Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 861da87f by security tracker role at 2024-04-02T08:12:13+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,227 @@ +CVE-2024-3165 (System->Maintenance-> Log Files in dotCMS dashboard is providing the u ...) + TODO: check +CVE-2024-3164 (In dotCMS dashboard, the Tools and Log Files tabs under System \u2192 ...) + TODO: check +CVE-2024-3160 (** DISPUTED ** A vulnerability, which was classified as problematic, w ...) + TODO: check +CVE-2024-3148 (A vulnerability, which was classified as critical, has been found in D ...) + TODO: check +CVE-2024-3147 (A vulnerability classified as problematic was found in DedeCMS 5.7. Th ...) + TODO: check +CVE-2024-3146 (A vulnerability classified as problematic has been found in DedeCMS 5. ...) + TODO: check +CVE-2024-3145 (A vulnerability was found in DedeCMS 5.7. It has been rated as problem ...) + TODO: check +CVE-2024-3144 (A vulnerability was found in DedeCMS 5.7. It has been declared as prob ...) + TODO: check +CVE-2024-3143 (A vulnerability was found in DedeCMS 5.7. It has been classified as pr ...) + TODO: check +CVE-2024-3142 (A vulnerability was found in Clavister E10 and E80 up to 20240323 and ...) + TODO: check +CVE-2024-3141 (A vulnerability has been found in Clavister E10 and E80 up to 20240323 ...) + TODO: check +CVE-2024-3140 (A vulnerability, which was classified as problematic, was found in Sou ...) + TODO: check +CVE-2024-3139 (A vulnerability, which was classified as critical, has been found in S ...) + TODO: check +CVE-2024-3138 (** DISPUTED ** A vulnerability was found in francoisjacquet RosarioSIS ...) + TODO: check +CVE-2024-3137 (Improper Privilege Management in uvdesk/community-skeleton) + TODO: check +CVE-2024-31005 (An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execu ...) + TODO: check +CVE-2024-31004 (An issue in Bento4 Bento v.1.6.0-641 allows a remote attacker to execu ...) + TODO: check +CVE-2024-31003 (Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a rem ...) + TODO: check +CVE-2024-31002 (Buffer Overflow vulnerability in Bento4 Bento v.1.6.0-641 allows a rem ...) + TODO: check +CVE-2024-2925 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress ...) + TODO: check +CVE-2024-2924 (The Creative Addons for Elementor plugin for WordPress is vulnerable t ...) + TODO: check +CVE-2024-2839 (The Colibri Page Builder plugin for WordPress is vulnerable to Stored ...) + TODO: check +CVE-2024-2791 (The Metform Elementor Contact Form Builder plugin for WordPress is vul ...) + TODO: check +CVE-2024-2369 (The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does ...) + TODO: check +CVE-2024-29276 (An issue was discovered in seeyonOA version 8, allows remote attackers ...) + TODO: check +CVE-2024-29086 (in OpenHarmony v3.2.4 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-29074 (in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitr ...) + TODO: check +CVE-2024-28951 (in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitr ...) + TODO: check +CVE-2024-28226 (in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause ...) + TODO: check +CVE-2024-27334 (Kofax Power PDF JPG File Parsing Out-Of-Bounds Read Information Disclo ...) + TODO: check +CVE-2024-27333 (Kofax Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclo ...) + TODO: check +CVE-2024-27332 (PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27331 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27330 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27329 (PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27328 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27327 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Ex ...) + TODO: check +CVE-2024-27326 (PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27325 (PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27324 (PDF-XChange Editor TIF File Parsing Out-Of-Bounds Read Information Dis ...) + TODO: check +CVE-2024-27323 (PDF-XChange Editor Updater Improper Certificate Validation Remote Code ...) + TODO: check +CVE-2024-26684 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26683 (In the Linux kernel, the following vulnerability has been resolved: w ...) + TODO: check +CVE-2024-26682 (In the Linux kernel, the following vulnerability has been resolved: w ...) + TODO: check +CVE-2024-26681 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26680 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26679 (In the Linux kernel, the following vulnerability has been resolved: i ...) + TODO: check +CVE-2024-26678 (In the Linux kernel, the following vulnerability has been resolved: x ...) + TODO: check +CVE-2024-26677 (In the Linux kernel, the following vulnerability has been resolved: r ...) + TODO: check +CVE-2024-26676 (In the Linux kernel, the following vulnerability has been resolved: a ...) + TODO: check +CVE-2024-26675 (In the Linux kernel, the following vulnerability has been resolved: p ...) + TODO: check +CVE-2024-26674 (In the Linux kernel, the following vulnerability has been resolved: x ...) + TODO: check +CVE-2024-26673 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26672 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26671 (In the Linux kernel, the following vulnerability has been resolved: b ...) + TODO: check +CVE-2024-26670 (In the Linux kernel, the following vulnerability has been resolved: a ...) + TODO: check +CVE-2024-26669 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26668 (In the Linux kernel, the following vulnerability has been resolved: n ...) + TODO: check +CVE-2024-26667 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26666 (In the Linux kernel, the following vulnerability has been resolved: w ...) + TODO: check +CVE-2024-26665 (In the Linux kernel, the following vulnerability has been resolved: t ...) + TODO: check +CVE-2024-26664 (In the Linux kernel, the following vulnerability has been resolved: h ...) + TODO: check +CVE-2024-26663 (In the Linux kernel, the following vulnerability has been resolved: t ...) + TODO: check +CVE-2024-26662 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26661 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26660 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26659 (In the Linux kernel, the following vulnerability has been resolved: x ...) + TODO: check +CVE-2024-26658 (In the Linux kernel, the following vulnerability has been resolved: b ...) + TODO: check +CVE-2024-26657 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-26656 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2024-25187 (Server Side Request Forgery (SSRF) vulnerability in 71cms v1.0.0, allo ...) + TODO: check +CVE-2024-24581 (in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitr ...) + TODO: check +CVE-2024-23119 (Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulne ...) + TODO: check +CVE-2024-23118 (Centreon updateContactHostCommands SQL Injection Remote Code Execution ...) + TODO: check +CVE-2024-23117 (Centreon updateContactServiceCommands SQL Injection Remote Code Execut ...) + TODO: check +CVE-2024-23116 (Centreon updateLCARelation SQL Injection Remote Code Execution Vulnera ...) + TODO: check +CVE-2024-23115 (Centreon updateGroups SQL Injection Remote Code Execution Vulnerabilit ...) + TODO: check +CVE-2024-22180 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-22177 (in OpenHarmony v3.2.4 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-22098 (in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitr ...) + TODO: check +CVE-2024-22092 (in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypas ...) + TODO: check +CVE-2024-21834 (in OpenHarmony v3.2.4 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-20854 (Improper handling of insufficient privileges vulnerability in Samsung ...) + TODO: check +CVE-2024-20853 (Improper verification of intent by broadcast receiver vulnerability in ...) + TODO: check +CVE-2024-20852 (Improper verification of intent by broadcast receiver vulnerability in ...) + TODO: check +CVE-2024-20851 (Improper access control vulnerability in Samsung Data Store prior to v ...) + TODO: check +CVE-2024-20850 (Use of Implicit Intent for Sensitive Communication in Samsung Pay prio ...) + TODO: check +CVE-2024-20849 (Out-of-bound Write vulnerability in chunk parsing implementation of li ...) + TODO: check +CVE-2024-20848 (Out-of-bound Write vulnerability in text parsing implementation of lib ...) + TODO: check +CVE-2024-20847 (Improper Access Control vulnerability in StorageManagerService prior t ...) + TODO: check +CVE-2024-20846 (Out-of-bounds write vulnerability while decoding hcr of libsavsac.so p ...) + TODO: check +CVE-2024-20845 (Out-of-bounds write vulnerability while releasing memory in libsavsac. ...) + TODO: check +CVE-2024-20844 (Out-of-bounds write vulnerability while parsing remaining codewords in ...) + TODO: check +CVE-2024-20843 (Out-of-bound write vulnerability in command parsing implementation of ...) + TODO: check +CVE-2024-20842 (Improper Input Validation vulnerability in handling apdu of libsec-ril ...) + TODO: check +CVE-2024-20799 (Adobe Experience Manager versions 6.5.19 and earlier are affected by a ...) + TODO: check +CVE-2024-1863 (Sante PACS Server Token Endpoint SQL Injection Remote Code Execution V ...) + TODO: check +CVE-2024-1504 (The SecuPress Free \u2014 WordPress Security plugin for WordPress is v ...) + TODO: check +CVE-2024-1274 (The My Calendar WordPress plugin before 3.4.24 does not sanitise and e ...) + TODO: check +CVE-2024-1179 (TP-Link Omada ER605 DHCPv6 Client Options Stack-based Buffer Overflow ...) + TODO: check +CVE-2024-0637 (Centreon updateDirectory SQL Injection Remote Code Execution Vulnerabi ...) + TODO: check +CVE-2023-52636 (In the Linux kernel, the following vulnerability has been resolved: l ...) + TODO: check +CVE-2023-52635 (In the Linux kernel, the following vulnerability has been resolved: P ...) + TODO: check +CVE-2023-52634 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2023-52633 (In the Linux kernel, the following vulnerability has been resolved: u ...) + TODO: check +CVE-2023-52632 (In the Linux kernel, the following vulnerability has been resolved: d ...) + TODO: check +CVE-2023-52631 (In the Linux kernel, the following vulnerability has been resolved: f ...) + TODO: check +CVE-2023-52630 (In the Linux kernel, the following vulnerability has been resolved: b ...) + TODO: check +CVE-2023-51573 (Voltronic Power ViewPower Pro updateManagerPassword Exposed Dangerous ...) + TODO: check +CVE-2023-51572 (Voltronic Power ViewPower Pro getMacAddressByIp Command Injection Remo ...) + TODO: check +CVE-2023-51571 (Voltronic Power ViewPower Pro SocketService Missing Authentication Den ...) + TODO: check +CVE-2023-51570 (Voltronic Power ViewPower Pro Deserialization of Untrusted Data Remote ...) + TODO: check CVE-2024-28219 - pillow <unfixed> NOTE: https://pillow.readthedocs.io/en/stable/releasenotes/10.3.0.html#security @@ -3010,7 +3234,7 @@ CVE-2024-29419 (There is a Cross-site scripting (XSS) vulnerability in the Wirel NOT-FOR-US: TOTOLINK CVE-2024-28868 (Umbraco is an ASP.NET content management system. Umbraco 10 prior to 1 ...) NOT-FOR-US: Umbraco -CVE-2024-28735 (An incorrect access control issue in Unit4 Financials by Coda v.2023Q4 ...) +CVE-2024-28735 (Unit4 Financials by Coda versions prior to 2023Q4 suffer from an incor ...) NOT-FOR-US: Unit4 Financials by Coda CVE-2024-28396 (An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a r ...) NOT-FOR-US: PrestaShop module @@ -3481,7 +3705,7 @@ CVE-2024-29089 (Improper Neutralization of Input During Web Page Generation ('Cr NOT-FOR-US: WordPress plugin CVE-2024-29027 (Parse Server is an open source backend that can be deployed to any inf ...) NOT-FOR-US: Parse Server -CVE-2024-28734 (Cross Site Scripting vulnerability in Unit4 Financials by Coda v.2024Q ...) +CVE-2024-28734 (Cross Site Scripting vulnerability in Unit4 Financials by Coda prior t ...) NOT-FOR-US: Unit4 Financials by Coda CVE-2024-28595 (SQL Injection vulnerability in Employee Management System v1.0 allows ...) NOT-FOR-US: Employee Management System @@ -13646,7 +13870,7 @@ CVE-2024-1312 (A use-after-free flaw was found in the Linux kernel's Memory Mana [bullseye] - linux <not-affected> (Vulnerable code not present) [buster] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/657b5146955eba331e01b9a6ae89ce2e716ba306 (6.5-rc4) -CVE-2024-1300 +CVE-2024-1300 (A vulnerability in the Eclipse Vert.x toolkit causes a memory leak in ...) NOT-FOR-US: Eclipse Vertx CVE-2024-1066 (An issue has been discovered in GitLab EE affecting all versions from ...) - gitlab 16.6.7-1 @@ -135441,7 +135665,7 @@ CVE-2022-31631 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=81740 NOTE: Fixed by: https://github.com/php/php-src/commit/921b6813da3237a83e908998483f46ae3d8bacba (php-8.0.27) NOTE: Improvement: https://github.com/php/php-src/commit/a6a80eefe0413c91acd922bc58590a4db7979af0 -CVE-2022-31630 (In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imagelo ...) +CVE-2022-31630 (In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imagelo ...) {DSA-5277-1} - php8.1 8.1.12-1 - php7.4 <removed> View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/861da87f37247b3a1c731cf0d9cae37a94392e6c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/861da87f37247b3a1c731cf0d9cae37a94392e6c You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits