[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Oct 22 09:12:15 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
608e5648 by security tracker role at 2024-10-22T08:12:07+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,75 @@
+CVE-2024-9677 (The insufficiently protected credentials vulnerability in the CLI comm ...)
+ TODO: check
+CVE-2024-9627 (The TeploBot - Telegram Bot for WP plugin for WordPress is vulnerable ...)
+ TODO: check
+CVE-2024-9591 (The Category and Taxonomy Image plugin for WordPress is vulnerable to ...)
+ TODO: check
+CVE-2024-9590 (The Category and Taxonomy Meta Fields plugin for WordPress is vulnerab ...)
+ TODO: check
+CVE-2024-9589 (The Category and Taxonomy Meta Fields plugin for WordPress is vulnerab ...)
+ TODO: check
+CVE-2024-9588 (The Category and Taxonomy Meta Fields plugin for WordPress is vulnerab ...)
+ TODO: check
+CVE-2024-9541 (The News Kit Elementor Addons plugin for WordPress is vulnerable to Se ...)
+ TODO: check
+CVE-2024-8901 (The AWS ALB Route Directive Adapter For Istio repo https://github.com ...)
+ TODO: check
+CVE-2024-8852 (The All-in-One WP Migration and Backup plugin for WordPress is vulnera ...)
+ TODO: check
+CVE-2024-47224 (A vulnerability in the AWV (Audio, Web and Video Conferencing) compone ...)
+ TODO: check
+CVE-2024-41714 (A vulnerability in the Web Interface component of Mitel MiCollab throu ...)
+ TODO: check
+CVE-2024-41713 (A vulnerability in the NuPoint Unified Messaging (NPM) component of Mi ...)
+ TODO: check
+CVE-2024-41712 (A vulnerability in the Web Conferencing Component of Mitel MiCollab th ...)
+ TODO: check
+CVE-2024-40091 (Vilo 5 Mesh WiFi System <= 5.16.1.33 lacks authentication in the Boa w ...)
+ TODO: check
+CVE-2024-40090 (Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disc ...)
+ TODO: check
+CVE-2024-40089 (A Command Injection vulnerability in Vilo 5 Mesh WiFi System <= 5.16.1 ...)
+ TODO: check
+CVE-2024-40088 (A Directory Traversal vulnerability in the Boa webserver of Vilo 5 Mes ...)
+ TODO: check
+CVE-2024-40087 (Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Insecure Permiss ...)
+ TODO: check
+CVE-2024-40086 (A Buffer Overflow vulnerability in the local_app_set_router_wifi_SSID_ ...)
+ TODO: check
+CVE-2024-40085 (A Buffer Overflow vulnerability in the local_app_set_router_wan functi ...)
+ TODO: check
+CVE-2024-40084 (A Buffer Overflow in the Boa webserver of Vilo 5 Mesh WiFi System <= 5 ...)
+ TODO: check
+CVE-2024-40083 (A Buffer Overflow vulnerabilty in the local_app_set_router_token funct ...)
+ TODO: check
+CVE-2024-35315 (A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1. ...)
+ TODO: check
+CVE-2024-35314 (A vulnerability in the Desktop Client of Mitel MiCollab through 9.7.1. ...)
+ TODO: check
+CVE-2024-35287 (A vulnerability in the NuPoint Messenger (NPM) component of Mitel MiCo ...)
+ TODO: check
+CVE-2024-35286 (A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9 ...)
+ TODO: check
+CVE-2024-35285 (A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9 ...)
+ TODO: check
+CVE-2024-30160 (A vulnerability in the Suite Applications Services component of Mitel ...)
+ TODO: check
+CVE-2024-30159 (A vulnerability in the web conferencing component of Mitel MiCollab th ...)
+ TODO: check
+CVE-2024-30158 (A vulnerability in the web conferencing component of Mitel MiCollab th ...)
+ TODO: check
+CVE-2024-30157 (A vulnerability in the Suite Applications Services component of Mitel ...)
+ TODO: check
+CVE-2024-10125 (The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo https://g ...)
+ TODO: check
+CVE-2024-10003 (The Rover IDX plugin for WordPress is vulnerable to unauthorized acces ...)
+ TODO: check
+CVE-2024-10002 (The Rover IDX plugin for WordPress is vulnerable to Authentication Byp ...)
+ TODO: check
+CVE-2023-52919 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2023-52918 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
CVE-2024-8305 (prepareUnique index may cause secondaries to crash due to incorrect en ...)
- mongodb <removed>
CVE-2024-49368 (Nginx UI is a web user interface for the Nginx web server. Prior to ve ...)
@@ -255699,6 +255771,7 @@ CVE-2021-36089 (Grok 7.6.6 through 9.2.0 has a heap-based buffer overflow in grk
CVE-2021-36088 (Fluent Bit (aka fluent-bit) 1.7.0 through 1.7.4 has a double free in f ...)
NOT-FOR-US: Fluent Bit
CVE-2021-36087 (The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in e ...)
+ {DLA-3930-1}
- libsepol 3.3-1 (bug #990526)
[buster] - libsepol <no-dsa> (Minor issue)
[stretch] - libsepol <no-dsa> (Minor issue)
@@ -255707,6 +255780,7 @@ CVE-2021-36087 (The CIL compiler in SELinux 3.2 has a heap-based buffer over-rea
NOTE: https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac (3.3-rc1)
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
CVE-2021-36086 (The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_clas ...)
+ {DLA-3930-1}
- libsepol 3.3-1 (bug #990526)
[buster] - libsepol <no-dsa> (Minor issue)
[stretch] - libsepol <no-dsa> (Minor issue)
@@ -255714,6 +255788,7 @@ CVE-2021-36086 (The CIL compiler in SELinux 3.2 has a use-after-free in cil_rese
NOTE: https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 (3.3-rc1)
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
CVE-2021-36085 (The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_c ...)
+ {DLA-3930-1}
- libsepol 3.3-1 (bug #990526)
[buster] - libsepol <no-dsa> (Minor issue)
[stretch] - libsepol <no-dsa> (Minor issue)
@@ -255721,6 +255796,7 @@ CVE-2021-36085 (The CIL compiler in SELinux 3.2 has a use-after-free in __cil_ve
NOTE: https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba (3.3-rc1)
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
CVE-2021-36084 (The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_c ...)
+ {DLA-3930-1}
- libsepol 3.3-1 (bug #990526)
[buster] - libsepol <no-dsa> (Minor issue)
[stretch] - libsepol <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/608e5648c9a98d2ab9d75ac335f66270480cad31
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/608e5648c9a98d2ab9d75ac335f66270480cad31
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241022/4bcd8cdc/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list