Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c5114c66 by security tracker role at 2024-11-07T08:12:05+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,35 @@
+CVE-2024-51990 (jj, or Jujutsu, is a Git-compatible VCS written in rust. In 
affected v ...)
+       TODO: check
+CVE-2024-51736 (Symphony process is a module for the Symphony PHP framework 
which exec ...)
+       TODO: check
+CVE-2024-51409 (Buffer Overflow vulnerability in Tenda O3 v.1.0.0.5 allows a 
remote at ...)
+       TODO: check
+CVE-2024-50345 (symfony/http-foundation is a module for the Symphony PHP 
framework whi ...)
+       TODO: check
+CVE-2024-50343 (symfony/validator is a module for the Symphony PHP framework 
which pro ...)
+       TODO: check
+CVE-2024-50342 (symfony/http-client is a module for the Symphony PHP framework 
which p ...)
+       TODO: check
+CVE-2024-50341 (symfony/security-bundle is a module for the Symphony PHP 
framework whi ...)
+       TODO: check
+CVE-2024-50340 (symfony/runtime is a module for the Symphony PHP framework 
which enabl ...)
+       TODO: check
+CVE-2024-48325 (Portabilis i-Educar 2.8.0 is vulnerable to SQL Injection in 
the "getDo ...)
+       TODO: check
+CVE-2024-10947 (A vulnerability classified as critical was found in Guangzhou 
Tuchuang ...)
+       TODO: check
+CVE-2024-10946 (A vulnerability classified as critical has been found in 
Guangzhou Tuc ...)
+       TODO: check
+CVE-2024-10928 (A vulnerability was found in MonoCMS up to 20240528. It has 
been decla ...)
+       TODO: check
+CVE-2024-10927 (A vulnerability was found in MonoCMS up to 20240528. It has 
been class ...)
+       TODO: check
+CVE-2024-10926 (A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 
and clas ...)
+       TODO: check
+CVE-2024-10922 (The Featured Posts Scroll plugin for WordPress is vulnerable 
to Cross- ...)
+       TODO: check
+CVE-2024-10027 (The WP Booking Calendar WordPress plugin before 10.6.3 does 
not saniti ...)
+       TODO: check
 CVE-2024-9902 (A flaw was found in Ansible. The ansible-core `user` module can 
allow  ...)
        - ansible-core <unfixed> (bug #1086883)
        - ansible 5.4.0-1
@@ -30721,7 +30753,7 @@ CVE-2024-35234 (Discourse is an open-source discussion 
platform. Prior to versio
        NOT-FOR-US: Discourse
 CVE-2024-35227 (Discourse is an open-source discussion platform. Prior to 
version 3.2. ...)
        NOT-FOR-US: Discourse
-CVE-2024-38286
+CVE-2024-38286 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)
        - tomcat10 10.1.25-1
        [bookworm] - tomcat10 <postponed> (Minor issue, fixed along in next DSA)
        - tomcat9 9.0.70-2
@@ -47489,7 +47521,7 @@ CVE-2024-4777 (Memory safety bugs present in Firefox 
125, Firefox ESR 115.10, an
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-4777
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/#CVE-2024-4777
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/#CVE-2024-4777
-CVE-2024-10941
+CVE-2024-10941 (A malicious website could have included an iframe with an 
malformed UR ...)
        - firefox 126.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/#CVE-2024-10941
 CVE-2024-4776 (A file dialog shown while in full-screen mode could have 
resulted in t ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5114c66982442530efed56dce4325f873e11ed7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5114c66982442530efed56dce4325f873e11ed7
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to