Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
231f9679 by security tracker role at 2024-12-10T20:12:46+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,315 @@
+CVE-2024-9844 (Insufficient server-side controls in Secure Application Manager 
of Iva ...)
+       TODO: check
+CVE-2024-8540 (Insecure permissions in Ivanti Sentry before versions 9.20.2 
and 10.0. ...)
+       TODO: check
+CVE-2024-8256 (In Teltonika Networks RUTOS devices, running on versions 7.0 to 
7.8 (e ...)
+       TODO: check
+CVE-2024-7572 (Insufficient permissions in Ivanti DSM before version 
2024.3.5740 allo ...)
+       TODO: check
+CVE-2024-5660 (Use of Hardware Page Aggregation (HPA) and Stage-1 and/or 
Stage-2 tran ...)
+       TODO: check
+CVE-2024-55602 (PwnDoc is a penetration test report generator. Prior to commit 
1d4219c ...)
+       TODO: check
+CVE-2024-55586 (Nette Database through 3.2.4 allows SQL injection in certain 
situation ...)
+       TODO: check
+CVE-2024-55550 (Mitel MiCollab through 9.8 SP2 could allow an authenticated 
attacker w ...)
+       TODO: check
+CVE-2024-55548 (Improper check of password character lenght in ORing IAP-420 
allows a  ...)
+       TODO: check
+CVE-2024-55547 (SNMP objects in NET-SNMP used in ORing IAP-420 allows Command 
Injectio ...)
+       TODO: check
+CVE-2024-55546 (Missing input validation in the ORing IAP-420 web-interface 
allows sto ...)
+       TODO: check
+CVE-2024-55545 (Missing input validation in the ORing IAP-420 web-interface 
allows Cro ...)
+       TODO: check
+CVE-2024-55544 (Missing input validation in the ORing IAP-420 web-interface 
allows sto ...)
+       TODO: check
+CVE-2024-55500 (Cross-Site Request Forgery (CSRF) in Avenwu Whistle v.2.9.90 
and befor ...)
+       TODO: check
+CVE-2024-54751 (COMFAST CF-WR630AX v2.7.0.2 was discovered to contain a 
hardcoded pass ...)
+       TODO: check
+CVE-2024-54152 (Angular Expressions provides expressions for the Angular.JS 
web framew ...)
+       TODO: check
+CVE-2024-54095 (A vulnerability has been identified in Solid Edge SE2024 (All 
versions ...)
+       TODO: check
+CVE-2024-54094 (A vulnerability has been identified in Solid Edge SE2024 (All 
versions ...)
+       TODO: check
+CVE-2024-54093 (A vulnerability has been identified in Solid Edge SE2024 (All 
versions ...)
+       TODO: check
+CVE-2024-54091 (A vulnerability has been identified in Parasolid V36.1 (All 
versions < ...)
+       TODO: check
+CVE-2024-54008 (An authenticated Remote Code Execution (RCE) vulnerability 
exists in t ...)
+       TODO: check
+CVE-2024-54005 (A vulnerability has been identified in COMOS V10.3 (All 
versions < V10 ...)
+       TODO: check
+CVE-2024-53866 (The package manager pnpm prior to version 9.15.0 seems to 
mishandle ov ...)
+       TODO: check
+CVE-2024-53832 (A vulnerability has been identified in CPCI85 Central 
Processing/Commu ...)
+       TODO: check
+CVE-2024-53481 (A Cross Site Scripting (XSS) vulnerability in the profile.php 
of PHPGu ...)
+       TODO: check
+CVE-2024-53480 (Phpgurukul's Beauty Parlour Management System v1.1 is 
vulnerable to SQ ...)
+       TODO: check
+CVE-2024-53247 (In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7, 
and versi ...)
+       TODO: check
+CVE-2024-53246 (In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 
and Splunk ...)
+       TODO: check
+CVE-2024-53245 (In Splunk Enterprise versions below 9.3.0, 9.2.4, and 9.1.7 
and Splunk ...)
+       TODO: check
+CVE-2024-53244 (In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 
and Splunk ...)
+       TODO: check
+CVE-2024-53243 (In Splunk Enterprise versions below 9.3.2, 9.2.4, and 9.1.7 
and versio ...)
+       TODO: check
+CVE-2024-53242 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
+       TODO: check
+CVE-2024-53041 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
+       TODO: check
+CVE-2024-52538 (Dell Avamar, version(s) 19.9, contain(s) an Improper 
Neutralization of ...)
+       TODO: check
+CVE-2024-52051 (A vulnerability has been identified in SIMATIC S7-PLCSIM V17 
(All vers ...)
+       TODO: check
+CVE-2024-51165 (SQL injection vulnerability in JEPAAS7.2.8, via 
/je/rbac/rbac/loadLogi ...)
+       TODO: check
+CVE-2024-50931 (Silicon Labs Z-Wave Series 500 v6.84.0 was discovered to 
contain insec ...)
+       TODO: check
+CVE-2024-50930 (An issue in Silicon Labs Z-Wave Series 500 v6.84.0 allows 
attackers to ...)
+       TODO: check
+CVE-2024-50929 (Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 
700 and 80 ...)
+       TODO: check
+CVE-2024-50928 (Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 
700 and 80 ...)
+       TODO: check
+CVE-2024-50924 (Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 
700 and 80 ...)
+       TODO: check
+CVE-2024-50921 (Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 
700 and 80 ...)
+       TODO: check
+CVE-2024-50920 (Insecure permissions in Silicon Labs (SiLabs) Z-Wave Series 
700 and 80 ...)
+       TODO: check
+CVE-2024-50699 (TP-Link TL-WR845N(UN)_V4_201214, TL-WR845N(UN)_V4_200909 and 
TL-WR845N ...)
+       TODO: check
+CVE-2024-49849 (A vulnerability has been identified in SIMATIC S7-PLCSIM V16 
(All vers ...)
+       TODO: check
+CVE-2024-49704 (A vulnerability has been identified in COMOS V10.3 (All 
versions < V10 ...)
+       TODO: check
+CVE-2024-49554 (Media Encoder versions 25.0, 24.6.3 and earlier are affected 
by a NULL ...)
+       TODO: check
+CVE-2024-49553 (Media Encoder versions 25.0, 24.6.3 and earlier are affected 
by an out ...)
+       TODO: check
+CVE-2024-49552 (Media Encoder versions 25.0, 24.6.3 and earlier are affected 
by a Heap ...)
+       TODO: check
+CVE-2024-49551 (Media Encoder versions 25.0, 24.6.3 and earlier are affected 
by an out ...)
+       TODO: check
+CVE-2024-49535 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49534 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49533 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49532 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49531 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49530 (Acrobat Reader versions 24.005.20307, 24.001.30213, 
24.001.30193, 20.0 ...)
+       TODO: check
+CVE-2024-49142 (Microsoft Access Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49138 (Windows Common Log File System Driver Elevation of Privilege 
Vulnerabi ...)
+       TODO: check
+CVE-2024-49132 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49129 (Windows Remote Desktop Gateway (RD Gateway) Denial of Service 
Vulnerab ...)
+       TODO: check
+CVE-2024-49128 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49127 (Windows Lightweight Directory Access Protocol (LDAP) Remote 
Code Execu ...)
+       TODO: check
+CVE-2024-49126 (Windows Local Security Authority Subsystem Service (LSASS) 
Remote Code ...)
+       TODO: check
+CVE-2024-49125 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49124 (Lightweight Directory Access Protocol (LDAP) Client Remote 
Code Execut ...)
+       TODO: check
+CVE-2024-49123 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49122 (Microsoft Message Queuing (MSMQ) Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49121 (Windows Lightweight Directory Access Protocol (LDAP) Denial of 
Service ...)
+       TODO: check
+CVE-2024-49120 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49119 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49118 (Microsoft Message Queuing (MSMQ) Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49117 (Windows Hyper-V Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49116 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49115 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49114 (Windows Cloud Files Mini Filter Driver Elevation of Privilege 
Vulnerab ...)
+       TODO: check
+CVE-2024-49113 (Windows Lightweight Directory Access Protocol (LDAP) Denial of 
Service ...)
+       TODO: check
+CVE-2024-49112 (Windows Lightweight Directory Access Protocol (LDAP) Remote 
Code Execu ...)
+       TODO: check
+CVE-2024-49111 (Wireless Wide Area Network Service (WwanSvc) Elevation of 
Privilege Vu ...)
+       TODO: check
+CVE-2024-49110 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49109 (Wireless Wide Area Network Service (WwanSvc) Elevation of 
Privilege Vu ...)
+       TODO: check
+CVE-2024-49108 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49107 (WmsRepair Service Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-49106 (Windows Remote Desktop Services Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49105 (Remote Desktop Client Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49104 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49103 (Windows Wireless Wide Area Network Service (WwanSvc) 
Information Discl ...)
+       TODO: check
+CVE-2024-49102 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49101 (Wireless Wide Area Network Service (WwanSvc) Elevation of 
Privilege Vu ...)
+       TODO: check
+CVE-2024-49099 (Windows Wireless Wide Area Network Service (WwanSvc) 
Information Discl ...)
+       TODO: check
+CVE-2024-49098 (Windows Wireless Wide Area Network Service (WwanSvc) 
Information Discl ...)
+       TODO: check
+CVE-2024-49097 (Windows PrintWorkflowUserSvc Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49096 (Microsoft Message Queuing (MSMQ) Denial of Service 
Vulnerability)
+       TODO: check
+CVE-2024-49095 (Windows PrintWorkflowUserSvc Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49094 (Wireless Wide Area Network Service (WwanSvc) Elevation of 
Privilege Vu ...)
+       TODO: check
+CVE-2024-49093 (Windows Resilient File System (ReFS) Elevation of Privilege 
Vulnerabil ...)
+       TODO: check
+CVE-2024-49092 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49091 (Windows  Domain Name Service Remote Code Execution 
Vulnerability)
+       TODO: check
+CVE-2024-49090 (Windows Common Log File System Driver Elevation of Privilege 
Vulnerabi ...)
+       TODO: check
+CVE-2024-49089 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49088 (Windows Common Log File System Driver Elevation of Privilege 
Vulnerabi ...)
+       TODO: check
+CVE-2024-49087 (Windows Mobile Broadband Driver Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2024-49086 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49085 (Windows Routing and Remote Access Service (RRAS) Remote Code 
Execution ...)
+       TODO: check
+CVE-2024-49084 (Windows Kernel Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-49083 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49082 (Windows File Explorer Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-49081 (Wireless Wide Area Network Service (WwanSvc) Elevation of 
Privilege Vu ...)
+       TODO: check
+CVE-2024-49080 (Windows IP Routing Management Snapin Remote Code Execution 
Vulnerabili ...)
+       TODO: check
+CVE-2024-49079 (Input Method Editor (IME) Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49078 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49077 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49076 (Windows Virtualization-Based Security (VBS) Enclave Elevation 
of Privi ...)
+       TODO: check
+CVE-2024-49075 (Windows Remote Desktop ServicesDenial of Service Vulnerability)
+       TODO: check
+CVE-2024-49074 (Windows Kernel-Mode Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49073 (Windows Mobile Broadband Driver Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-49072 (Windows Task Scheduler Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-49070 (Microsoft SharePoint Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49069 (Microsoft Excel Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49068 (Microsoft SharePoint Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-49065 (Microsoft Office Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49064 (Microsoft SharePoint Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-49063 (Microsoft/Muzic Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2024-49062 (Microsoft SharePoint Information Disclosure Vulnerability)
+       TODO: check
+CVE-2024-49059 (Microsoft Office Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-49057 (Microsoft Defender for Endpoint on Android Spoofing 
Vulnerability)
+       TODO: check
+CVE-2024-47977 (Dell Avamar, version(s) 19.9, contain(s) an Improper 
Neutralization of ...)
+       TODO: check
+CVE-2024-47484 (Dell Avamar, version(s) 19.9, contain(s) an Improper 
Neutralization of ...)
+       TODO: check
+CVE-2024-47117 (IBM Carbon Design System (Carbon Charts 0.4.0 through 1.13.16) 
is vuln ...)
+       TODO: check
+CVE-2024-46657 (Artifex Software mupdf v1.24.9 was discovered to contain a 
segmentatio ...)
+       TODO: check
+CVE-2024-46442 (An issue in the BYD Dilink Headunit System v3.0 to v4.0 allows 
attacke ...)
+       TODO: check
+CVE-2024-46341 (TP-Link TL-WR845N(UN)_V4_190219 was discovered to transmit 
credentials ...)
+       TODO: check
+CVE-2024-46340 (TP-Link TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 
was discov ...)
+       TODO: check
+CVE-2024-45709 (SolarWinds Web Help Desk was susceptible to a local file read 
vulnerab ...)
+       TODO: check
+CVE-2024-45494 (An issue was discovered in MSA Safety FieldServer Gateways and 
Embedde ...)
+       TODO: check
+CVE-2024-45493 (An issue was discovered in MSA Safety FieldServer Gateways and 
Embedde ...)
+       TODO: check
+CVE-2024-43600 (Microsoft Office Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2024-43594 (System Center Operations Manager Elevation of Privilege 
Vulnerability)
+       TODO: check
+CVE-2024-12323 (The turboSMTP plugin for WordPress is vulnerable to Reflected 
Cross-Si ...)
+       TODO: check
+CVE-2024-12286 (MOBATIME Network Master Clock - DTS 4801 allows attackers to 
use SSH t ...)
+       TODO: check
+CVE-2024-12236 (A security issue exists in Vertex Gemini API for customers 
using VPC-S ...)
+       TODO: check
+CVE-2024-11973 (The Quran multilanguage Text & Audio plugin for WordPress is 
vulnerabl ...)
+       TODO: check
+CVE-2024-11945 (The Email Reminders plugin for WordPress is vulnerable to 
Stored Cross ...)
+       TODO: check
+CVE-2024-11940 (The Property Hive Mortgage Calculator plugin for WordPress is 
vulnerab ...)
+       TODO: check
+CVE-2024-11928 (The iChart \u2013 Easy Charts and Graphs plugin for WordPress 
is vulne ...)
+       TODO: check
+CVE-2024-11868 (The LearnPress \u2013 WordPress LMS Plugin plugin for 
WordPress is vul ...)
+       TODO: check
+CVE-2024-11773 (SQL injection in the admin web console of Ivanti CSA before 
version 5. ...)
+       TODO: check
+CVE-2024-11772 (Command injection in the admin web console of Ivanti CSA 
before versio ...)
+       TODO: check
+CVE-2024-11639 (An authentication bypass in the admin web console of Ivanti 
CSA before ...)
+       TODO: check
+CVE-2024-11634 (Command injection in Ivanti Connect Secure before version 
22.7R2.3 and ...)
+       TODO: check
+CVE-2024-11633 (Argument injection in Ivanti Connect Secure before version 
22.7R2.4 al ...)
+       TODO: check
+CVE-2024-11106 (The Simple Restrict plugin for WordPress is vulnerable to 
Sensitive In ...)
+       TODO: check
+CVE-2024-10959 (The The Active Products Tables for WooCommerce. Use 
constructor to cre ...)
+       TODO: check
+CVE-2024-10496 (An out of bounds read due to improper input validation in 
BuildFontMap ...)
+       TODO: check
+CVE-2024-10495 (An out of bounds read due to improper input validation when 
loading th ...)
+       TODO: check
+CVE-2024-10494 (An out of bounds read due to improper input validation in 
HeapObjMapIm ...)
+       TODO: check
+CVE-2024-10256 (Insufficient permissions in Ivanti Patch SDK before version 
9.7.703 al ...)
+       TODO: check
 CVE-2024-9672 (A reflected cross-site scripting (XSS) vulnerability exists in 
PaperCu ...)
        NOT-FOR-US: PaperCut
 CVE-2024-55638 (Deserialization of Untrusted Data vulnerability in Drupal Core 
allows  ...)
@@ -1161,7 +1473,7 @@ CVE-2024-42195 (HCL DevOps Deploy / HCL Launch is 
vulnerable to HTML injection.
        NOT-FOR-US: HCL
 CVE-2024-39219 (An issue in Aginode GigaSwitch V5 before version 7.06G allows 
authenti ...)
        NOT-FOR-US: Aginode GigaSwitch
-CVE-2024-38829 (A vulnerability in VMware Tanzu Spring LDAP allows data 
exposure for c ...)
+CVE-2024-38829 (A vulnerability in Spring LDAP allows data exposure for case 
sensitive ...)
        - libspring-java <unfixed> (unimportant)
        NOTE: https://spring.io/security/cve-2024-38829
        NOTE: Only supported for building applications shipped in Debian, see 
README.Debian.security
@@ -2919,7 +3231,7 @@ CVE-2024-10308 (The Jeg Elementor Kit plugin for 
WordPress is vulnerable to Stor
 CVE-2024-10240 (An issue has been discovered in GitLab EE affecting all 
versions start ...)
        - gitlab <not-affected> (Vulnerable code introduced later)
 CVE-2024-48651 (In ProFTPD through 1.3.8b before cec01cc, supplemental group 
inheritan ...)
-       {DLA-3975-1}
+       {DSA-5827-1 DLA-3975-1}
        - proftpd-dfsg 1.3.8.b+dfsg-4 (bug #1082326)
        NOTE: https://github.com/proftpd/proftpd/issues/1830
        NOTE: Fixed by: 
https://github.com/proftpd/proftpd/commit/cec01cc0a2523453e5da5a486bc6d977c3768db1
 (master)
@@ -5712,25 +6024,25 @@ CVE-2024-9474 (A privilege escalation vulnerability in 
Palo Alto Networks PAN-OS
        NOT-FOR-US: Palo Alto Networks PAN-OS
 CVE-2024-8781 (Execution with Unnecessary Privileges, : Improper Protection of 
Altern ...)
        NOT-FOR-US: TR7 Application Security Platform
-CVE-2024-52574 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52574 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52573 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52573 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52572 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52572 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52571 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52571 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52570 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52570 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52569 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52569 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52568 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52568 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52567 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52567 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52566 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52566 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
-CVE-2024-52565 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-52565 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Siemens
 CVE-2024-52436 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
        NOT-FOR-US: WordPress plugin
@@ -18022,7 +18334,7 @@ CVE-2024-47194 (A vulnerability has been identified in 
ModelSim (All versions <
        NOT-FOR-US: Siemens
 CVE-2024-47161 (In JetBrains TeamCity before 2024.07.3 password could be 
exposed via S ...)
        NOT-FOR-US: JetBrains TeamCity
-CVE-2024-47046 (A vulnerability has been identified in Simcenter Nastran 2306 
(All ver ...)
+CVE-2024-47046 (A vulnerability has been identified in Simcenter Femap V2306 
(All vers ...)
        NOT-FOR-US: Siemens
 CVE-2024-47011 (Path Traversal in Ivanti Avalanche before version 6.4.5 allows 
a remot ...)
        NOT-FOR-US: Ivanti
@@ -18065,33 +18377,33 @@ CVE-2024-45880 (A command injection vulnerability 
exists in Motorola CX2L router
 CVE-2024-45746 (An issue was discovered in Trusted Firmware-M through 2.1.0. 
User prov ...)
        - arm-trusted-firmware <not-affected> (This affects FT-M, Debian ships 
TF-A)
        NOTE: 
https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/user_pointers_mailbox_vectors_vulnerability.html
-CVE-2024-45476 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45476 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45475 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45475 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45474 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45474 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45473 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45473 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45472 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45472 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45471 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45471 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45470 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45470 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45469 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45469 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45468 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45468 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45467 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45467 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45466 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45466 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45465 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45465 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45464 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45464 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
-CVE-2024-45463 (A vulnerability has been identified in Tecnomatix Plant 
Simulation V23 ...)
+CVE-2024-45463 (A vulnerability has been identified in Teamcenter 
Visualization V14.2  ...)
        NOT-FOR-US: Tecnomatix
 CVE-2024-45330 (A use of externally-controlled format string in Fortinet 
FortiAnalyzer ...)
        NOT-FOR-US: Fortinet
@@ -18329,7 +18641,7 @@ CVE-2024-43453 (Windows Routing and Remote Access 
Service (RRAS) Remote Code Exe
        NOT-FOR-US: Microsoft
 CVE-2024-42988 (Lack of access control in ChallengeSolves 
(/api/v1/challenges/<challen ...)
        NOT-FOR-US: ChallengeSolves
-CVE-2024-41981 (A vulnerability has been identified in Simcenter Nastran 2306 
(All ver ...)
+CVE-2024-41981 (A vulnerability has been identified in Simcenter Femap V2306 
(All vers ...)
        NOT-FOR-US: Siemens
 CVE-2024-41902 (A vulnerability has been identified in JT2Go (All versions < 
V2406.000 ...)
        NOT-FOR-US: Siemens
@@ -49997,7 +50309,7 @@ CVE-2024-35240 (Umbraco Commerce is an open source 
dotnet ecommerce solution. In
 CVE-2024-35239 (Umbraco Commerce is an open source dotnet web forms solution. 
In affec ...)
        NOT-FOR-US: Umbraco Commerce
 CVE-2024-35226 (Smarty is a template engine for PHP, facilitating the 
separation of pr ...)
-       {DLA-3956-1}
+       {DSA-5826-1 DLA-3956-1}
        - smarty3 3.1.48-2 (bug #1072530)
        - smarty4 4.5.4-1 (bug #1072529)
        NOTE: 
https://github.com/smarty-php/smarty/security/advisories/GHSA-4rmg-292m-wg3w
@@ -57262,7 +57574,7 @@ CVE-2023-50180 (An exposure of sensitive system 
information to an unauthorized c
        NOT-FOR-US: ForiGuard
 CVE-2023-46714 (A stack-based buffer overflow [CWE-121] vulnerability in 
Fortinet Fort ...)
        NOT-FOR-US: FortiGuard
-CVE-2023-46280 (A vulnerability has been identified in S7-PCT (All versions), 
Security ...)
+CVE-2023-46280 (A vulnerability has been identified in Security Configuration 
Tool (SC ...)
        NOT-FOR-US: Siemens
 CVE-2023-45586 (An insufficient verification of data authenticity 
vulnerability [CWE-3 ...)
        NOT-FOR-US: FortiGuard
@@ -108882,7 +109194,7 @@ CVE-2023-36697 (Microsoft Message Queuing (MSMQ) 
Remote Code Execution Vulnerabi
        NOT-FOR-US: Microsoft
 CVE-2023-36637 (An improper neutralization of input during web page generation 
vulnera ...)
        NOT-FOR-US: Microsoft
-CVE-2023-36606 (Microsoft Message Queuing Denial of Service Vulnerability)
+CVE-2023-36606 (Microsoft Message Queuing (MSMQ) Denial of Service 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-36605 (Windows Named Pipe Filesystem Elevation of Privilege 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -108914,9 +109226,9 @@ CVE-2023-36583 (Microsoft Message Queuing (MSMQ) 
Remote Code Execution Vulnerabi
        NOT-FOR-US: Microsoft
 CVE-2023-36582 (Microsoft Message Queuing (MSMQ) Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-36581 (Microsoft Message Queuing Denial of Service Vulnerability)
+CVE-2023-36581 (Microsoft Message Queuing (MSMQ) Denial of Service 
Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2023-36579 (Microsoft Message Queuing Denial of Service Vulnerability)
+CVE-2023-36579 (Microsoft Message Queuing (MSMQ) Denial of Service 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-36578 (Microsoft Message Queuing (MSMQ) Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -108981,7 +109293,7 @@ CVE-2023-36434 (Windows IIS Server Elevation of 
Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-36433 (Microsoft Dynamics 365 (On-Premises) Information Disclosure 
Vulnerabil ...)
        NOT-FOR-US: Microsoft
-CVE-2023-36431 (Microsoft Message Queuing Denial of Service Vulnerability)
+CVE-2023-36431 (Microsoft Message Queuing (MSMQ) Denial of Service 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2023-36429 (Microsoft Dynamics 365 (On-Premises) Information Disclosure 
Vulnerabil ...)
        NOT-FOR-US: Microsoft
@@ -115088,7 +115400,7 @@ CVE-2023-4624 (Server-Side Request Forgery (SSRF) in 
GitHub repository bookstack
        NOT-FOR-US: bookstack
 CVE-2023-4600 (The AffiliateWP for WordPress is vulnerable to unauthorized 
modificati ...)
        NOT-FOR-US: AffiliateWP for WordPress
-CVE-2023-4571 (In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 
or 4.15 ...)
+CVE-2023-4571 (In Splunk IT Service Intelligence (ITSI) versions below below 
4.13.3,  ...)
        NOT-FOR-US: Splunk
 CVE-2023-4209 (The POEditor WordPress plugin before 0.9.8 does not have CSRF 
checks i ...)
        NOT-FOR-US: WordPress plugin
@@ -119465,7 +119777,7 @@ CVE-2023-4010 (A flaw was found in the USB Host 
Controller Driver framework in t
        - linux <unfixed>
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2227726
        NOTE: https://github.com/wanrenmi/a-usb-kernel-bug
-CVE-2023-3997 (Splunk SOAR versions 6.0.2 and earlier are indirectly affected 
by a po ...)
+CVE-2023-3997 (Splunk SOAR versions lower than 6.1.0 are indirectly affected 
by a pot ...)
        NOT-FOR-US: Splunk SOAR
 CVE-2023-3983 (An authenticated SQL injection vulnerability exists in 
Advantech iView ...)
        NOT-FOR-US: Advantech iView
@@ -138396,7 +138708,7 @@ CVE-2023-28449
 CVE-2023-28448 (Versionize is a framework for version tolerant 
serializion/deserializa ...)
        NOT-FOR-US: Versionize (firecracker-microvm / framework for version 
tolerant serializion/deserialization of Rust data structures)
 CVE-2023-28447 (Smarty is a template engine for PHP. In affected versions 
smarty did n ...)
-       {DLA-3956-1}
+       {DSA-5826-1 DLA-3956-1}
        - smarty3 3.1.48-1 (bug #1033964)
        [buster] - smarty3 <no-dsa> (Minor issue)
        - smarty4 4.3.1-1 (bug #1033965)
@@ -319526,8 +319838,8 @@ CVE-2020-28400 (Affected devices contain a 
vulnerability that allows an unauthen
        NOT-FOR-US: Siemens
 CVE-2020-28399
        RESERVED
-CVE-2020-28398
-       RESERVED
+CVE-2020-28398 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 
(All versi ...)
+       TODO: check
 CVE-2020-28397 (A vulnerability has been identified in SIMATIC Drive 
Controller family ...)
        NOT-FOR-US: Siemens
 CVE-2020-28396 (A vulnerability has been identified in SICAM A8000 CP-8000 
(All versio ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/231f9679e1088196405f79d90afdff54b4583a62

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/231f9679e1088196405f79d90afdff54b4583a62
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to