[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Sep 4 21:14:35 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3b0028ff by security tracker role at 2024-09-04T20:12:42+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,351 @@
+CVE-2024-8418 (A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They cont ...)
+ TODO: check
+CVE-2024-8417 (A vulnerability was found in \u4e91\u8bfe\u7f51\u7edc\u79d1\u6280\u670 ...)
+ TODO: check
+CVE-2024-8416 (A vulnerability was found in SourceCodester Food Ordering Management S ...)
+ TODO: check
+CVE-2024-8415 (A vulnerability was found in SourceCodester Food Ordering Management S ...)
+ TODO: check
+CVE-2024-8414 (A vulnerability has been found in SourceCodester Insurance Management ...)
+ TODO: check
+CVE-2024-8413 (Cross Site Scripting (XSS) vulnerability through the action parameter ...)
+ TODO: check
+CVE-2024-8412 (A vulnerability, which was classified as problematic, was found in Lin ...)
+ TODO: check
+CVE-2024-8411 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2024-8410 (A vulnerability classified as problematic was found in ABCD ABCD2 up t ...)
+ TODO: check
+CVE-2024-8409 (A vulnerability classified as problematic has been found in ABCD ABCD2 ...)
+ TODO: check
+CVE-2024-8408 (A vulnerability was found in Linksys WRT54G 4.21.5. It has been rated ...)
+ TODO: check
+CVE-2024-8407 (A vulnerability was found in alwindoss akademy up to 35caccea888ed63d5 ...)
+ TODO: check
+CVE-2024-8399 (Websites could utilize Javascript links to spoof URL addresses in the ...)
+ TODO: check
+CVE-2024-8391 (In Eclipse Vert.x version 4.3.0 to 4.5.9, the gRPC server does not lim ...)
+ TODO: check
+CVE-2024-8325 (The Blockspare: Gutenberg Blocks & Patterns for Blogs, Magazines, Busi ...)
+ TODO: check
+CVE-2024-8318 (The Attributes for Blocks plugin for WordPress is vulnerable to Stored ...)
+ TODO: check
+CVE-2024-8298 (Memory request vulnerability in the memory management module Impact: S ...)
+ TODO: check
+CVE-2024-8289 (The MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketpla ...)
+ TODO: check
+CVE-2024-8123 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8121 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8119 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8117 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8106 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8104 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-8102 (The The Ultimate WordPress Toolkit \u2013 WP Extended plugin for WordP ...)
+ TODO: check
+CVE-2024-7950 (The WP Job Portal \u2013 A Complete Recruitment System for Company or ...)
+ TODO: check
+CVE-2024-7923 (An authentication bypass vulnerability has been identified in Pulpcore ...)
+ TODO: check
+CVE-2024-7870 (The PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager and the ...)
+ TODO: check
+CVE-2024-7834 (A local privilege escalation is caused by Overwolf loading and executi ...)
+ TODO: check
+CVE-2024-7821
+ REJECTED
+CVE-2024-7786 (The Sensei LMS WordPress plugin before 4.24.2 does not properly prote ...)
+ TODO: check
+CVE-2024-7078 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2024-7077 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2024-7076 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2024-7012 (An authentication bypass vulnerability has been identified in Foreman ...)
+ TODO: check
+CVE-2024-6926 (The Viral Signup WordPress plugin through 2.1 does not properly sanit ...)
+ TODO: check
+CVE-2024-6889 (The Secure Copy Content Protection and Content Locking WordPress plugi ...)
+ TODO: check
+CVE-2024-6888 (The Secure Copy Content Protection and Content Locking WordPress plugi ...)
+ TODO: check
+CVE-2024-6722 (The Chatbot Support AI: Free ChatGPT Chatbot, Woocommerce Chatbot Word ...)
+ TODO: check
+CVE-2024-6020 (The Sign-up Sheets WordPress plugin before 2.2.13 does not escape some ...)
+ TODO: check
+CVE-2024-45507 (Server-Side Request Forgery (SSRF), Improper Control of Generation of ...)
+ TODO: check
+CVE-2024-45450 (Permission control vulnerability in the software update module. Impact ...)
+ TODO: check
+CVE-2024-45449 (Access permission verification vulnerability in the ringtone setting m ...)
+ TODO: check
+CVE-2024-45448 (Page table protection configuration vulnerability in the trusted firmw ...)
+ TODO: check
+CVE-2024-45447 (Access control vulnerability in the camera framework module Impact: Su ...)
+ TODO: check
+CVE-2024-45446 (Access permission verification vulnerability in the camera driver modu ...)
+ TODO: check
+CVE-2024-45445 (Vulnerability of resources not being closed or released in the keystor ...)
+ TODO: check
+CVE-2024-45444 (Access permission verification vulnerability in the WMS module Impact: ...)
+ TODO: check
+CVE-2024-45443 (Directory traversal vulnerability in the cust module Impact: Successfu ...)
+ TODO: check
+CVE-2024-45442 (Vulnerability of permission verification for APIs in the DownloadProvi ...)
+ TODO: check
+CVE-2024-45441 (Input verification vulnerability in the system service module Impact: ...)
+ TODO: check
+CVE-2024-45394 (Authenticator is a browser extensions that generates two-step verifica ...)
+ TODO: check
+CVE-2024-45314 (Flask-AppBuilder is an application development framework. Prior to ver ...)
+ TODO: check
+CVE-2024-45195 (Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. Thi ...)
+ TODO: check
+CVE-2024-45177 (An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 ...)
+ TODO: check
+CVE-2024-45174 (An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 ...)
+ TODO: check
+CVE-2024-45172 (An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 ...)
+ TODO: check
+CVE-2024-45170 (An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 ...)
+ TODO: check
+CVE-2024-45076 (IBM webMethods Integration 10.15 could allow an authenticated user to ...)
+ TODO: check
+CVE-2024-45075 (IBM webMethods Integration 10.15 could allow an authenticated user to ...)
+ TODO: check
+CVE-2024-45074 (IBM webMethods Integration 10.15 could allow an authenticated user to ...)
+ TODO: check
+CVE-2024-45053 (Fides is an open-source privacy engineering platform. Starting in vers ...)
+ TODO: check
+CVE-2024-45052 (Fides is an open-source privacy engineering platform. Prior to version ...)
+ TODO: check
+CVE-2024-45050 (Ringer server is the server code for the Ringer messaging app. Prior t ...)
+ TODO: check
+CVE-2024-45008 (In the Linux kernel, the following vulnerability has been resolved: I ...)
+ TODO: check
+CVE-2024-45007 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-45006 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-45005 (In the Linux kernel, the following vulnerability has been resolved: K ...)
+ TODO: check
+CVE-2024-45004 (In the Linux kernel, the following vulnerability has been resolved: K ...)
+ TODO: check
+CVE-2024-45003 (In the Linux kernel, the following vulnerability has been resolved: v ...)
+ TODO: check
+CVE-2024-45002 (In the Linux kernel, the following vulnerability has been resolved: r ...)
+ TODO: check
+CVE-2024-45001 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-45000 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-44999 (In the Linux kernel, the following vulnerability has been resolved: g ...)
+ TODO: check
+CVE-2024-44998 (In the Linux kernel, the following vulnerability has been resolved: a ...)
+ TODO: check
+CVE-2024-44997 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44996 (In the Linux kernel, the following vulnerability has been resolved: v ...)
+ TODO: check
+CVE-2024-44995 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44994 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-44993 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44992 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44991 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-44990 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44989 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44988 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44987 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-44986 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-44985 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-44984 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44983 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44982 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44981 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-44980 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44979 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44978 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44977 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44976 (In the Linux kernel, the following vulnerability has been resolved: a ...)
+ TODO: check
+CVE-2024-44975 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-44974 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-44973 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2024-44972 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44971 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44970 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2024-44969 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44968 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-44967 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44966 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44965 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-44964 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2024-44963 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2024-44962 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2024-44961 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44960 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-44959 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2024-44958 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44957 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-44956 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44955 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44954 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2024-44953 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44952 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2024-44951 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44950 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-44949 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2024-44948 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ TODO: check
+CVE-2024-44859 (Tenda FH1201 v1.2.0.14 has a stack buffer overflow vulnerability in `f ...)
+ TODO: check
+CVE-2024-44821 (ZZCMS 2023 contains a vulnerability in the captcha reuse logic located ...)
+ TODO: check
+CVE-2024-44820 (A sensitive information disclosure vulnerability exists in ZZCMS v.202 ...)
+ TODO: check
+CVE-2024-44819 (Cross Site Scripting vulnerability in ZZCMS v.2023 and before allows a ...)
+ TODO: check
+CVE-2024-44818 (Cross Site Scripting vulnerability in ZZCMS v.2023 and before allows a ...)
+ TODO: check
+CVE-2024-44817 (SQL Injection vulnerability in ZZCMS v.2023 and before allows a remote ...)
+ TODO: check
+CVE-2024-44809 (A remote code execution (RCE) vulnerability exists in the Pi Camera pr ...)
+ TODO: check
+CVE-2024-44808 (An issue in Vypor Attack API System v.1.0 allows a remote attacker to ...)
+ TODO: check
+CVE-2024-44400 (D-Link DI-8400 16.07.26A1 is vulnerable to Command Injection via upgra ...)
+ TODO: check
+CVE-2024-44383 (WAYOS FBM-291W v19.09.11 is vulnerable to Command Execution via msp_in ...)
+ TODO: check
+CVE-2024-43405 (Nuclei is a vulnerability scanner powered by YAML based templates. Sta ...)
+ TODO: check
+CVE-2024-43402 (Rust is a programming language. The fix for CVE-2024-24576, where `std ...)
+ TODO: check
+CVE-2024-42642 (Micron Crucial MX500 Series Solid State Drives M3CR046 is vulnerable t ...)
+ TODO: check
+CVE-2024-42039 (Access control vulnerability in the SystemUI module Impact: Successful ...)
+ TODO: check
+CVE-2024-41927 (Cleartext transmission of sensitive information vulnerability exists i ...)
+ TODO: check
+CVE-2024-41716 (Cleartext storage of sensitive information vulnerability exists in Win ...)
+ TODO: check
+CVE-2024-41434 (PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via th ...)
+ TODO: check
+CVE-2024-41433 (PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via th ...)
+ TODO: check
+CVE-2024-39921 (Observable timing discrepancy issue exists in IPCOM EX2 Series V01L02N ...)
+ TODO: check
+CVE-2024-34661 (Improper handling of insufficient permissions in Samsung Assistant pri ...)
+ TODO: check
+CVE-2024-34660 (Heap-based out-of-bounds write in Samsung Notes prior to version 4.4.2 ...)
+ TODO: check
+CVE-2024-34659 (Exposure of sensitive information in GroupSharing prior to version 13. ...)
+ TODO: check
+CVE-2024-34658 (Out-of-bounds read in Samsung Notes allows local attackers to bypass A ...)
+ TODO: check
+CVE-2024-34657 (Stack-based out-of-bounds write in Samsung Notes prior to version 4.4. ...)
+ TODO: check
+CVE-2024-34656 (Path traversal in Samsung Notes prior to version 4.4.21.62 allows loca ...)
+ TODO: check
+CVE-2024-34655 (Incorrect use of privileged API in UniversalCredentialManager prior to ...)
+ TODO: check
+CVE-2024-34654 (Improper Export of android application component in My Files prior to ...)
+ TODO: check
+CVE-2024-34653 (Path Traversal in My Files prior to SMR Sep-2024 Release 1 allows phys ...)
+ TODO: check
+CVE-2024-34652 (Incorrect authorization in kperfmon prior to SMR Sep-2024 Release 1 al ...)
+ TODO: check
+CVE-2024-34651 (Improper authorization in My Files prior to SMR Sep-2024 Release 1 all ...)
+ TODO: check
+CVE-2024-34650 (Incorrect authorization in CocktailbarService prior to SMR Sep-2024 Re ...)
+ TODO: check
+CVE-2024-34649 (Improper access control in new Dex Mode in multitasking framework prio ...)
+ TODO: check
+CVE-2024-34648 (Improper Handling of Insufficient Permissions in KnoxMiscPolicy prior ...)
+ TODO: check
+CVE-2024-34647 (Incorrect use of privileged API in DualDarManagerProxy prior to SMR Se ...)
+ TODO: check
+CVE-2024-34646 (Improper access control in DualDarManagerProxy prior to SMR Sep-2024 R ...)
+ TODO: check
+CVE-2024-34645 (Improper input validation in ThemeCenter prior to SMR Sep-2024 Release ...)
+ TODO: check
+CVE-2024-34644 (Improper access control in item selection related in Dressroom prior t ...)
+ TODO: check
+CVE-2024-34643 (Improper access control in key input related function in Dressroom pri ...)
+ TODO: check
+CVE-2024-34642 (Improper authorization in One UI Home prior to SMR Sep-2024 Release 1 ...)
+ TODO: check
+CVE-2024-34641 (Improper Export of Android Application Components in FeliCaTest prior ...)
+ TODO: check
+CVE-2024-34640 (Improper access control vulnerability in BGProtectManager prior to SMR ...)
+ TODO: check
+CVE-2024-34639 (Improper handling of exceptional conditions in Setupwizard prior to SM ...)
+ TODO: check
+CVE-2024-34638 (Improper handling of exceptional conditions in ThemeCenter prior to SM ...)
+ TODO: check
+CVE-2024-34637 (Improper access control in WindowManagerService prior to SMR Sep-2024 ...)
+ TODO: check
+CVE-2024-20503 (A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authen ...)
+ TODO: check
+CVE-2024-20497 (A vulnerability in Cisco Expressway Edge (Expressway-E) could allow an ...)
+ TODO: check
+CVE-2024-20469 (A vulnerability in specific CLI commands in Cisco Identity Services En ...)
+ TODO: check
+CVE-2024-20440 (A vulnerability in Cisco Smart Licensing Utility could allow an unauth ...)
+ TODO: check
+CVE-2024-20439 (A vulnerability in Cisco Smart Licensing Utility could allow an unauth ...)
+ TODO: check
CVE-2024-44082
- ironic <unfixed>
- ironic-python-agent <unfixed>
@@ -11,10 +359,10 @@ CVE-2024-45160
NOTE: Introduced by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/06d771cbc2d5c752354c50f83e4912e5879f9aa2 (v2.18.0)
NOTE: Unit test: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/236cdfe42c1dc04a15a4a40c5e6a8c2e858d71d7 (v2.19.2)
NOTE: Fixed by: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/696f49a0855faeb271096dccb8381e2129687c3d (v2.19.2)
-CVE-2024-7970
+CVE-2024-7970 (Out of bounds write in V8 in Google Chrome prior to 128.0.6613.119 all ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2024-8362
+CVE-2024-8362 (Use after free in WebAudio in Google Chrome prior to 128.0.6613.119 al ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
CVE-2024-8389 (Memory safety bugs present in Firefox 129. Some of these bugs showed e ...)
@@ -33,21 +381,25 @@ CVE-2024-8385 (A difference in the handling of StructFields and ArrayTypes in WA
- firefox 130.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-39/#CVE-2024-8385
CVE-2024-8384 (The JavaScript garbage collector could mis-color cross-compartment obj ...)
+ {DSA-5765-1 DLA-3869-1}
- firefox 130.0-1
- firefox-esr 115.15.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-39/#CVE-2024-8384
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-41/#CVE-2024-8384
CVE-2024-8383 (Firefox normally asks for confirmation before asking the operating sys ...)
+ {DSA-5765-1 DLA-3869-1}
- firefox 130.0-1
- firefox-esr 115.15.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-39/#CVE-2024-8383
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-41/#CVE-2024-8383
CVE-2024-8382 (Internal browser event interfaces were exposed to web content when pri ...)
+ {DSA-5765-1 DLA-3869-1}
- firefox 130.0-1
- firefox-esr 115.15.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-39/#CVE-2024-8382
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-41/#CVE-2024-8382
CVE-2024-8381 (A potentially exploitable type confusion could be triggered when looki ...)
+ {DSA-5765-1 DLA-3869-1}
- firefox 130.0-1
- firefox-esr 115.15.0esr-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-39/#CVE-2024-8381
@@ -146,7 +498,7 @@ CVE-2024-45230
- python-django 3:4.2.16-1
NOTE: https://www.djangoproject.com/weblog/2024/sep/03/security-releases/
NOTE: https://github.com/django/django/commit/d147a8ebbdf28c17cafbbe2884f0bc57e2bf82e2 (4.2.16)
-CVE-2024-45506
+CVE-2024-45506 (HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1 ...)
- haproxy 2.9.10-1
[bookworm] - haproxy <not-affected> (Only exploitable with zero-copy-forward)
[bullseye] - haproxy <not-affected> (Only exploitable with zero-copy-forward)
@@ -182,27 +534,27 @@ CVE-2024-42057 (A command injection vulnerability in the IPSec VPN feature of Zy
NOT-FOR-US: Zyxel
CVE-2024-37136 (Dell Path to PowerProtect, versions 1.1, 1.2, contains an Exposure of ...)
NOT-FOR-US: Dell
-CVE-2024-45620
+CVE-2024-45620 (A vulnerability was found in the pkcs15-init tool in OpenSC. An attack ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309289
-CVE-2024-45619
+CVE-2024-45619 (A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, min ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309288
-CVE-2024-45618
+CVE-2024-45618 (A vulnerability was found in pkcs15-init in OpenSC. An attacker could ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309287
-CVE-2024-45617
+CVE-2024-45617 (A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, min ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309286
-CVE-2024-45616
+CVE-2024-45616 (A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, min ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309290
-CVE-2024-45615
+CVE-2024-45615 (A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, min ...)
- opensc <unfixed>
[bookworm] - opensc <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2309285
@@ -1022,7 +1374,7 @@ CVE-2024-39771 (QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and ea
NOT-FOR-US: QBiC CLOUD
CVE-2024-39584 (Dell Client Platform BIOS contains a Use of Default Cryptographic Key ...)
NOT-FOR-US: Dell
-CVE-2023-45896 (ntfs3 in the Linux kernel before 6.5.11 allows a physically proximate ...)
+CVE-2023-45896 (ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate ...)
- linux 6.5.13-1 (unimportant)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/013ff63b649475f0ee134e2c8d0c8e65284ede50 (6.6-rc7)
@@ -11687,7 +12039,8 @@ CVE-2023-52885 (In the Linux kernel, the following vulnerability has been resolv
NOTE: https://git.kernel.org/linus/fc80fc2d4e39137869da3150ee169b40bf879287 (6.5-rc1)
CVE-2024-6465 (The WP Links Page plugin for WordPress is vulnerable to unauthorized m ...)
NOT-FOR-US: WordPress plugin
-CVE-2024-6716 (A flaw was found in the libtiff library. An out-of-memory issue in the ...)
+CVE-2024-6716
+ REJECTED
- tiff <unfixed> (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2297636
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/620
@@ -64729,7 +65082,7 @@ CVE-2023-52108 (Vulnerability of process priorities being raised in the Activity
NOT-FOR-US: Huawei
CVE-2023-52107 (Vulnerability of permissions being not strictly verified in the WMS mo ...)
NOT-FOR-US: Huawei
-CVE-2023-52106 (The DownloadProviderMain module has a vulnerability in API permission ...)
+CVE-2023-52106 (Vulnerability of permission verification for APIs in the DownloadProvi ...)
NOT-FOR-US: Huawei
CVE-2023-52105 (The nearby module has a privilege escalation vulnerability. Successful ...)
NOT-FOR-US: Huawei
@@ -99233,7 +99586,8 @@ CVE-2023-34249 (benjjvi/PyBB is an open source bulletin board. Prior to commit d
NOT-FOR-US: benjjvi/PyBB
CVE-2023-34247 (Keystone is a content management system for Node.JS. There is an open ...)
NOT-FOR-US: Keystone CMS
-CVE-2023-34122 (Improper input validation in the installer for Zoom for Windows clien ...)
+CVE-2023-34122
+ REJECTED
NOT-FOR-US: Zoom
CVE-2023-34121 (Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom V ...)
NOT-FOR-US: Zoom
@@ -99243,7 +99597,8 @@ CVE-2023-34115 (Buffer copy without checking size of input in Zoom Meeting SDK
NOT-FOR-US: Zoom
CVE-2023-34114 (Exposure of resource to wrong sphere in Zoom for Windows and Zoom for ...)
NOT-FOR-US: Zoom
-CVE-2023-34113 (Insufficient verification of data authenticity in Zoom for Windows cl ...)
+CVE-2023-34113
+ REJECTED
NOT-FOR-US: Zoom
CVE-2023-33921 (A vulnerability has been identified in CP-8031 MASTER MODULE (All vers ...)
NOT-FOR-US: Siemens
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b0028ff1302008fea6375c34c7f1c7ae6033c74
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b0028ff1302008fea6375c34c7f1c7ae6033c74
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240904/8c17ebc7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list