Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 7cf2ac1d by security tracker role at 2024-07-29T08:12:12+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,24 +1,92 @@ -CVE-2024-41019 [fs/ntfs3: Validate ff offset] +CVE-2024-7202 (The query functionality of WinMatrix3 Web package from Simopro Technol ...) + TODO: check +CVE-2024-7201 (The login functionality of WinMatrix3 Web package from Simopro Technol ...) + TODO: check +CVE-2024-7190 (A vulnerability classified as critical was found in itsourcecode Socie ...) + TODO: check +CVE-2024-7189 (A vulnerability classified as critical has been found in itsourcecode ...) + TODO: check +CVE-2024-7188 (A vulnerability was found in Bylancer Quicklancer 2.4. It has been rat ...) + TODO: check +CVE-2024-7187 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. I ...) + TODO: check +CVE-2024-7186 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. I ...) + TODO: check +CVE-2024-7185 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 an ...) + TODO: check +CVE-2024-7184 (A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B202011 ...) + TODO: check +CVE-2024-7183 (A vulnerability, which was classified as critical, was found in TOTOLI ...) + TODO: check +CVE-2024-7182 (A vulnerability, which was classified as critical, has been found in T ...) + TODO: check +CVE-2024-7181 (A vulnerability classified as critical was found in TOTOLINK A3600R 4. ...) + TODO: check +CVE-2024-7180 (A vulnerability classified as critical has been found in TOTOLINK A360 ...) + TODO: check +CVE-2024-7179 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. I ...) + TODO: check +CVE-2024-7178 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. I ...) + TODO: check +CVE-2024-7177 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. I ...) + TODO: check +CVE-2024-7176 (A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 an ...) + TODO: check +CVE-2024-7175 (A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B202011 ...) + TODO: check +CVE-2024-7174 (A vulnerability, which was classified as critical, was found in TOTOLI ...) + TODO: check +CVE-2024-7173 (A vulnerability, which was classified as critical, has been found in T ...) + TODO: check +CVE-2024-7172 (A vulnerability classified as critical was found in TOTOLINK A3600R 4. ...) + TODO: check +CVE-2024-7171 (A vulnerability classified as critical has been found in TOTOLINK A360 ...) + TODO: check +CVE-2024-7170 (A vulnerability was found in TOTOLINK A3000RU 5.9c.5185. It has been r ...) + TODO: check +CVE-2024-6487 (The Inline Related Posts WordPress plugin before 3.8.0 does not saniti ...) + TODO: check +CVE-2024-6366 (The User Profile Builder WordPress plugin before 3.11.8 does not have ...) + TODO: check +CVE-2024-6362 (The Ultimate Blocks WordPress plugin before 3.2.0 does not validate a ...) + TODO: check +CVE-2024-5883 (The Ultimate Classified Listings WordPress plugin before 1.3 does not ...) + TODO: check +CVE-2024-5882 (The Ultimate Classified Listings WordPress plugin before 1.3 does not ...) + TODO: check +CVE-2024-5670 (The web services of Softnext's products, Mail SQR Expert and Mail Arch ...) + TODO: check +CVE-2024-5285 (The wp-affiliate-platform WordPress plugin before 6.5.2 does not have ...) + TODO: check +CVE-2024-4483 (The Email Encoder WordPress plugin before 2.2.2 does not escape the W ...) + TODO: check +CVE-2024-41637 (RaspAP before 3.1.5 allows an attacker to escalate privileges: the www ...) + TODO: check +CVE-2024-37381 (An unspecified SQL Injection vulnerability in Core server of Ivanti EP ...) + TODO: check +CVE-2024-32671 (Heap-based Buffer Overflow vulnerability in Samsung Open Source Escarg ...) + TODO: check +CVE-2024-41019 (In the Linux kernel, the following vulnerability has been resolved: f ...) - linux 6.9.12-1 NOTE: https://git.kernel.org/linus/50c47879650b4c97836a0086632b3a2e300b0f06 (6.11-rc1) -CVE-2024-41018 [fs/ntfs3: Add a check for attr_names and oatbl] +CVE-2024-41018 (In the Linux kernel, the following vulnerability has been resolved: f ...) - linux 6.9.12-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/702d4930eb06dcfda85a2fa67e8a1a27bfa2a845 (6.11-rc1) -CVE-2024-41017 [jfs: don't walk off the end of ealist] +CVE-2024-41017 (In the Linux kernel, the following vulnerability has been resolved: j ...) - linux 6.9.12-1 NOTE: https://git.kernel.org/linus/d0fa70aca54c8643248e89061da23752506ec0d4 (6.11-rc1) -CVE-2024-41016 [ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()] +CVE-2024-41016 (In the Linux kernel, the following vulnerability has been resolved: o ...) - linux <unfixed> NOTE: https://git.kernel.org/linus/af77c4fc1871847b528d58b7fdafb4aa1f6a9262 (6.11-rc1) -CVE-2024-41015 [ocfs2: add bounds checking to ocfs2_check_dir_entry()] +CVE-2024-41015 (In the Linux kernel, the following vulnerability has been resolved: o ...) - linux 6.9.12-1 NOTE: https://git.kernel.org/linus/255547c6bb8940a97eea94ef9d464ea5967763fb (6.11-rc1) -CVE-2024-41014 [xfs: add bounds checking to xlog_recover_process_data] +CVE-2024-41014 (In the Linux kernel, the following vulnerability has been resolved: x ...) - linux <unfixed> NOTE: https://git.kernel.org/linus/fb63435b7c7dc112b1ae1baea5486e0a6e27b196 (6.11-rc1) -CVE-2024-41013 [xfs: don't walk off the end of a directory data block] +CVE-2024-41013 (In the Linux kernel, the following vulnerability has been resolved: x ...) - linux <unfixed> NOTE: https://git.kernel.org/linus/0c7fcdb6d06cdf8b19b57c17605215b06afa864a (6.11-rc1) CVE-2024-7169 (A vulnerability classified as problematic has been found in SourceCode ...) @@ -406,10 +474,10 @@ CVE-2024-41136 (An authenticated command injection vulnerability exists in the H NOT-FOR-US: HPE Aruba Networking EdgeConnect SD-WAN gateways CVE-2024-0231 (A resource misdirection vulnerability in GitLab CE/EE versions 12.0 pr ...) - gitlab <unfixed> -CVE-2024-41091 +CVE-2024-41091 (In the Linux kernel, the following vulnerability has been resolved: t ...) - linux 6.9.12-1 NOTE: https://git.kernel.org/linus/049584807f1d797fc3078b68035450a9769eb5c3 -CVE-2024-41090 +CVE-2024-41090 (In the Linux kernel, the following vulnerability has been resolved: t ...) - linux 6.9.12-1 NOTE: https://git.kernel.org/linus/ed7f2afdd0e043a397677e597ced0830b83ba0b3 CVE-2024-7005 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7cf2ac1d0c529d2cb7e768feb63dbf2dc00bac39 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7cf2ac1d0c529d2cb7e768feb63dbf2dc00bac39 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits