[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Nov 26 08:12:12 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c6b96c31 by security tracker role at 2024-11-26T08:12:06+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,26 +1,126 @@
-CVE-2024-53102 [nvme: make keep-alive synchronous operation]
+CVE-2024-9504 (The Booking calendar, Appointment Booking System plugin for WordPress ...)
+ TODO: check
+CVE-2024-8772 (51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the ...)
+ TODO: check
+CVE-2024-8160 (Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that ...)
+ TODO: check
+CVE-2024-6831 (Seth Fogie, member of AXIS Camera Station Pro Bug Bounty Program has f ...)
+ TODO: check
+CVE-2024-6749 (Seth Fogie, member of the AXIS Camera Station Pro Bug Bounty Program, ...)
+ TODO: check
+CVE-2024-6476 (Gee-netics, member of the AXIS Camera Station Pro Bug Bounty Program h ...)
+ TODO: check
+CVE-2024-53843 (@dapperduckling/keycloak-connector-server is an opinionated series of ...)
+ TODO: check
+CVE-2024-53597 (masterstack_imgcap v0.0.1 was discovered to contain a SQL injection vu ...)
+ TODO: check
+CVE-2024-53556 (An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to red ...)
+ TODO: check
+CVE-2024-53554 (A Client-Side Template Injection (CSTI) vulnerability in the component ...)
+ TODO: check
+CVE-2024-53278 (Cross-site scripting vulnerability exists in WP Admin UI Customize ver ...)
+ TODO: check
+CVE-2024-52899 (IBM Data Virtualization Manager for z/OS 1.1 and 1.2 could allow an au ...)
+ TODO: check
+CVE-2024-50672 (A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool ...)
+ TODO: check
+CVE-2024-50671 (Incorrect access control in Adapt Learning Adapt Authoring Tool <= 0.1 ...)
+ TODO: check
+CVE-2024-49597 (Dell Wyse Management Suite, versions WMS 4.4 and prior, contain an Imp ...)
+ TODO: check
+CVE-2024-49596 (Dell Wyse Management Suite, version WMS 4.4 and prior, contain a Missi ...)
+ TODO: check
+CVE-2024-49595 (Dell Wyse Management Suite, version WMS 4.4 and before, contain an Aut ...)
+ TODO: check
+CVE-2024-49353 (IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data 4.0.0 ...)
+ TODO: check
+CVE-2024-49351 (IBM Workload Scheduler 9.5, 10.1, and 10.2 stores user credentials in ...)
+ TODO: check
+CVE-2024-47257 (Florent Thi\xe9ry has found that selected Axis devices were vulnerable ...)
+ TODO: check
+CVE-2024-36254 (Out-of-bounds read vulnerability exists in Sharp Corporation and Toshi ...)
+ TODO: check
+CVE-2024-36251 (The web interface of the affected devices process some crafted HTTP re ...)
+ TODO: check
+CVE-2024-36249 (Cross-site scripting vulnerability exists in Sharp Corporation and Tos ...)
+ TODO: check
+CVE-2024-36248 (API keys for some cloud services are hardcoded in the "main" binary. A ...)
+ TODO: check
+CVE-2024-35244 (There are several hidden accounts. Some of them are intended for maint ...)
+ TODO: check
+CVE-2024-34162 (The web interface of the affected devices is designed to hide the LDAP ...)
+ TODO: check
+CVE-2024-33616 (Admin authentication can be bypassed with some specific invalid creden ...)
+ TODO: check
+CVE-2024-33610 ("sessionlist.html" and "sys_trayentryreboot.html" are accessible with ...)
+ TODO: check
+CVE-2024-33605 (Improper processing of some parameters of installed_emanual_list.html ...)
+ TODO: check
+CVE-2024-32151 (User passwords are decrypted and stored on memory before any user logg ...)
+ TODO: check
+CVE-2024-29978 (User passwords are decrypted and stored on memory before any user logg ...)
+ TODO: check
+CVE-2024-29146 (User passwords are decrypted and stored on memory before any user logg ...)
+ TODO: check
+CVE-2024-28955 (Affected devices create coredump files when crashed, storing them with ...)
+ TODO: check
+CVE-2024-28038 (The web interface of the affected devices processes a cookie value imp ...)
+ TODO: check
+CVE-2024-11678 (A vulnerability was found in CodeAstro Hospital Management System 1.0. ...)
+ TODO: check
+CVE-2024-11677 (A vulnerability was found in CodeAstro Hospital Management System 1.0. ...)
+ TODO: check
+CVE-2024-11676 (A vulnerability was found in CodeAstro Hospital Management System 1.0 ...)
+ TODO: check
+CVE-2024-11675 (A vulnerability has been found in CodeAstro Hospital Management System ...)
+ TODO: check
+CVE-2024-11674 (A vulnerability, which was classified as critical, was found in CodeAs ...)
+ TODO: check
+CVE-2024-11673 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2024-11418 (The Additional Order Filters for WooCommerce plugin for WordPress is v ...)
+ TODO: check
+CVE-2024-11342 (The Skt NURCaptcha plugin for WordPress is vulnerable to Cross-Site Re ...)
+ TODO: check
+CVE-2024-11202 (Multiple plugins for WordPress are vulnerable to Reflected Cross-Site ...)
+ TODO: check
+CVE-2024-11002 (The The InPost Gallery plugin for WordPress is vulnerable to arbitrary ...)
+ TODO: check
+CVE-2024-10857 (The Product Input Fields for WooCommerce plugin for WordPress is vulne ...)
+ TODO: check
+CVE-2024-10781 (The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordP ...)
+ TODO: check
+CVE-2024-10729 (The Booking & Appointment Plugin for WooCommerce plugin for WordPress ...)
+ TODO: check
+CVE-2024-10570 (The Security & Malware scan by CleanTalk plugin for WordPress is vulne ...)
+ TODO: check
+CVE-2024-10542 (The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordP ...)
+ TODO: check
+CVE-2024-10471 (The Everest Forms WordPress plugin before 3.0.4.2 does not sanitise a ...)
+ TODO: check
+CVE-2024-53102 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.11.9-1
[bookworm] - linux 6.1.119-1
NOTE: https://git.kernel.org/linus/d06923670b5a5f609603d4a9fee4dec02d38de9c (6.12-rc4)
-CVE-2024-53101 [fs: Fix uninitialized value issue in from_kuid and from_kgid]
+CVE-2024-53101 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.11.9-1
[bookworm] - linux 6.1.119-1
NOTE: https://git.kernel.org/linus/15f34347481648a567db67fb473c23befb796af5 (6.12-rc5)
-CVE-2024-53100 [nvme: tcp: avoid race between queue_lock lock and destroy]
+CVE-2024-53100 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.11.9-1
[bookworm] - linux 6.1.119-1
NOTE: https://git.kernel.org/linus/782373ba27660ba7d330208cf5509ece6feb4545 (6.12-rc4)
-CVE-2024-53099 [bpf: Check validity of link->type in bpf_link_show_fdinfo()]
+CVE-2024-53099 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.11.9-1
NOTE: https://git.kernel.org/linus/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7 (6.12-rc5)
-CVE-2024-53098 [drm/xe/ufence: Prefetch ufence addr to catch bogus address]
+CVE-2024-53098 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.11.9-1
NOTE: https://git.kernel.org/linus/9c1813b3253480b30604c680026c7dc721ce86d1 (6.12-rc5)
-CVE-2024-53097 [mm: krealloc: Fix MTE false alarm in __do_krealloc]
+CVE-2024-53097 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.11.9-1
[bookworm] - linux 6.1.119-1
NOTE: https://git.kernel.org/linus/704573851b51808b45dae2d62059d1d8189138a2 (6.12-rc6)
-CVE-2024-53096 [mm: resolve faulty mmap_region() error path behaviour]
+CVE-2024-53096 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
[bookworm] - linux 6.1.119-1
NOTE: https://git.kernel.org/linus/5de195060b2e251a835f622759550e6202167641 (6.12-rc7)
@@ -12168,7 +12268,7 @@ CVE-2024-8625 (The TS Poll WordPress plugin before 2.4.0 does not sanitize and
NOT-FOR-US: WordPress plugin
CVE-2024-49215 (An issue was discovered in Sangoma Asterisk through 18.20.0, 19.x and ...)
NOTE: seems bogus, reached out to upstream
-CVE-2024-43689 (Stack-based buffer overflow vulnerability exists in WAB-I1750-PS and W ...)
+CVE-2024-43689 (Stack-based buffer overflow vulnerability exists in ELECOM wireless ac ...)
NOT-FOR-US: ELECOM
CVE-2024-10202 (Administrative Management System from Wellchoose has an OS Command Inj ...)
NOT-FOR-US: Wellchoose Administrative Management System
@@ -23048,7 +23148,7 @@ CVE-2024-44944 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.10.3-1
[bookworm] - linux 6.1.106-1
NOTE: https://git.kernel.org/linus/782161895eb4ac45cf7cfa8db375bd4766cb8299 (6.11-rc1)
-CVE-2024-42412 (Cross-site scripting vulnerability exists in WAB-I1750-PS and WAB-S116 ...)
+CVE-2024-42412 (Cross-site scripting vulnerability exists in ELECOM wireless access po ...)
NOT-FOR-US: WAB-I1750-PS and WAB-S1167-PS
CVE-2024-41349 (unmark 1.9.2 is vulnerable to Cross Site Scripting (XSS) via applicati ...)
NOT-FOR-US: unmark
@@ -199499,7 +199599,7 @@ CVE-2022-33862 (IPP software prior to v1.71 is vulnerable to default credential
CVE-2022-33861 (IPP software versions prior to v1.71 do not sufficiently verify the au ...)
TODO: check
CVE-2022-33860
- RESERVED
+ REJECTED
CVE-2022-33859 (A security vulnerability was discovered in the Eaton Foreseer EPMS sof ...)
NOT-FOR-US: Eaton Foreseer EPMS
CVE-2022-33858
@@ -360661,7 +360761,8 @@ CVE-2020-11313
REJECTED
CVE-2020-11312
REJECTED
-CVE-2020-11311 (This record is rejected as duplicate. All references should point to C ...)
+CVE-2020-11311
+ REJECTED
TODO: check
CVE-2020-11310
REJECTED
@@ -467690,7 +467791,7 @@ CVE-2018-11883 (In all android releases (Android for MSM, Firefox OS for MSM, QR
CVE-2018-11882 (Incorrect bound check can lead to potential buffer overwrite in WLAN c ...)
NOT-FOR-US: Qualcomm components for Android
CVE-2018-11881
- RESERVED
+ REJECTED
CVE-2018-11880 (Incorrect bound check can lead to potential buffer overwrite in WLAN f ...)
NOT-FOR-US: Qualcomm components for Android
CVE-2018-11879 (When the buffer length passed is very large, bounds check could be byp ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c6b96c31436757d0f7f5eafd32048b3a47d94b22
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c6b96c31436757d0f7f5eafd32048b3a47d94b22
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241126/c4d0afc6/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list