[Git][security-tracker-team/security-tracker][master] pluxml removed from unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Jun 25 10:57:29 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
499fc50d by Salvatore Bonaccorso at 2022-06-25T11:57:03+02:00
pluxml removed from unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -26226,12 +26226,12 @@ CVE-2022-25022 (A cross-site scripting (XSS) vulnerability in Htmly v2.8.1 allow
CVE-2022-25021
RESERVED
CVE-2022-25020 (A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows att ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
NOTE: https://github.com/MoritzHuppert/CVE-2022-25020/blob/main/CVE-2022-25020.pdf
CVE-2022-25019
REJECTED
CVE-2022-25018 (Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary c ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
NOTE: https://github.com/MoritzHuppert/CVE-2022-25018/blob/main/CVE-2022-25018.pdf
CVE-2022-25017 (Hitron CHITA 7.2.2.0.3b6-CD devices contain a command injection vulner ...)
NOT-FOR-US: Hitron CHITA
@@ -27690,13 +27690,13 @@ CVE-2022-24589 (Burden v3.0 was discovered to contain a stored cross-site script
CVE-2022-24588 (Flatpress v1.2.1 was discovered to contain a cross-site scripting (XSS ...)
NOT-FOR-US: Flatpress
CVE-2022-24587 (A stored cross-site scripting (XSS) vulnerability in the component cor ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24587/CVE-2022-24587.pdf
CVE-2022-24586 (A stored cross-site scripting (XSS) vulnerability in the component /co ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24586/CVE-2022-24586.pdf
CVE-2022-24585 (A stored cross-site scripting (XSS) vulnerability in the component /co ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24585/CVE-2022-24585.pdf
CVE-2022-24584 (** DISPUTED ** Incorrect access control in Yubico OTP functionality of ...)
NOT-FOR-US: yubico.com
@@ -60515,11 +60515,11 @@ CVE-2021-38604 (In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/
NOTE: https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641
NOTE: https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8
CVE-2021-38603 (PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Informati ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
[buster] - pluxml <ignored> (Minor issue)
[stretch] - pluxml <no-dsa> (Minor issue)
CVE-2021-38602 (PluXML 5.8.7 allows Article Editing stored XSS via Headline or Content ...)
- - pluxml <unfixed> (bug #1008264)
+ - pluxml <removed> (bug #1008264)
[buster] - pluxml <ignored> (Minor issue)
[stretch] - pluxml <no-dsa> (Minor issue)
CVE-2021-38601
@@ -141537,12 +141537,12 @@ CVE-2020-18187
CVE-2020-18186
RESERVED
CVE-2020-18185 (class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrar ...)
- - pluxml <unfixed> (unimportant; bug #973382)
+ - pluxml <removed> (unimportant; bug #973382)
NOTE: https://github.com/pluxml/PluXml/issues/321
NOTE: The attack vector is a little unusual but it would be quite expected that
NOTE: the admin can execute arbitrary php code.
CVE-2020-18184 (In PluxXml V5.7,the theme edit function /PluXml/core/admin/parametres_ ...)
- - pluxml <unfixed> (unimportant; bug #973382)
+ - pluxml <removed> (unimportant; bug #973382)
NOTE: https://github.com/pluxml/PluXml/issues/320
NOTE: One could question whether this is a vulnerability at all. The
NOTE: developer documentation describes this as expected behavior.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/499fc50d340b4cb35393958eb5d0e91aec57ac05
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/499fc50d340b4cb35393958eb5d0e91aec57ac05
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220625/27f0bb7b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list