due to improper ...)
+ TODO: check
+CVE-2024-20070 (In modem, there is a possible information disclosure due to using risk ...)
+ TODO: check
+CVE-2024-20069 (In modem, there is a possible selection of less-secure algorithm durin ...)
+ TODO: check
+CVE-2024-20068 (In modem, there is a possible system crash due to improper input valid ...)
+ TODO: check
+CVE-2024-20067 (In modem, there is a possible out of bounds write due to improper inpu ...)
+ TODO: check
+CVE-2024-20066 (In modem, there is a possible out of bounds write due to an incorrect ...)
+ TODO: check
+CVE-2024-20065 (In telephony, there is a possible information disclosure due to a miss ...)
+ TODO: check
+CVE-2023-51436 (Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX ver ...)
+ TODO: check
+CVE-2023-48789 (A client-side enforcement of server-side security in Fortinet FortiPor ...)
+ TODO: check
+CVE-2023-42427 (Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX ver ...)
+ TODO: check
CVE-2024-5588 (A vulnerability was found in itsourcecode Learning Management System 1 ...)
NOT-FOR-US: itsourcecode Learning Management System
CVE-2024-5587 (A vulnerability was found in Casdoor up to 1.335.0. It has been classi ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a8c25d0d1b3c15305d349f586457e2c72a3b4a3
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a8c25d0d1b3c15305d349f586457e2c72a3b4a3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240603/7f8a30f7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list