Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
a96ffd49 by security tracker role at 2024-08-18T20:11:52+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,73 @@
+CVE-2024-7911 (A vulnerability was found in SourceCodester Simple Online
Bidding Syst ...)
+ TODO: check
+CVE-2024-7910 (A vulnerability was found in CodeAstro Online Railway
Reservation Syst ...)
+ TODO: check
+CVE-2024-7909 (A vulnerability has been found in TOTOLINK EX1200L
9.3.5u.6146_B202010 ...)
+ TODO: check
+CVE-2024-7908 (A vulnerability, which was classified as critical, was found in
TOTOLI ...)
+ TODO: check
+CVE-2024-7907 (A vulnerability, which was classified as critical, has been
found in T ...)
+ TODO: check
+CVE-2024-7906 (A vulnerability classified as critical was found in DedeBIZ
6.3.0. Thi ...)
+ TODO: check
+CVE-2024-7905 (A vulnerability classified as critical has been found in
DedeBIZ 6.3.0 ...)
+ TODO: check
+CVE-2024-7904 (A vulnerability was found in DedeBIZ 6.3.0. It has been rated
as criti ...)
+ TODO: check
+CVE-2024-6221 (A vulnerability in corydolphin/flask-cors version 4.0.1 allows
the `Ac ...)
+ TODO: check
+CVE-2024-43353 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43352 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43351 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43349 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43348 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43347 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43346 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43344 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43342 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43335 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43330 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43329 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43327 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43324 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43321 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43320 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43318 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43313 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43309 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43308 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43307 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43306 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43305 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43276 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-43238 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
+CVE-2024-39666 (Improper Neutralization of Input During Web Page Generation
(XSS or 'C ...)
+ TODO: check
CVE-2024-7903 (A vulnerability was found in DedeBIZ 6.3.0. It has been
declared as cr ...)
NOT-FOR-US: DedeBIZ
CVE-2024-7902 (A vulnerability was found in pkp ojs up to 3.4.0-6 and
classified as p ...)
@@ -66570,7 +66640,7 @@ CVE-2023-32725 (The website configured in the URL
widget will receive a session
CVE-2023-32230 (An improper handling of a malformed API request to an API
server in Bo ...)
NOT-FOR-US: Bosch
CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions,
found in O ...)
- {DSA-5601-1 DSA-5600-1 DSA-5599-1 DSA-5591-1 DSA-5588-1 DSA-5586-1
DLA-3794-1 DLA-3730-1 DLA-3719-1 DLA-3718-1 DLA-3694-1}
+ {DSA-5750-1 DSA-5601-1 DSA-5600-1 DSA-5599-1 DSA-5591-1 DSA-5588-1
DSA-5586-1 DLA-3794-1 DLA-3730-1 DLA-3719-1 DLA-3718-1 DLA-3694-1}
- dropbear 2022.83-4 (bug #1059001)
[bookworm] - dropbear 2022.83-1+deb12u1
[bullseye] - dropbear 2020.81-3+deb11u1
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a96ffd49c8aec6479061380844ea68621c15d60f
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a96ffd49c8aec6479061380844ea68621c15d60f
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits