Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 8c74e04d by security tracker role at 2024-02-02T08:11:56+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,163 @@ +CVE-2024-24945 (A stored cross-site scripting (XSS) vulnerability in Travel Journal Us ...) + TODO: check +CVE-2024-24756 (Crafatar serves Minecraft avatars based on the skin for use in externa ...) + TODO: check +CVE-2024-24755 (discourse-group-membership-ip-block is a discourse plugin that adds su ...) + TODO: check +CVE-2024-24524 (Cross Site Request Forgery (CSRF) vulnerability in flusity-CMS v.2.33, ...) + TODO: check +CVE-2024-24482 (Aprktool before 2.9.3 on Windows allows ../ and /.. directory traversa ...) + TODO: check +CVE-2024-24041 (A stored cross-site scripting (XSS) vulnerability in Travel Journal Us ...) + TODO: check +CVE-2024-23978 (Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V10 ...) + TODO: check +CVE-2024-23746 (Miro Desktop 0.8.18 on macOS allows Electron code injection.) + TODO: check +CVE-2024-23052 (An issue in WuKongOpenSource WukongCRM v.72crm_9.0.1_20191202 allows a ...) + TODO: check +CVE-2024-23034 (Cross Site Scripting vulnerability in the input parameter in eyoucms v ...) + TODO: check +CVE-2024-23033 (Cross Site Scripting vulnerability in the path parameter in eyoucms v. ...) + TODO: check +CVE-2024-23032 (Cross Site Scripting vulnerability in num parameter in eyoucms v.1.6.5 ...) + TODO: check +CVE-2024-23031 (Cross Site Scripting (XSS) vulnerability in is_water parameter in eyou ...) + TODO: check +CVE-2024-22927 (Cross Site Scripting (XSS) vulnerability in the func parameter in eyou ...) + TODO: check +CVE-2024-22903 (Vinchin Backup & Recovery v7.2 was discovered to contain an authentica ...) + TODO: check +CVE-2024-22902 (Vinchin Backup & Recovery v7.2 was discovered to be configured with de ...) + TODO: check +CVE-2024-22901 (Vinchin Backup & Recovery v7.2 was discovered to use default MYSQL cre ...) + TODO: check +CVE-2024-22900 (Vinchin Backup & Recovery v7.2 was discovered to contain an authentica ...) + TODO: check +CVE-2024-22899 (Vinchin Backup & Recovery v7.2 was discovered to contain an authentica ...) + TODO: check +CVE-2024-22779 (Directory Traversal vulnerability in Kihron ServerRPExposer v.1.0.2 an ...) + TODO: check +CVE-2024-22533 (Before Beetl v3.15.12, the rendering template has a server-side templa ...) + TODO: check +CVE-2024-22320 (IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11. ...) + TODO: check +CVE-2024-22319 (IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11. ...) + TODO: check +CVE-2024-22096 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4,an ...) + TODO: check +CVE-2024-22016 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4,an ...) + TODO: check +CVE-2024-21869 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4, th ...) + TODO: check +CVE-2024-21866 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4, th ...) + TODO: check +CVE-2024-21863 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-21860 (in OpenHarmony v4.0.0 and prior versions allow an adjacent attacker a ...) + TODO: check +CVE-2024-21852 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4,an ...) + TODO: check +CVE-2024-21851 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-21845 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-21794 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4,an ...) + TODO: check +CVE-2024-21780 (Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V1 ...) + TODO: check +CVE-2024-21764 (In Rapid Software LLC's Rapid SCADA versions prior toVersion 5.8.4, th ...) + TODO: check +CVE-2024-21485 (Versions of the package dash-core-components before 2.13.0; all versio ...) + TODO: check +CVE-2024-21399 (Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability) + TODO: check +CVE-2024-1162 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Cross ...) + TODO: check +CVE-2024-1143 (Central Dogma versions prior to 0.64.0 is vulnerable to Cross-Site Scr ...) + TODO: check +CVE-2024-1073 (The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cr ...) + TODO: check +CVE-2024-1047 (The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to unaut ...) + TODO: check +CVE-2024-1040 (Gessler GmbH WEB-MASTER user account is stored using a weak hashing al ...) + TODO: check +CVE-2024-1039 (Gessler GmbH WEB-MASTER has a restoration account that uses weak hard ...) + TODO: check +CVE-2024-0685 (The Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for ...) + TODO: check +CVE-2024-0325 (In Helix Sync versions prior to 2024.1, a local command injection was ...) + TODO: check +CVE-2024-0285 (in OpenHarmony v4.0.0 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2023-6221 (The cloud provider MachineSense uses for integration and deployment fo ...) + TODO: check +CVE-2023-50962 (IBM PowerSC 1.3, 2.0, and 2.1 MFA does not implement the "HTTP Strict ...) + TODO: check +CVE-2023-50941 (IBM PowerSC 1.3, 2.0, and 2.1 does not provide logout functionality, w ...) + TODO: check +CVE-2023-50940 (IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource Sharing (CORS ...) + TODO: check +CVE-2023-50939 (IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic ...) + TODO: check +CVE-2023-50938 (IBM PowerSC 1.3, 2.0, and 2.1 could allow a remote attacker to hijack ...) + TODO: check +CVE-2023-50937 (IBM PowerSC 1.3, 2.0, and 2.1 uses weaker than expected cryptographic ...) + TODO: check +CVE-2023-50936 (IBM PowerSC 1.3, 2.0, and 2.1 does not invalidate session after logout ...) + TODO: check +CVE-2023-50935 (IBM PowerSC 1.3, 2.0, and 2.1 fails to properly restrict access to a U ...) + TODO: check +CVE-2023-50934 (IBM PowerSC 1.3, 2.0, and 2.1 uses single-factor authentication which ...) + TODO: check +CVE-2023-50933 (IBM PowerSC 1.3, 2.0, and 2.1 is vulnerable to HTML injection. A remot ...) + TODO: check +CVE-2023-50328 (IBM PowerSC 1.3, 2.0, and 2.1 may allow a remote attacker to view sess ...) + TODO: check +CVE-2023-50327 (IBM PowerSC 1.3, 2.0, and 2.1 uses insecure HTTP methods which could a ...) + TODO: check +CVE-2023-50326 (IBM PowerSC 1.3, 2.0, and 2.1 uses an inadequate account lockout setti ...) + TODO: check +CVE-2023-4472 (Objectplanet Opinio version 7.22 and prior uses a cryptographically we ...) + TODO: check +CVE-2023-49617 (The MachineSense application programmable interface (API) is improperl ...) + TODO: check +CVE-2023-49610 (MachineSense FeverWarn Raspberry Pi-based devices lack input sanitizat ...) + TODO: check +CVE-2023-49118 (in OpenHarmony v3.2.4 and prior versions allow a local attacker causes ...) + TODO: check +CVE-2023-49115 (MachineSense devices use unauthenticated MQTT messaging to monitor dev ...) + TODO: check +CVE-2023-48793 (Zoho ManageEngine ADAudit Plus through 7250 allows SQL Injection in th ...) + TODO: check +CVE-2023-48792 (Zoho ManageEngine ADAudit Plus through 7250 is vulnerable to SQL Injec ...) + TODO: check +CVE-2023-47867 (MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way ...) + TODO: check +CVE-2023-47257 (ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle atta ...) + TODO: check +CVE-2023-47256 (ConnectWise ScreenConnect through 23.8.4 allows local users to connect ...) + TODO: check +CVE-2023-46706 (Multiple MachineSense devices have credentials unable to be changed by ...) + TODO: check +CVE-2023-46344 (A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and pos ...) + TODO: check +CVE-2023-46159 (IBM Storage Ceph 5.3z1, 5.3z5, and 6.1z1 could allow an authenticated ...) + TODO: check +CVE-2023-45734 (in OpenHarmony v3.2.4 and prior versions allow an adjacent attacker ar ...) + TODO: check +CVE-2023-43756 (in OpenHarmony v3.2.4 and prior versions allow a local attacker causes ...) + TODO: check +CVE-2023-38263 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authentica ...) + TODO: check +CVE-2023-38020 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authentica ...) + TODO: check +CVE-2023-38019 (IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow a remote atta ...) + TODO: check +CVE-2023-36496 (Delegated Admin Privilege virtual attribute provider plugin, when enab ...) + TODO: check +CVE-2023-32333 (IBM Maximo Asset Management 7.6.1.3 could allow a remote attacker to l ...) + TODO: check CVE-2024-24754 (Bref enable serverless PHP on AWS Lambda. When Bref is used with the E ...) NOT-FOR-US: Bref CVE-2024-24753 (Bref enable serverless PHP on AWS Lambda. When Bref is used in combina ...) @@ -867,7 +1027,7 @@ CVE-2024-0444 [GStreamer-SA-2024-0001: AV1 codec parser potential buffer overflo NOTE: https://gstreamer.freedesktop.org/security/sa-2024-0001.html NOTE: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5970 NOTE: Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/394d5066f8a7b728df02fe9084e955b2f7d7f6fe (1.22.9) -CVE-2023-46045 [buffer overflow via a crafted config6a file] +CVE-2023-46045 (Graphviz 2.36 before 10.0.0 has an out-of-bounds read via a crafted co ...) - graphviz 2.42.2-8 (unimportant) NOTE: Crosses no security boundary, config files are under local control NOTE: https://gitlab.com/graphviz/graphviz/-/issues/2441 @@ -2820,42 +2980,43 @@ CVE-2024-20923 CVE-2024-20925 - openjfx <not-affected> (Only affects JavaFX 8) CVE-2024-20945 - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20926 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...) - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20921 - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20919 - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20952 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...) - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20918 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...) - {DSA-5604-1 DLA-3728-1} + {DSA-5613-1 DSA-5604-1 DLA-3728-1} - openjdk-8 8u402-ga-1 - openjdk-11 11.0.22+7-1 - openjdk-17 17.0.10+7-1 - openjdk-21 21.0.2+13-1 CVE-2024-20932 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...) + {DSA-5613-1} - openjdk-17 17.0.10+7-1 CVE-2024-23347 (Prior to v176, when opening a new project Meta Spark Studio would exec ...) NOT-FOR-US: Meta Spark Studio @@ -21283,7 +21444,7 @@ CVE-2023-44766 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2 NOT-FOR-US: Concrete CMS CVE-2023-44765 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS versions 8. ...) NOT-FOR-US: Concrete CMS -CVE-2023-44764 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS v.9.2.1 all ...) +CVE-2023-44764 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS before 9.2. ...) NOT-FOR-US: Concrete CMS CVE-2023-44762 (A Cross Site Scripting (XSS) vulnerability in Concrete CMS from versio ...) NOT-FOR-US: Concrete CMS @@ -95104,8 +95265,8 @@ CVE-2022-40746 (IBM i Access Family 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1. NOT-FOR-US: IBM CVE-2022-40745 RESERVED -CVE-2022-40744 - RESERVED +CVE-2022-40744 (IBM Aspera Faspex 5.0.6 is vulnerable to stored cross-site scripting. ...) + TODO: check CVE-2022-40743 (Improper Input Validation vulnerability for the xdebug plugin in Apach ...) - trafficserver 9.1.4+ds-1 [bullseye] - trafficserver <not-affected> (Vulnerable code not present) @@ -216208,10 +216369,10 @@ CVE-2021-22284 (Incorrect Permission Assignment for Critical Resource vulnerabil NOT-FOR-US: ABB CVE-2021-22283 (Improper Initialization vulnerability in ABB Relion protection relays ...) NOT-FOR-US: ABB -CVE-2021-22282 - RESERVED -CVE-2021-22281 - RESERVED +CVE-2021-22282 (Improper copy algorithm in the project extraction component in B&R Aut ...) + TODO: check +CVE-2021-22281 (: Relative Path Traversal vulnerability in B&R Industrial Automation A ...) + TODO: check CVE-2021-22280 RESERVED CVE-2021-22279 (A Missing Authentication vulnerability in RobotWare for the OmniCore r ...) @@ -242474,10 +242635,10 @@ CVE-2020-24684 RESERVED CVE-2020-24683 (The affected versions of S+ Operations (version 2.1 SP1 and earlier) u ...) NOT-FOR-US: ABB -CVE-2020-24682 - RESERVED -CVE-2020-24681 - RESERVED +CVE-2020-24682 (Unquoted Search Path or Element vulnerability in B&R Industrial Automa ...) + TODO: check +CVE-2020-24681 (Incorrect Permission Assignment for Critical Resource vulnerability in ...) + TODO: check CVE-2020-24680 (In S+ Operations and S+ Historian, the passwords of internal users (no ...) NOT-FOR-US: ABB CVE-2020-24679 (A S+ Operations and S+ Historian service is subject to a DoS by specia ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c74e04d93542ebeb4922d464982b48a3ee45f4e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c74e04d93542ebeb4922d464982b48a3ee45f4e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits