Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5d45f8b5 by security tracker role at 2024-12-03T20:12:27+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,94 @@
-CVE-2024-45106
+CVE-2024-9978 (in OpenHarmony v4.1.1 and prior versions allow a local attacker 
cause  ...)
+       TODO: check
+CVE-2024-54000 (Mobile Security Framework (MobSF) is a pen-testing, malware 
analysis a ...)
+       TODO: check
+CVE-2024-53999 (Mobile Security Framework (MobSF) is a pen-testing, malware 
analysis a ...)
+       TODO: check
+CVE-2024-53921 (An issue was discovered in the installer in Samsung Magician 
8.1.0 on  ...)
+       TODO: check
+CVE-2024-53867 (Synapse is an open-source Matrix homeserver. The Sliding Sync 
feature  ...)
+       TODO: check
+CVE-2024-53863 (Synapse is an open-source Matrix homeserver. In Synapse 
versions befor ...)
+       TODO: check
+CVE-2024-53257 (Vitess is a database clustering system for horizontal scaling 
of MySQL ...)
+       TODO: check
+CVE-2024-52815 (Synapse is an open-source Matrix homeserver. Synapse versions 
before 1 ...)
+       TODO: check
+CVE-2024-52805 (Synapse is an open-source Matrix homeserver. In Synapse before 
1.120.1 ...)
+       TODO: check
+CVE-2024-52548 (An attacker who can execute arbitrary Operating Systems 
commands, can  ...)
+       TODO: check
+CVE-2024-52547 (An authenticated attacker can trigger a stack based buffer 
overflow in ...)
+       TODO: check
+CVE-2024-52546 (An unauthenticated attacker can perform a null pointer 
dereference in  ...)
+       TODO: check
+CVE-2024-52545 (An unauthenticated attacker can perform an out of bounds heap 
read in  ...)
+       TODO: check
+CVE-2024-52544 (An unauthenticated attacker can trigger a stack based buffer 
overflow  ...)
+       TODO: check
+CVE-2024-51771 (A vulnerability in the HPE Aruba Networking ClearPass Policy 
Manager w ...)
+       TODO: check
+CVE-2024-51114 (An issue in Beijing Digital China Yunke Information Technology 
Co.Ltd  ...)
+       TODO: check
+CVE-2024-50948 (An issue in mochiMQTT v2.6.3 allows attackers to cause a 
Denial of Ser ...)
+       TODO: check
+CVE-2024-48080 (An issue in aedes v0.51.2 allows attackers to cause a Denial 
of Servic ...)
+       TODO: check
+CVE-2024-47476 (Dell NetWorker Management Console, version(s) 19.11, 
contain(s) an Imp ...)
+       TODO: check
+CVE-2024-45676 (IBM Cognos Controller 11.0.0 and 11.0.1         could allow an 
authent ...)
+       TODO: check
+CVE-2024-42422 (Dell NetWorker, version(s) 19.10, contain(s) an Authorization 
Bypass T ...)
+       TODO: check
+CVE-2024-41777 (IBM Cognos Controller 11.0.0 and 11.0.1           contains 
hard-coded  ...)
+       TODO: check
+CVE-2024-41776 (IBM Cognos Controller 11.0.0 and 11.0.1             is 
vulnerable to c ...)
+       TODO: check
+CVE-2024-41775 (IBM Cognos Controller 11.0.0 and 11.0.1uses weaker than 
expected crypt ...)
+       TODO: check
+CVE-2024-40691 (IBM Cognos Controller 11.0.0 and 11.0.1   could be vulnerable 
to malic ...)
+       TODO: check
+CVE-2024-37303 (Synapse is an open-source Matrix homeserver. Synapse before 
version 1. ...)
+       TODO: check
+CVE-2024-37302 (Synapse is an open-source Matrix homeserver. Synapse versions 
before 1 ...)
+       TODO: check
+CVE-2024-29404 (An issue in Razer Synapse 3 v.3.9.131.20813 and Synapse 3 App 
v.202402 ...)
+       TODO: check
+CVE-2024-25036 (IBM Cognos Controller 11.0.0 and 11.0.1       could allow an 
authentic ...)
+       TODO: check
+CVE-2024-25035 (IBM Cognos Controller 11.0.0 and 11.0.1     exposes server 
details tha ...)
+       TODO: check
+CVE-2024-25020 (IBM Cognos Controller 11.0.0 and 11.0.1               is 
vulnerable to ...)
+       TODO: check
+CVE-2024-25019 (IBM Cognos Controller 11.0.0 and 11.0.1   could be vulnerable 
to malic ...)
+       TODO: check
+CVE-2024-12101
+       REJECTED
+CVE-2024-12082 (in OpenHarmony v4.0.0 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2024-12062 (The Charity Addon for Elementor plugin for WordPress is 
vulnerable to  ...)
+       TODO: check
+CVE-2024-12053 (Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 
allowed  ...)
+       TODO: check
+CVE-2024-11866 (The BMLT Tabbed Map plugin for WordPress is vulnerable to 
Stored Cross ...)
+       TODO: check
+CVE-2024-11844 (The IdeaPush plugin for WordPress is vulnerable to 
unauthorized modifi ...)
+       TODO: check
+CVE-2024-11782 (The WP Mailster plugin for WordPress is vulnerable to Stored 
Cross-Sit ...)
+       TODO: check
+CVE-2024-11391 (The Advanced File Manager plugin for WordPress is vulnerable 
to arbitr ...)
+       TODO: check
+CVE-2024-11326 (The Campaign Monitor Forms by Optin Cat plugin for WordPress 
is vulner ...)
+       TODO: check
+CVE-2024-11325 (The AWeber Forms by Optin Cat plugin for WordPress is 
vulnerable to Re ...)
+       TODO: check
+CVE-2024-11200 (The Goodlayers Core plugin for WordPress is vulnerable to 
Reflected Cr ...)
+       TODO: check
+CVE-2024-10074 (in OpenHarmony v4.1.1 and prior versions allow a local 
attacker cause  ...)
+       TODO: check
+CVE-2023-7255
+       REJECTED
+CVE-2024-45106 (Improper authentication of an HTTP endpoint in the S3 Gateway 
of Apach ...)
        NOT-FOR-US: Apache Ozone
 CVE-2024-48916 [Authentication bypass in CEPH RadosGW]
        - ceph <unfixed>
@@ -229,6 +319,7 @@ CVE-2024-53259 (quic-go is an implementation of the QUIC 
protocol in Go. An off-
        NOTE: 
https://github.com/quic-go/quic-go/commit/ca31dd355cbe5fc6c5807992d9d1149c66c96a50
 (master)
        NOTE: 
https://github.com/quic-go/quic-go/commit/34157e6455b07723d11385212a4e1328f57f1da5
 (v0.48.2)
 CVE-2024-52806 (SimpleSAMLphp SAML2 library is a PHP library for SAML2 related 
functio ...)
+       {DSA-5822-1 DLA-3981-1}
        - simplesamlphp <unfixed> (bug #1088904)
        NOTE: 
https://github.com/simplesamlphp/saml2/security/advisories/GHSA-pxm4-r5ph-q2m2
        NOTE: 
https://github.com/simplesamlphp/saml2/commit/5fd4ce4596656fb0c1278f15b8305825412e89f7
 (v4.16.14)
@@ -2877,7 +2968,7 @@ CVE-2024-45511 (An issue was discovered in Zimbra 
Collaboration (ZCS) through 10
 CVE-2024-45510 (An issue was discovered in Zimbra Collaboration (ZCS) through 
10.0. Zi ...)
        NOT-FOR-US: Zimbra
 CVE-2024-44309 (A cookie management issue was addressed with improved state 
management ...)
-       {DSA-5823-1}
+       {DSA-5823-1 DLA-3982-1}
        - webkit2gtk 2.46.4-1
        [buster] - webkit2gtk <end-of-life> (EOL in buster LTS)
        - wpewebkit 2.46.4-1
@@ -2885,7 +2976,7 @@ CVE-2024-44309 (A cookie management issue was addressed 
with improved state mana
        [bullseye] - wpewebkit <ignored> (wpewebkit >= 2.40 can no longer be 
sensibly backported)
        NOTE: https://webkitgtk.org/security/WSA-2024-0007.html
 CVE-2024-44308 (The issue was addressed with improved checks. This issue is 
fixed in S ...)
-       {DSA-5823-1}
+       {DSA-5823-1 DLA-3982-1}
        - webkit2gtk 2.46.4-1
        [buster] - webkit2gtk <end-of-life> (EOL in buster LTS)
        - wpewebkit 2.46.4-1
@@ -284439,8 +284530,8 @@ CVE-2021-29894 (IBM Cloud Pak for Security (CP4S) 
1.7.0.0, 1.7.1.0, 1.7.2.0, and
        NOT-FOR-US: IBM
 CVE-2021-29893
        RESERVED
-CVE-2021-29892
-       RESERVED
+CVE-2021-29892 (IBM Cognos Controller 11.0.0 and 11.0.1 could allow a remote 
attacker  ...)
+       TODO: check
 CVE-2021-29891 (IBM OPENBMC OP910 and OP940 could allow a privileged user to 
upload an ...)
        NOT-FOR-US: IBM
 CVE-2021-29890



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d45f8b58f46c0095cfb666351dfedbb4dd630bb

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d45f8b58f46c0095cfb666351dfedbb4dd630bb
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to