Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e8ab90bf by security tracker role at 2024-01-26T20:12:22+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,149 @@
+CVE-2024-23896 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23894 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23893 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23892 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23891 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23890 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23889 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23888 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23887 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23886 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23885 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23884 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23883 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23882 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23881 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23880 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23879 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23878 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23877 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23876 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23875 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23874 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23873 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23872 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23871 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23870 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23869 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23868 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23867 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23866 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23865 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23864 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23863 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23862 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23861 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23860 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23859 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23858 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23857 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23856 (A vulnerability has been reported in Cups Easy (Purchase & 
Inventory), ...)
+       TODO: check
+CVE-2024-23820 (OpenFGA, an authorization/permission engine, is vulnerable to 
a denial ...)
+       TODO: check
+CVE-2024-22551 (WhatACart v2.0.7 was discovered to contain a reflected 
cross-site scri ...)
+       TODO: check
+CVE-2024-22550 (An arbitrary file upload vulnerability in the component 
/alsdemo/ss/me ...)
+       TODO: check
+CVE-2024-21985 (ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 
9.12.1P10  a ...)
+       TODO: check
+CVE-2024-21336 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
+       TODO: check
+CVE-2024-20305 (A vulnerability in the web-based management interface of Cisco 
Unity C ...)
+       TODO: check
+CVE-2024-20263 (A vulnerability with the access control list (ACL) management 
within a ...)
+       TODO: check
+CVE-2024-20253 (A vulnerability in multiple Cisco Unified Communications and 
Contact C ...)
+       TODO: check
+CVE-2024-0944 (A vulnerability was found in Totolink T8 4.1.5cu.833_20220905. 
It has  ...)
+       TODO: check
+CVE-2024-0943 (A vulnerability was found in Totolink N350RT 9.3.5u.6255. It 
has been  ...)
+       TODO: check
+CVE-2024-0942 (A vulnerability was found in Totolink N200RE V5 
9.3.5u.6255_B20211224. ...)
+       TODO: check
+CVE-2024-0941 (A vulnerability was found in Novel-Plus 4.3.0-RC1 and 
classified as cr ...)
+       TODO: check
+CVE-2024-0939 (A vulnerability has been found in Beijing Baichuo Smart S210 
Managemen ...)
+       TODO: check
+CVE-2024-0938 (A vulnerability, which was classified as critical, was found in 
Tongda ...)
+       TODO: check
+CVE-2024-0937 (A vulnerability, which was classified as critical, has been 
found in v ...)
+       TODO: check
+CVE-2024-0936 (A vulnerability classified as critical was found in 
van_der_Schaar LAB ...)
+       TODO: check
+CVE-2024-0933 (A vulnerability was found in Niushop B2B2C V5 and classified as 
critic ...)
+       TODO: check
+CVE-2024-0932 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2024-0931 (A vulnerability classified as critical was found in Tenda AC10U 
15.03. ...)
+       TODO: check
+CVE-2024-0930 (A vulnerability classified as critical has been found in Tenda 
AC10U 1 ...)
+       TODO: check
+CVE-2024-0929 (A vulnerability was found in Tenda AC10U 
15.03.06.49_multi_TDE01. It h ...)
+       TODO: check
+CVE-2024-0928 (A vulnerability was found in Tenda AC10U 
15.03.06.49_multi_TDE01. It h ...)
+       TODO: check
+CVE-2024-0927 (A vulnerability was found in Tenda AC10U 
15.03.06.49_multi_TDE01. It h ...)
+       TODO: check
+CVE-2024-0926 (A vulnerability was found in Tenda AC10U 
15.03.06.49_multi_TDE01 and c ...)
+       TODO: check
+CVE-2024-0925 (A vulnerability has been found in Tenda AC10U 
15.03.06.49_multi_TDE01  ...)
+       TODO: check
+CVE-2024-0924 (A vulnerability, which was classified as critical, was found in 
Tenda  ...)
+       TODO: check
+CVE-2024-0923 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2024-0922 (A vulnerability classified as critical was found in Tenda AC10U 
15.03. ...)
+       TODO: check
+CVE-2024-0921 (A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 
and clas ...)
+       TODO: check
+CVE-2024-0920 (A vulnerability was found in TRENDnet TEW-822DRE 1.03B02. It 
has been  ...)
+       TODO: check
+CVE-2024-0919 (A vulnerability was found in TRENDnet TEW-815DAP 1.0.2.0. It 
has been  ...)
+       TODO: check
+CVE-2024-0918 (A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and 
classified ...)
+       TODO: check
+CVE-2022-48622 (In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI 
(Windows  ...)
+       TODO: check
 CVE-2024-24399 (An arbitrary file upload vulnerability in LeptonCMS v7.0.0 
allows auth ...)
        NOT-FOR-US: LeptonCMS
 CVE-2024-23630 (An arbitrary firmware upload vulnerability exists in the 
Motorola  MR2 ...)
@@ -214,7 +360,7 @@ CVE-2023-33757 (A lack of SSL certificate validation in 
Splicecom iPCS (iOS App)
        NOT-FOR-US: SpliceCom
 CVE-2024-0822 (An authentication bypass vulnerability was found in 
overt-engine. This ...)
        NOT-FOR-US: ovirt-engine
-CVE-2024-0727 [Add NULL checks where ContentInfo data can be NULL]
+CVE-2024-0727 (Issue summary: Processing a maliciously formatted PKCS12 file 
may lead ...)
        - openssl <unfixed>
        [bookworm] - openssl <no-dsa> (Minor issue)
        [bullseye] - openssl <no-dsa> (Minor issue)
@@ -9767,7 +9913,7 @@ CVE-2023-6458 (Mattermost webapp fails to validateroute 
parameters in/<TEAM_NAME
        - mattermost-server <itp> (bug #823556)
 CVE-2023-6393 (A flaw was found in the Quarkus Cache Runtime. When request 
processing ...)
        NOT-FOR-US: Quarkus
-CVE-2023-6291
+CVE-2023-6291 (A flaw was found in the redirect_uri validation logic in 
Keycloak. Thi ...)
        NOT-FOR-US: Keycloak
 CVE-2023-6288 (Code injection in Remote Desktop Manager 2023.3.9.3 and earlier 
on mac ...)
        NOT-FOR-US: Devolutions
@@ -10103,7 +10249,7 @@ CVE-2023-47106 (Traefik is an open source HTTP reverse 
proxy and load balancer.
        - traefik <itp> (bug #983289)
 CVE-2023-45781 (In parse_gap_data of utils.cc, there is a possible out of 
bounds read  ...)
        NOT-FOR-US: Android
-CVE-2023-45779 (In TBD of TBD, there is a possible malicious update to 
platform compon ...)
+CVE-2023-45779 (In the APEX module framework of AOSP, there is a possible 
malicious up ...)
        NOT-FOR-US: Android
 CVE-2023-45777 (In checkKeyIntentParceledCorrectly of 
AccountManagerService.java, ther ...)
        NOT-FOR-US: Android
@@ -46653,8 +46799,8 @@ CVE-2023-29083
        RESERVED
 CVE-2023-29082
        RESERVED
-CVE-2023-29081
-       RESERVED
+CVE-2023-29081 (A vulnerability has been reported in Suite Setups built with 
versions  ...)
+       TODO: check
 CVE-2023-29080
        RESERVED
 CVE-2023-29079



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e8ab90bf390592af47bc4552d00fc0e1eac68612
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to