Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: e8ab90bf by security tracker role at 2024-01-26T20:12:22+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,149 @@ +CVE-2024-23896 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23894 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23893 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23892 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23891 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23890 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23889 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23888 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23887 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23886 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23885 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23884 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23883 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23882 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23881 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23880 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23879 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23878 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23877 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23876 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23875 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23874 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23873 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23872 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23871 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23870 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23869 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23868 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23867 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23866 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23865 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23864 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23863 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23862 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23861 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23860 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23859 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23858 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23857 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23856 (A vulnerability has been reported in Cups Easy (Purchase & Inventory), ...) + TODO: check +CVE-2024-23820 (OpenFGA, an authorization/permission engine, is vulnerable to a denial ...) + TODO: check +CVE-2024-22551 (WhatACart v2.0.7 was discovered to contain a reflected cross-site scri ...) + TODO: check +CVE-2024-22550 (An arbitrary file upload vulnerability in the component /alsdemo/ss/me ...) + TODO: check +CVE-2024-21985 (ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 a ...) + TODO: check +CVE-2024-21336 (Microsoft Edge (Chromium-based) Spoofing Vulnerability) + TODO: check +CVE-2024-20305 (A vulnerability in the web-based management interface of Cisco Unity C ...) + TODO: check +CVE-2024-20263 (A vulnerability with the access control list (ACL) management within a ...) + TODO: check +CVE-2024-20253 (A vulnerability in multiple Cisco Unified Communications and Contact C ...) + TODO: check +CVE-2024-0944 (A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. It has ...) + TODO: check +CVE-2024-0943 (A vulnerability was found in Totolink N350RT 9.3.5u.6255. It has been ...) + TODO: check +CVE-2024-0942 (A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. ...) + TODO: check +CVE-2024-0941 (A vulnerability was found in Novel-Plus 4.3.0-RC1 and classified as cr ...) + TODO: check +CVE-2024-0939 (A vulnerability has been found in Beijing Baichuo Smart S210 Managemen ...) + TODO: check +CVE-2024-0938 (A vulnerability, which was classified as critical, was found in Tongda ...) + TODO: check +CVE-2024-0937 (A vulnerability, which was classified as critical, has been found in v ...) + TODO: check +CVE-2024-0936 (A vulnerability classified as critical was found in van_der_Schaar LAB ...) + TODO: check +CVE-2024-0933 (A vulnerability was found in Niushop B2B2C V5 and classified as critic ...) + TODO: check +CVE-2024-0932 (A vulnerability, which was classified as critical, has been found in T ...) + TODO: check +CVE-2024-0931 (A vulnerability classified as critical was found in Tenda AC10U 15.03. ...) + TODO: check +CVE-2024-0930 (A vulnerability classified as critical has been found in Tenda AC10U 1 ...) + TODO: check +CVE-2024-0929 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...) + TODO: check +CVE-2024-0928 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...) + TODO: check +CVE-2024-0927 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It h ...) + TODO: check +CVE-2024-0926 (A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01 and c ...) + TODO: check +CVE-2024-0925 (A vulnerability has been found in Tenda AC10U 15.03.06.49_multi_TDE01 ...) + TODO: check +CVE-2024-0924 (A vulnerability, which was classified as critical, was found in Tenda ...) + TODO: check +CVE-2024-0923 (A vulnerability, which was classified as critical, has been found in T ...) + TODO: check +CVE-2024-0922 (A vulnerability classified as critical was found in Tenda AC10U 15.03. ...) + TODO: check +CVE-2024-0921 (A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and clas ...) + TODO: check +CVE-2024-0920 (A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It has been ...) + TODO: check +CVE-2024-0919 (A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It has been ...) + TODO: check +CVE-2024-0918 (A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified ...) + TODO: check +CVE-2022-48622 (In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows ...) + TODO: check CVE-2024-24399 (An arbitrary file upload vulnerability in LeptonCMS v7.0.0 allows auth ...) NOT-FOR-US: LeptonCMS CVE-2024-23630 (An arbitrary firmware upload vulnerability exists in the Motorola MR2 ...) @@ -214,7 +360,7 @@ CVE-2023-33757 (A lack of SSL certificate validation in Splicecom iPCS (iOS App) NOT-FOR-US: SpliceCom CVE-2024-0822 (An authentication bypass vulnerability was found in overt-engine. This ...) NOT-FOR-US: ovirt-engine -CVE-2024-0727 [Add NULL checks where ContentInfo data can be NULL] +CVE-2024-0727 (Issue summary: Processing a maliciously formatted PKCS12 file may lead ...) - openssl <unfixed> [bookworm] - openssl <no-dsa> (Minor issue) [bullseye] - openssl <no-dsa> (Minor issue) @@ -9767,7 +9913,7 @@ CVE-2023-6458 (Mattermost webapp fails to validateroute parameters in/<TEAM_NAME - mattermost-server <itp> (bug #823556) CVE-2023-6393 (A flaw was found in the Quarkus Cache Runtime. When request processing ...) NOT-FOR-US: Quarkus -CVE-2023-6291 +CVE-2023-6291 (A flaw was found in the redirect_uri validation logic in Keycloak. Thi ...) NOT-FOR-US: Keycloak CVE-2023-6288 (Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on mac ...) NOT-FOR-US: Devolutions @@ -10103,7 +10249,7 @@ CVE-2023-47106 (Traefik is an open source HTTP reverse proxy and load balancer. - traefik <itp> (bug #983289) CVE-2023-45781 (In parse_gap_data of utils.cc, there is a possible out of bounds read ...) NOT-FOR-US: Android -CVE-2023-45779 (In TBD of TBD, there is a possible malicious update to platform compon ...) +CVE-2023-45779 (In the APEX module framework of AOSP, there is a possible malicious up ...) NOT-FOR-US: Android CVE-2023-45777 (In checkKeyIntentParceledCorrectly of AccountManagerService.java, ther ...) NOT-FOR-US: Android @@ -46653,8 +46799,8 @@ CVE-2023-29083 RESERVED CVE-2023-29082 RESERVED -CVE-2023-29081 - RESERVED +CVE-2023-29081 (A vulnerability has been reported in Suite Setups built with versions ...) + TODO: check CVE-2023-29080 RESERVED CVE-2023-29079 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits