Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6589665c by security tracker role at 2024-02-21T08:11:42+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,32 +1,164 @@
-CVE-2024-1676
+CVE-2024-26269 (Cross-site scripting (XSS) vulnerability in the Frontend JS 
module's p ...)
+       TODO: check
+CVE-2024-26266 (Multiple stored cross-site scripting (XSS) vulnerabilities in 
Liferay  ...)
+       TODO: check
+CVE-2024-26140 (com.yetanalytics/lrs is the Yet Analytics Core LRS Library. 
Prior to v ...)
+       TODO: check
+CVE-2024-26136 (kedi ElectronCord is a bot management tool for Discord. Commit 
aaaeaf4 ...)
+       TODO: check
+CVE-2024-25905 (Cross-Site Request Forgery (CSRF) vulnerability in Mondula 
GmbH Multi  ...)
+       TODO: check
+CVE-2024-25904 (Cross-Site Request Forgery (CSRF) vulnerability in David 
Stockl TinyMC ...)
+       TODO: check
+CVE-2024-25603 (Stored cross-site scripting (XSS) vulnerability in the Dynamic 
Data Ma ...)
+       TODO: check
+CVE-2024-25602 (Stored cross-site scripting (XSS) vulnerability in Users Admin 
module' ...)
+       TODO: check
+CVE-2024-25601 (Stored cross-site scripting (XSS) vulnerability in Expando 
module's ge ...)
+       TODO: check
+CVE-2024-25428 (SQL Injection vulnerability in MRCMS v3.1.2 allows attackers 
to run ar ...)
+       TODO: check
+CVE-2024-25152 (Stored cross-site scripting (XSS) vulnerability in Message 
Board widge ...)
+       TODO: check
+CVE-2024-25151 (The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and 
older u ...)
+       TODO: check
+CVE-2024-25147 (Cross-site scripting (XSS) vulnerability in 
HtmlUtil.escapeJsLink in L ...)
+       TODO: check
+CVE-2024-25141 (When sslwas enabled for Mongo Hook, default settings included 
"allow_i ...)
+       TODO: check
+CVE-2024-24876 (Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts 
Admin M ...)
+       TODO: check
+CVE-2024-24872 (Cross-Site Request Forgery (CSRF) vulnerability in Themify 
Themify Bui ...)
+       TODO: check
+CVE-2024-24849 (Cross-Site Request Forgery (CSRF) vulnerability in Mark 
Stockton Quick ...)
+       TODO: check
+CVE-2024-24843 (Cross-Site Request Forgery (CSRF) vulnerability in PowerPack 
Addons fo ...)
+       TODO: check
+CVE-2024-24837 (Cross-Site Request Forgery (CSRF) vulnerability in 
Fr\xe9d\xe9ric GILL ...)
+       TODO: check
+CVE-2024-24802 (Cross-Site Request Forgery (CSRF) vulnerability in John Tendik 
JTRT Re ...)
+       TODO: check
+CVE-2024-24798 (Cross-Site Request Forgery (CSRF) vulnerability in SoniNow 
Team Debug. ...)
+       TODO: check
+CVE-2024-23830 (MantisBT is an open source issue tracker. Prior to version 
2.26.1, an  ...)
+       TODO: check
+CVE-2024-23758 (An issue discovered in Unisys Stealth 5.3.062.0 allows 
attackers to vi ...)
+       TODO: check
+CVE-2024-22235 (VMware Aria Operations contains a local privilege escalation 
vulnerabi ...)
+       TODO: check
+CVE-2024-1631 (Impact: The library offers a function to generate an ed25519 
key pair  ...)
+       TODO: check
+CVE-2024-1562 (The WooCommerce Google Sheet Connector plugin for WordPress is 
vulnera ...)
+       TODO: check
+CVE-2024-1501 (The Database Reset plugin for WordPress is vulnerable to 
Cross-Site Re ...)
+       TODO: check
+CVE-2024-1108 (The Plugin Groups plugin for WordPress is vulnerable to 
unauthorized m ...)
+       TODO: check
+CVE-2024-1081 (The 3D FlipBook \u2013 PDF Flipbook WordPress plugin for 
WordPress is  ...)
+       TODO: check
+CVE-2024-0593 (The Simple Job Board plugin for WordPress is vulnerable to 
unauthorize ...)
+       TODO: check
+CVE-2023-52442 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
+       TODO: check
+CVE-2023-52441 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
+       TODO: check
+CVE-2023-52440 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
+       TODO: check
+CVE-2023-50923 (In QUIC in RFC 9000, the Latency Spin Bit specification 
(section 17.4) ...)
+       TODO: check
+CVE-2023-49034 (Cross Site Scripting (XSS) vulnerability in ProjeQtOr 11.0.2 
allows a  ...)
+       TODO: check
+CVE-2023-47422 (An access control issue in /usr/sbin/httpd in Tenda TX9 V1 
V22.03.02.5 ...)
+       TODO: check
+CVE-2023-46967 (Cross Site Scripting vulnerability in the sanitize function in 
Enhance ...)
+       TODO: check
+CVE-2023-42953 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-42952 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
+       TODO: check
+CVE-2023-42951 (The issue was addressed with improved handling of caches. This 
issue i ...)
+       TODO: check
+CVE-2023-42946 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2023-42945 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-42942 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2023-42939 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42928 (The issue was addressed with improved bounds checks. This 
issue is fix ...)
+       TODO: check
+CVE-2023-42889 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42878 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2023-42877 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42873 (The issue was addressed with improved bounds checks. This 
issue is fix ...)
+       TODO: check
+CVE-2023-42860 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2023-42859 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42858 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42855 (This issue was addressed with improved state management. This 
issue is ...)
+       TODO: check
+CVE-2023-42853 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42848 (The issue was addressed with improved bounds checks. This 
issue is fix ...)
+       TODO: check
+CVE-2023-42843 (An inconsistent user interface issue was addressed with 
improved state ...)
+       TODO: check
+CVE-2023-42840 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2023-42839 (This issue was addressed with improved state management. This 
issue is ...)
+       TODO: check
+CVE-2023-42838 (An access issue was addressed with improvements to the 
sandbox. This i ...)
+       TODO: check
+CVE-2023-42836 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42835 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2023-42834 (A privacy issue was addressed with improved handling of files. 
This is ...)
+       TODO: check
+CVE-2023-42823 (The issue was resolved by sanitizing logging This issue is 
fixed in wa ...)
+       TODO: check
+CVE-2023-42498 (Reflected cross-site scripting (XSS) vulnerability in the 
Language Ove ...)
+       TODO: check
+CVE-2023-42496 (Reflected cross-site scripting (XSS) vulnerability on the add 
assignee ...)
+       TODO: check
+CVE-2023-40191 (Reflected cross-site scripting (XSS) vulnerability in the 
instance set ...)
+       TODO: check
+CVE-2024-1676 (Inappropriate implementation in Navigation in Google Chrome 
prior to 1 ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1675
+CVE-2024-1675 (Insufficient policy enforcement in Download in Google Chrome 
prior to  ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1674
+CVE-2024-1674 (Inappropriate implementation in Navigation in Google Chrome 
prior to 1 ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1673
+CVE-2024-1673 (Use after free in Accessibility in Google Chrome prior to 
122.0.6261.5 ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1672
+CVE-2024-1672 (Inappropriate implementation in Content Security Policy in 
Google Chro ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1671
+CVE-2024-1671 (Inappropriate implementation in Site Isolation in Google Chrome 
prior  ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1670
+CVE-2024-1670 (Use after free in Mojo in Google Chrome prior to 122.0.6261.57 
allowed ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1669
+CVE-2024-1669 (Out of bounds memory access in Blink in Google Chrome prior to 
122.0.6 ...)
        - chromium <unfixed>
        [bullseye] - chromium <end-of-life> (see #1061268)
        [buster] - chromium <end-of-life> (see DSA 5046)
@@ -93,10 +225,11 @@ CVE-2024-24793 (A use-after-free vulnerability exists in 
the DICOM Element Parsi
        NOT-FOR-US: libdicom
 CVE-2024-24763 (JumpServer is an open source bastion host and an operation and 
mainten ...)
        NOT-FOR-US: JumpServer
-CVE-2024-24475 (An issue in Qemu before v.8.2.0 allows a remote attacker to 
execute ar ...)
+CVE-2024-24475
+       REJECTED
        - qemu 1:8.2.0+ds-1
        NOTE: 
https://github.com/qemu/qemu/commit/9d9c06b144da340b9a937ed01d45a936810715be 
(v8.2.0-rc0)
-CVE-2024-24474 (Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a 
remote a ...)
+CVE-2024-24474 (QEMU before 8.2.0 has an integer underflow, and resultant 
buffer overf ...)
        - qemu 1:8.2.0+ds-1
        NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1810
        NOTE: 
https://github.com/qemu/qemu/commit/77668e4b9bca03a856c27ba899a2513ddf52bb52 
(v8.2.0-rc0)
@@ -11032,7 +11165,7 @@ CVE-2023-6937 (wolfSSL prior to 5.6.6 did not check 
that messages in one (D)TLS
        [bookworm] - wolfssl <no-dsa> (Minor issue)
        [bullseye] - wolfssl <no-dsa> (Minor issue)
        NOTE: 
https://github.com/wolfSSL/wolfssl/blob/v5.6.6-stable/ChangeLog.md#vulnerabilities
-CVE-2023-6936
+CVE-2023-6936 (In wolfSSL prior to 5.6.6, if callback functions are enabled 
(via the  ...)
        [experimental] - wolfssl 5.6.6-1
        - wolfssl 5.6.6-1.2 (bug #1059357)
        [bookworm] - wolfssl <no-dsa> (Minor issue)
@@ -203747,8 +203880,8 @@ CVE-2021-29052 (The Data Engine module in Liferay 
Portal 7.3.0 through 7.3.5, an
        NOT-FOR-US: Liferay
 CVE-2021-29051 (Cross-site scripting (XSS) vulnerability in the Asset module's 
Asset P ...)
        NOT-FOR-US: Liferay
-CVE-2021-29050
-       RESERVED
+CVE-2021-29050 (Cross-Site Request Forgery (CSRF) vulnerability in the terms 
of use pa ...)
+       TODO: check
 CVE-2021-29049 (Cross-site scripting (XSS) vulnerability in the Portal 
Workflow module ...)
        NOT-FOR-US: Liferay
 CVE-2021-29048 (Cross-site scripting (XSS) vulnerability in the Layout 
module's page a ...)
@@ -203771,8 +203904,8 @@ CVE-2021-29040 (The JSON web services in Liferay 
Portal 7.3.4 and earlier, and L
        NOT-FOR-US: Liferay
 CVE-2021-29039 (Cross-site scripting (XSS) vulnerability in the Asset module's 
categor ...)
        NOT-FOR-US: Liferay
-CVE-2021-29038
-       RESERVED
+CVE-2021-29038 (Liferay Portal 7.2.0 through 7.3.5, and older unsupported 
versions, an ...)
+       TODO: check
 CVE-2021-29037
        RESERVED
 CVE-2021-29036



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6589665c3f7c8f374a79e58a209540be1c08adf9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6589665c3f7c8f374a79e58a209540be1c08adf9
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to