Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 450caa33 by security tracker role at 2024-11-04T20:12:40+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,4 +1,190 @@ -CVE-2024-23590 +CVE-2024-9147 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...) + TODO: check +CVE-2024-51685 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51683 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51682 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51681 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51680 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51678 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51677 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-51672 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-51665 (Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical ...) + TODO: check +CVE-2024-51661 (Improper Neutralization of Special Elements used in an OS Command ('OS ...) + TODO: check +CVE-2024-51626 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-51582 (Path Traversal: '.../...//' vulnerability in ThimPress WP Hotel Bookin ...) + TODO: check +CVE-2024-51561 (This vulnerability exists in Aero due to improper implementation of OT ...) + TODO: check +CVE-2024-51560 (This vulnerability exists in the Wave 2.0due to improper exception han ...) + TODO: check +CVE-2024-51559 (This vulnerability exists in the Wave 2.0dueto missing authorization c ...) + TODO: check +CVE-2024-51558 (This vulnerability exists in the Wave 2.0due to missing restrictions f ...) + TODO: check +CVE-2024-51557 (This vulnerability exists in the Wave 2.0 due to missing rate limiting ...) + TODO: check +CVE-2024-51556 (This vulnerability exists in the Wave 2.0 due to weak encryption of se ...) + TODO: check +CVE-2024-51408 (AppSmith Community 1.8.3 before 1.46 allows SSRF via New DataSource fo ...) + TODO: check +CVE-2024-51329 (A Host header injection vulnerability in Agile-Board 1.0 allows attack ...) + TODO: check +CVE-2024-51328 (Cross Site Scripting vulnerability in addcategory.php in projectworld' ...) + TODO: check +CVE-2024-51327 (SQL Injection in loginform.php in ProjectWorld's Travel Management Sys ...) + TODO: check +CVE-2024-51326 (SQL Injection vulnerability in projectworlds Travel management System ...) + TODO: check +CVE-2024-51253 (In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands ...) + TODO: check +CVE-2024-51251 (In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands ...) + TODO: check +CVE-2024-51249 (In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands ...) + TODO: check +CVE-2024-51246 (In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands ...) + TODO: check +CVE-2024-51136 (An XML External Entity (XXE) vulnerability in Dmoz2CSV in openimaj v1. ...) + TODO: check +CVE-2024-51127 (An issue in the createTempFile method of hornetq v2.4.9 allows attacke ...) + TODO: check +CVE-2024-50531 (Unrestricted Upload of File with Dangerous Type vulnerability in David ...) + TODO: check +CVE-2024-50530 (Unrestricted Upload of File with Dangerous Type vulnerability in Myria ...) + TODO: check +CVE-2024-50529 (Unrestricted Upload of File with Dangerous Type vulnerability in Rudra ...) + TODO: check +CVE-2024-50528 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...) + TODO: check +CVE-2024-50527 (Unrestricted Upload of File with Dangerous Type vulnerability in Stack ...) + TODO: check +CVE-2024-50526 (Unrestricted Upload of File with Dangerous Type vulnerability in mahla ...) + TODO: check +CVE-2024-50525 (Unrestricted Upload of File with Dangerous Type vulnerability in Hello ...) + TODO: check +CVE-2024-50523 (Unrestricted Upload of File with Dangerous Type vulnerability in Rainb ...) + TODO: check +CVE-2024-48878 (Zohocorp ManageEngine ADManager Plus versions 7241 and prior are vulne ...) + TODO: check +CVE-2024-48809 (An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and ono ...) + TODO: check +CVE-2024-48336 (The install() function of ProviderInstaller.java in Magisk App before ...) + TODO: check +CVE-2024-45893 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45891 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45890 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45889 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45888 (DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. ...) + TODO: check +CVE-2024-45887 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45885 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45884 (DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injec ...) + TODO: check +CVE-2024-45882 (DrayTek Vigor3900 1.5.1.3 contains a command injection vulnerability. ...) + TODO: check +CVE-2024-45185 (An issue was discovered in Samsung Mobile Processor, Wearable Processo ...) + TODO: check +CVE-2024-45164 (Akamai SIA (Secure Internet Access Enterprise) ThreatAvert, in SPS (Se ...) + TODO: check +CVE-2024-45086 (IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML e ...) + TODO: check +CVE-2024-38424 (Memory corruption during GNSS HAL process initialization.) + TODO: check +CVE-2024-38423 (Memory corruption while processing GPU page table switch.) + TODO: check +CVE-2024-38422 (Memory corruption while processing voice packet with arbitrary data re ...) + TODO: check +CVE-2024-38421 (Memory corruption while processing GPU commands.) + TODO: check +CVE-2024-38419 (Memory corruption while invoking IOCTL calls from the use-space for HG ...) + TODO: check +CVE-2024-38415 (Memory corruption while handling session errors from firmware.) + TODO: check +CVE-2024-38410 (Memory corruption while IOCLT is called when device is in invalid stat ...) + TODO: check +CVE-2024-38409 (Memory corruption while station LL statistic handling.) + TODO: check +CVE-2024-38408 (Cryptographic issue when a controller receives an LMP start encryption ...) + TODO: check +CVE-2024-38407 (Memory corruption while processing input parameters for any IOCTL call ...) + TODO: check +CVE-2024-38406 (Memory corruption while handling IOCTL calls in JPEG Encoder driver.) + TODO: check +CVE-2024-38405 (Transient DOS while processing the CU information from RNR IE.) + TODO: check +CVE-2024-38403 (Transient DOS while parsing BTM ML IE when per STA profile is not incl ...) + TODO: check +CVE-2024-36485 (Zohocorp ManageEngine ADAudit Plus versions8121 and prior are vulnerab ...) + TODO: check +CVE-2024-34891 (Insufficiently protected credentials in DAV server settings in 1C-Bitr ...) + TODO: check +CVE-2024-34887 (Insufficiently protected credentials in AD/LDAP server settings in 1C- ...) + TODO: check +CVE-2024-34885 (Insufficiently protected credentials in SMTP server settings in 1C-Bit ...) + TODO: check +CVE-2024-34883 (Insufficiently protected credentials in DAV server settings in 1C-Bitr ...) + TODO: check +CVE-2024-34882 (Insufficiently protected credentials in SMTP server settings in 1C-Bit ...) + TODO: check +CVE-2024-33068 (Transient DOS while parsing fragments of MBSSID IE from beacon frame.) + TODO: check +CVE-2024-33033 (Memory corruption while processing IOCTL calls to unmap the buffers.) + TODO: check +CVE-2024-33032 (Memory corruption when the user application modifies the same shared m ...) + TODO: check +CVE-2024-33031 (Memory corruption while processing the update SIM PB records request.) + TODO: check +CVE-2024-33030 (Memory corruption while parsing IPC frequency table parameters for LPL ...) + TODO: check +CVE-2024-33029 (Memory corruption while handling the PDR in driver for getting the rem ...) + TODO: check +CVE-2024-30619 (Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. ...) + TODO: check +CVE-2024-30618 (A Stored Cross-Site Scripting (XSS) Vulnerability in Chamilo LMS 1.11. ...) + TODO: check +CVE-2024-30617 (A Cross-Site Request Forgery (CSRF) vulnerability in Chamilo LMS 1.11. ...) + TODO: check +CVE-2024-30616 (Chamilo LMS 1.11.26 is vulnerable to Incorrect Access Control via main ...) + TODO: check +CVE-2024-23386 (memory corruption when WiFi display APIs are invoked with large random ...) + TODO: check +CVE-2024-23385 (Transient DOS as modem reset occurs when an unexpected MAC RAR (with i ...) + TODO: check +CVE-2024-23377 (Memory corruption while invoking IOCTL command from user-space, when a ...) + TODO: check +CVE-2024-10791 (A vulnerability, which was classified as critical, has been found in C ...) + TODO: check +CVE-2024-10768 (A vulnerability classified as problematic was found in PHPGurukul Onli ...) + TODO: check +CVE-2024-10766 (A vulnerability, which was classified as critical, has been found in C ...) + TODO: check +CVE-2024-10765 (A vulnerability classified as critical was found in Codezips Online In ...) + TODO: check +CVE-2024-10764 (A vulnerability classified as critical has been found in Codezips Onli ...) + TODO: check +CVE-2024-10523 (This vulnerability exists in TP-Link IoT Smart Hub due to storage of W ...) + TODO: check +CVE-2024-10389 (There exists a Path Traversal vulnerability in Safearchive on Platform ...) + TODO: check +CVE-2024-10035 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...) + TODO: check +CVE-2024-23590 (Session Fixation vulnerability in Apache Kylin. This issue affects Ap ...) NOT-FOR-US: Apache Kylin (different from Kylin desktop environment) CVE-2024-48342 REJECTED @@ -874,7 +1060,7 @@ CVE-2024-33603 (The LevelOne WBR-6012 router has an information disclosure vulne NOT-FOR-US: LevelOne WBR-6012 router CVE-2024-32946 (A vulnerability in the LevelOne WBR-6012 router's firmware version R0. ...) NOT-FOR-US: LevelOne WBR-6012 router -CVE-2024-31975 (EnGenius ESR580 devices through 1.1.30 allow a remote attacker to cond ...) +CVE-2024-31975 (EnGenius EWS356-Fit devices through 1.1.30 allow a remote attacker to ...) NOT-FOR-US: EnGenius ESR580 devices CVE-2024-31973 (Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote att ...) NOT-FOR-US: Hitron CODA-4582 2AHKM-CODA4589 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450caa3315e718c7b8bd1e2657eea16d4ebafc1e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/450caa3315e718c7b8bd1e2657eea16d4ebafc1e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits