[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri May 17 21:12:47 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6d614d57 by security tracker role at 2024-05-17T20:12:26+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,565 @@
+CVE-2024-5072 (Improper input validation in PAM JIT elevation feature in Devolutions ...)
+ TODO: check
+CVE-2024-5066 (A vulnerability classified as critical was found in PHPGurukul Online ...)
+ TODO: check
+CVE-2024-5065 (A vulnerability classified as critical has been found in PHPGurukul On ...)
+ TODO: check
+CVE-2024-5064 (A vulnerability was found in PHPGurukul Online Course Registration Sys ...)
+ TODO: check
+CVE-2024-5063 (A vulnerability was found in PHPGurukul Online Course Registration Sys ...)
+ TODO: check
+CVE-2024-5055 (Uncontrolled resource consumption vulnerability in XAMPP Windows, vers ...)
+ TODO: check
+CVE-2024-5052 (Denial of Service (DoS) vulnerability for Cerberus Enterprise 8.0.10.3 ...)
+ TODO: check
+CVE-2024-5051 (A vulnerability has been found in SourceCodester Gas Agency Management ...)
+ TODO: check
+CVE-2024-5050 (A vulnerability, which was classified as critical, was found in Wangsh ...)
+ TODO: check
+CVE-2024-5049 (A vulnerability, which was classified as critical, has been found in C ...)
+ TODO: check
+CVE-2024-5048 (A vulnerability classified as critical was found in code-projects Budg ...)
+ TODO: check
+CVE-2024-5047 (A vulnerability classified as critical has been found in SourceCodeste ...)
+ TODO: check
+CVE-2024-5046 (A vulnerability was found in SourceCodester Online Examination System ...)
+ TODO: check
+CVE-2024-5045 (A vulnerability was found in SourceCodester Online Birth Certificate M ...)
+ TODO: check
+CVE-2024-5044 (A vulnerability was found in Emlog Pro 2.3.4. It has been classified a ...)
+ TODO: check
+CVE-2024-5043 (A vulnerability was found in Emlog Pro 2.3.4 and classified as critica ...)
+ TODO: check
+CVE-2024-5042 (A flaw was found in the Submariner project. Due to unnecessary role-ba ...)
+ TODO: check
+CVE-2024-5022 (The file scheme of URLs would be hidden, resulting in potential spoofi ...)
+ TODO: check
+CVE-2024-4998
+ REJECTED
+CVE-2024-4789 (Cost Calculator Builder Pro plugin for WordPress is vulnerable to Serv ...)
+ TODO: check
+CVE-2024-4214 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+ TODO: check
+CVE-2024-3292 (A race condition vulnerability exists where an authenticated, local at ...)
+ TODO: check
+CVE-2024-3291 (When installing Nessus Agent to a directory outside of the default loc ...)
+ TODO: check
+CVE-2024-3290 (A race condition vulnerability exists where an authenticated, local at ...)
+ TODO: check
+CVE-2024-3289 (When installing Nessus to a directory outside of the default location ...)
+ TODO: check
+CVE-2024-35859 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35858 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35857 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35856 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2024-35855 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35854 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35853 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35852 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35851 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2024-35850 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2024-35849 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35848 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2024-35847 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35846 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35845 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-35844 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-35843 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35842 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2024-35841 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35840 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35839 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35838 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-35837 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35836 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35835 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35834 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-35833 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35832 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35831 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35830 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35829 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35828 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-35827 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35826 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35825 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-35824 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35823 (In the Linux kernel, the following vulnerability has been resolved: v ...)
+ TODO: check
+CVE-2024-35822 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-35821 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-35820 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-35819 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-35818 (In the Linux kernel, the following vulnerability has been resolved: L ...)
+ TODO: check
+CVE-2024-35817 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35816 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-35815 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-35814 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-35813 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35812 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-35811 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-35810 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35809 (In the Linux kernel, the following vulnerability has been resolved: P ...)
+ TODO: check
+CVE-2024-35808 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35807 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2024-35806 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-35805 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35804 (In the Linux kernel, the following vulnerability has been resolved: K ...)
+ TODO: check
+CVE-2024-35803 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-35802 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-35801 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-35800 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2024-35799 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35798 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35797 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35796 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-35795 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35794 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35793 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35792 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-35791 (In the Linux kernel, the following vulnerability has been resolved: K ...)
+ TODO: check
+CVE-2024-35790 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-35789 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-35788 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35787 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-35786 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-35785 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-35784 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-35190 (Asterisk is an open source private branch exchange and telephony toolk ...)
+ TODO: check
+CVE-2024-35174 (Missing Authorization vulnerability in Flothemes Flo Forms.This issue ...)
+ TODO: check
+CVE-2024-35173 (Missing Authorization vulnerability in PluginEver Serial Numbers for W ...)
+ TODO: check
+CVE-2024-34997 (joblib v1.4.2 was discovered to contain a deserialization vulnerabilit ...)
+ TODO: check
+CVE-2024-34982 (An arbitrary file upload vulnerability in the component /include/file. ...)
+ TODO: check
+CVE-2024-34959 (DedeCMS V5.7.113 is vulnerable to Cross Site Scripting (XSS) via sys_d ...)
+ TODO: check
+CVE-2024-34919 (An arbitrary file upload vulnerability in the component \modstudent\co ...)
+ TODO: check
+CVE-2024-34809 (Cross-Site Request Forgery (CSRF) vulnerability in Extend Themes Empow ...)
+ TODO: check
+CVE-2024-34807 (Cross-Site Request Forgery (CSRF) vulnerability in CodeBard Fast Custo ...)
+ TODO: check
+CVE-2024-34806 (Cross-Site Request Forgery (CSRF) vulnerability in Creative Motion Cle ...)
+ TODO: check
+CVE-2024-34756 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integrati ...)
+ TODO: check
+CVE-2024-34755 (Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integrati ...)
+ TODO: check
+CVE-2024-34434 (Incorrect Authorization vulnerability in realmag777 WordPress Meta Dat ...)
+ TODO: check
+CVE-2024-34370 (Improper Privilege Management vulnerability in WPFactory EAN for WooCo ...)
+ TODO: check
+CVE-2024-34241 (A cross-site scripting (XSS) vulnerability in Rocketsoft Rocket LMS 1. ...)
+ TODO: check
+CVE-2024-34058 (The WebTop package for NethServer 7 and 8 allows stored XSS (for examp ...)
+ TODO: check
+CVE-2024-33917 (Authentication Bypass by Spoofing vulnerability in webtechideas WTI Li ...)
+ TODO: check
+CVE-2024-33644 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+ TODO: check
+CVE-2024-33569 (Improper Privilege Management vulnerability in Darren Cooney Instant I ...)
+ TODO: check
+CVE-2024-33567 (Improper Privilege Management vulnerability in UkrSolution Barcode Sca ...)
+ TODO: check
+CVE-2024-33552 (Improper Privilege Management vulnerability in 8theme XStore Core allo ...)
+ TODO: check
+CVE-2024-33550 (Improper Privilege Management vulnerability in JR King/Eran Schoellhor ...)
+ TODO: check
+CVE-2024-33549 (Improper Privilege Management vulnerability in AA-Team WZone allows Pr ...)
+ TODO: check
+CVE-2024-32960 (Improper Privilege Management vulnerability in Booking Ultra Pro allow ...)
+ TODO: check
+CVE-2024-32959 (Improper Privilege Management vulnerability in Sirv allows Privilege E ...)
+ TODO: check
+CVE-2024-32830 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-32827 (Authentication Bypass by Spoofing vulnerability in RafflePress Giveawa ...)
+ TODO: check
+CVE-2024-32809 (Unrestricted Upload of File with Dangerous Type vulnerability in JumpD ...)
+ TODO: check
+CVE-2024-32802 (Missing Authorization vulnerability in WordPlus BP Better Messages all ...)
+ TODO: check
+CVE-2024-32790 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+ TODO: check
+CVE-2024-32786 (Authentication Bypass by Spoofing vulnerability in WP Royal Royal Elem ...)
+ TODO: check
+CVE-2024-32774 (Improper Restriction of Excessive Authentication Attempts vulnerabilit ...)
+ TODO: check
+CVE-2024-32720 (Improper Restriction of Excessive Authentication Attempts vulnerabilit ...)
+ TODO: check
+CVE-2024-32708 (Authentication Bypass by Spoofing vulnerability in helderk Maintenance ...)
+ TODO: check
+CVE-2024-32692 (Missing Authorization vulnerability in QuanticaLabs Chauffeur Taxi Boo ...)
+ TODO: check
+CVE-2024-32685 (Client-Side Enforcement of Server-Side Security vulnerability in Wpmet ...)
+ TODO: check
+CVE-2024-32680 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-32523 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-32521 (Client-Side Enforcement of Server-Side Security vulnerability in Highf ...)
+ TODO: check
+CVE-2024-32512 (Client-Side Enforcement of Server-Side Security vulnerability in weFor ...)
+ TODO: check
+CVE-2024-32511 (Improper Privilege Management vulnerability in Astoundify Simple Regis ...)
+ TODO: check
+CVE-2024-32507 (Improper Privilege Management vulnerability in Hamid Alinia \u2013 ide ...)
+ TODO: check
+CVE-2024-32131 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+ TODO: check
+CVE-2024-31974 (The com.solarized.firedown (aka Solarized FireDown Browser & Downloade ...)
+ TODO: check
+CVE-2024-31341 (Insufficient Verification of Data Authenticity vulnerability in Cozmos ...)
+ TODO: check
+CVE-2024-31300 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-31295 (Guessable CAPTCHA vulnerability in BestWebSoft Captcha by BestWebSoft ...)
+ TODO: check
+CVE-2024-31290 (Improper Privilege Management vulnerability in CodeRevolution Demo My ...)
+ TODO: check
+CVE-2024-31281 (Missing Authorization vulnerability in Andy Moyle Church Admin church- ...)
+ TODO: check
+CVE-2024-31237 (Improper Privilege Management vulnerability in WP Sharks s2Member Pro ...)
+ TODO: check
+CVE-2024-31232 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-31231 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-30542 (Improper Privilege Management vulnerability in Wholesale WholesaleX al ...)
+ TODO: check
+CVE-2024-30540 (Guessable CAPTCHA vulnerability in Guido VS Contact Form allows Functi ...)
+ TODO: check
+CVE-2024-30527 (Improper Validation of Specified Quantity in Input vulnerability in Ti ...)
+ TODO: check
+CVE-2024-30522 (Authentication Bypass by Spoofing vulnerability in Stefano Lissa & The ...)
+ TODO: check
+CVE-2024-30509 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-30480 (Authentication Bypass by Spoofing vulnerability in Pippin Williamson C ...)
+ TODO: check
+CVE-2024-30479 (Authentication Bypass by Spoofing vulnerability in LionScripts IP Bloc ...)
+ TODO: check
+CVE-2024-27971 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-27955 (Cross-Site Request Forgery (CSRF) vulnerability in WP Automatic Automa ...)
+ TODO: check
+CVE-2024-27954 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-27436 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2024-27435 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27434 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-27433 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-27432 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27431 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-27430 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27429 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27428 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27427 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27426 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27425 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27424 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27423 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27422 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27421 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27420 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27419 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27418 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27417 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-27416 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2024-27415 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27414 (In the Linux kernel, the following vulnerability has been resolved: r ...)
+ TODO: check
+CVE-2024-27413 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2024-27412 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2024-27411 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-27410 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-27409 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-27408 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-27407 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-27406 (In the Linux kernel, the following vulnerability has been resolved: l ...)
+ TODO: check
+CVE-2024-27405 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-27404 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-27403 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-27402 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2024-25906 (Authentication Bypass by Spoofing vulnerability in WP Happy Coders Com ...)
+ TODO: check
+CVE-2024-25595 (Authentication Bypass by Spoofing vulnerability in WPMU DEV Defender S ...)
+ TODO: check
+CVE-2024-24934 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-24882 (Improper Privilege Management vulnerability in Masteriyo LMS allows Pr ...)
+ TODO: check
+CVE-2024-24874 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+ TODO: check
+CVE-2024-24873 (: Improper Control of Interaction Frequency vulnerability in CodePeopl ...)
+ TODO: check
+CVE-2024-24869 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2024-24715 (Improper Validation of Specified Quantity in Input vulnerability in Th ...)
+ TODO: check
+CVE-2024-23522 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+ TODO: check
+CVE-2024-22429 (Dell BIOS contains an Improper Input Validation vulnerability. A local ...)
+ TODO: check
+CVE-2024-22157 (Improper Privilege Management vulnerability in WebWizards SalesKing al ...)
+ TODO: check
+CVE-2024-22145 (Improper Privilege Management vulnerability in InstaWP Team InstaWP Co ...)
+ TODO: check
+CVE-2024-22139 (Authentication Bypass by Spoofing vulnerability in Filipe Seabra WordP ...)
+ TODO: check
+CVE-2024-22120 (Zabbix server can perform command execution for configured scripts. Af ...)
+ TODO: check
+CVE-2024-21746 (Authentication Bypass by Spoofing vulnerability in Wpmet Wp Ultimate R ...)
+ TODO: check
+CVE-2023-5597 (A stored Cross-site Scripting (XSS) vulnerability affecting 3DDashboar ...)
+ TODO: check
+CVE-2023-52698 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2023-52697 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52696 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52695 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52694 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52693 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52692 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52691 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52690 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52689 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52688 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2023-52687 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2023-52686 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52685 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52684 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2023-52683 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52682 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2023-52681 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2023-52680 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52679 (In the Linux kernel, the following vulnerability has been resolved: o ...)
+ TODO: check
+CVE-2023-52678 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52677 (In the Linux kernel, the following vulnerability has been resolved: r ...)
+ TODO: check
+CVE-2023-52676 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2023-52675 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52674 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52673 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52672 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52671 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52670 (In the Linux kernel, the following vulnerability has been resolved: r ...)
+ TODO: check
+CVE-2023-52669 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2023-52668 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2023-52667 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2023-52666 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ TODO: check
+CVE-2023-52665 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2023-52664 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2023-52663 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2023-52662 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52661 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2023-52660 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2023-52659 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2023-52658 (In the Linux kernel, the following vulnerability has been resolved: R ...)
+ TODO: check
+CVE-2023-52657 (In the Linux kernel, the following vulnerability has been resolved: R ...)
+ TODO: check
+CVE-2023-51546 (Improper Privilege Management vulnerability in WebToffee WooCommerce P ...)
+ TODO: check
+CVE-2023-51483 (Improper Privilege Management vulnerability in Glowlogix WP Frontend P ...)
+ TODO: check
+CVE-2023-51481 (Improper Privilege Management vulnerability in powerfulwp Local Delive ...)
+ TODO: check
+CVE-2023-51479 (Improper Privilege Management vulnerability in Abdul Hakeem Build App ...)
+ TODO: check
+CVE-2023-51476 (Improper Privilege Management vulnerability in IOSS WP MLM Unilevel al ...)
+ TODO: check
+CVE-2023-51424 (Improper Privilege Management vulnerability in Saleswonder Team Webina ...)
+ TODO: check
+CVE-2023-51401 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-51398 (Improper Privilege Management vulnerability in Brainstorm Force Ultima ...)
+ TODO: check
+CVE-2023-51356 (Improper Privilege Management vulnerability in Repute Infosystems ARMe ...)
+ TODO: check
+CVE-2023-50890 (Improper Privilege Management vulnerability in Brainstorm Force Ultima ...)
+ TODO: check
+CVE-2023-49753 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-48757 (Improper Privilege Management vulnerability in Crocoblock JetEngine al ...)
+ TODO: check
+CVE-2023-48319 (Improper Privilege Management vulnerability in Salon Booking System Sa ...)
+ TODO: check
+CVE-2023-47868 (Improper Privilege Management vulnerability in wpForo wpForo Forum all ...)
+ TODO: check
+CVE-2023-47782 (Improper Privilege Management vulnerability in Thrive Themes Thrive Th ...)
+ TODO: check
+CVE-2023-47683 (Improper Privilege Management vulnerability in miniOrange WordPress So ...)
+ TODO: check
+CVE-2023-47682 (Improper Privilege Management vulnerability in weDevs WP User Frontend ...)
+ TODO: check
+CVE-2023-47679 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-47178 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-46784 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-46205 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-46197 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-46145 (Improper Privilege Management vulnerability in Themify Themify Ultra a ...)
+ TODO: check
+CVE-2023-45652 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+ TODO: check
+CVE-2023-44478 (Cross-Site Request Forgery (CSRF) vulnerability in WP Hive Events Rich ...)
+ TODO: check
CVE-2024-4204 (The Bulk Posts Editing For WordPress plugin for WordPress is vulnerabl ...)
NOT-FOR-US: WordPress plugin
CVE-2024-3609 (The ReviewX \u2013 Multi-criteria Rating & Reviews for WooCommerce plu ...)
@@ -285,18 +847,22 @@ CVE-2024-4960 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as cri
CVE-2024-4956 (Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticate ...)
NOT-FOR-US: Sonatype Nexus Repository
CVE-2024-4950 (Inappropriate implementation in Downloads in Google Chrome prior to 12 ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4949 (Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4948 (Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2024-4947 (Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a ...)
+ {DSA-5694-1}
- chromium 125.0.6422.60-1
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
@@ -1248,7 +1814,7 @@ CVE-2024-4778 (Memory safety bugs present in Firefox 125. Some of these bugs sho
- firefox 126.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4778
CVE-2024-4777 (Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thu ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1274,7 +1840,7 @@ CVE-2024-4771 (A memory allocation check was missing which would lead to a use-a
- firefox 126.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4771
CVE-2024-4770 (When saving a page to PDF, certain font styles could have led to a pot ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1282,7 +1848,7 @@ CVE-2024-4770 (When saving a page to PDF, certain font styles could have led to
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4770
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
CVE-2024-4769 (When importing resources using Web Workers, error messages would disti ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1290,7 +1856,7 @@ CVE-2024-4769 (When importing resources using Web Workers, error messages would
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4769
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4769
CVE-2024-4768 (A bug in popup notifications' interaction with WebAuthn made it easier ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1298,7 +1864,7 @@ CVE-2024-4768 (A bug in popup notifications' interaction with WebAuthn made it e
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4768
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4768
CVE-2024-4767 (If the `browser.privatebrowsing.autostart` preference is enabled, Inde ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -1312,7 +1878,7 @@ CVE-2024-4765 (Web application manifests were stored by using an insecure MD5 ha
- firefox <not-affected> (Android-specific)
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4765
CVE-2024-4367 (A type check was missing when handling fonts in PDF.js, which would al ...)
- {DSA-5691-1 DLA-3815-1}
+ {DSA-5693-1 DSA-5691-1 DLA-3815-1}
- firefox 126.0-1
- firefox-esr 115.11.0esr-1
- thunderbird 1:115.11.0-1
@@ -29002,7 +29568,7 @@ CVE-2023-6516 (To keep its cache database efficient, `named` running as a recurs
NOTE: Issue is specific to 9.16.y. Mark the first version from 9.17.y series
NOTE: which entered unstable as the fixed version as workaround.
CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6 ...)
- {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+ {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
- bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
@@ -29044,7 +29610,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4
NOTE: https://github.com/systemd/systemd-stable/commit/b43bcb51ebf9aea21b1e280e1872056994e3f53d (v252.23)
NOTE: systemd: DNSSEC is default to off in systemd-resolved
CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 whe ...)
- {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3736-1}
+ {DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
- bind9 1:9.19.21-1
- dnsmasq 2.90-1
- knot-resolver 5.7.1-1
@@ -247570,8 +248136,8 @@ CVE-2021-22510 (Reflected XSS vulnerability in Micro Focus Application Automatio
NOT-FOR-US: Jenkins plugin
CVE-2021-22509
RESERVED
-CVE-2021-22508
- RESERVED
+CVE-2021-22508 (A potential vulnerability has been identified for OpenText Operations ...)
+ TODO: check
CVE-2021-22507 (Authentication bypass vulnerability in Micro Focus Operations Bridge M ...)
NOT-FOR-US: Micro Focus
CVE-2021-22506 (Advance configuration exposing Information Leakage vulnerability in Mi ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6d614d57a2311baf962f2486d356a13873175c9c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240517/ed7ed568/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list