[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Dec 13 08:12:22 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
20ed4bca by security tracker role at 2024-12-13T08:12:17+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,51 @@
+CVE-2024-9508 (Horner Automation Cscape contains a memory corruption vulnerability, w ...)
+	TODO: check
+CVE-2024-55918 (An issue was discovered in the Graphics::ColorNames package before 3.2 ...)
+	TODO: check
+CVE-2024-21544 (Versions of the package spatie/browsershot before 5.0.1 are vulnerable ...)
+	TODO: check
+CVE-2024-21543 (Versions of the package djoser before 2.3.0 are vulnerable to Authenti ...)
+	TODO: check
+CVE-2024-12603 (A logic vulnerability in the the mobile application (com.transsion.app ...)
+	TODO: check
+CVE-2024-12581 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Feature ...)
+	TODO: check
+CVE-2024-12579 (The Minify HTML plugin for WordPress is vulnerable to Regular Expressi ...)
+	TODO: check
+CVE-2024-12574 (The SVG Shortcode plugin for WordPress is vulnerable to Stored Cross-S ...)
+	TODO: check
+CVE-2024-12572 (The Hello In All Languages plugin for WordPress is vulnerable to Cross ...)
+	TODO: check
+CVE-2024-12300 (The AR for WordPress plugin for WordPress is vulnerable to unauthorize ...)
+	TODO: check
+CVE-2024-12289 (Boundary Community Edition and Boundary Enterprise (\u201cBoundary\u20 ...)
+	TODO: check
+CVE-2024-12212 (The vulnerability occurs in the parsing of CSP files. The issues resul ...)
+	TODO: check
+CVE-2024-11839 (Deserialization of Untrusted Data vulnerability in PlexTrac (Runbooks  ...)
+	TODO: check
+CVE-2024-11838 (External Control of File Name or Path vulnerability in PlexTrac allows ...)
+	TODO: check
+CVE-2024-11837 (Improper Neutralization of Special Elements used in an N1QL Command (' ...)
+	TODO: check
+CVE-2024-11836 (Server-Side Request Forgery (SSRF) vulnerability in PlexTrac allowing  ...)
+	TODO: check
+CVE-2024-11835 (Uncontrolled Resource Consumption vulnerability in PlexTrac allows Web ...)
+	TODO: check
+CVE-2024-11834 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2024-11833 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2024-11809 (The Primer MyData for Woocommerce plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2024-11767 (The NewsmanApp plugin for WordPress is vulnerable to Stored Cross-Site ...)
+	TODO: check
+CVE-2024-10939 (The Image Widget WordPress plugin before 4.4.11 does not sanitise and  ...)
+	TODO: check
+CVE-2024-10678 (The Ultimate Blocks  WordPress plugin before 3.2.4 does not validate a ...)
+	TODO: check
+CVE-2019-25221 (The Responsive Filterable Portfolio plugin for WordPress is vulnerable ...)
+	TODO: check
 CVE-2024-12455 [powerpc: getrandom() returns EINVAL as retcode instead of errno]
 	- glibc <not-affected> (Vulnerable code not present)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32440
@@ -45,7 +93,8 @@ CVE-2024-54122 (Concurrent variable access vulnerability in the ability module I
 	NOT-FOR-US: Huawei
 CVE-2024-54119 (Cross-process screen stack vulnerability in the UIExtension module Imp ...)
 	NOT-FOR-US: Huawei
-CVE-2024-54118 (Cross-process screen stack vulnerability in the UIExtension module Imp ...)
+CVE-2024-54118
+	REJECTED
 	NOT-FOR-US: Huawei
 CVE-2024-54117 (Cross-process screen stack vulnerability in the UIExtension module Imp ...)
 	NOT-FOR-US: Huawei
@@ -100047,7 +100096,8 @@ CVE-2023-6577 (A vulnerability was found in Byzoro PatrolFlow 2530Pro up to 2023
 	NOT-FOR-US: Beijing Baichuo PatrolFlow 2530Pro
 CVE-2023-6576 (A vulnerability was found in Byzoro S210 up to 20231123. It has been d ...)
 	NOT-FOR-US: Beijing Baichuo S210
-CVE-2023-6061 (Multiple components of Iconics SCADA Suite are prone to a Phantom DLL  ...)
+CVE-2023-6061
+	REJECTED
 	NOT-FOR-US: Iconics SCADA Suite
 CVE-2023-5058 (Improper Input Validation in the processing of user-supplied splash sc ...)
 	NOT-FOR-US: Phoenix



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20ed4bcac5c0b5d44968bc0dff774641fd47bd34

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20ed4bcac5c0b5d44968bc0dff774641fd47bd34
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241213/6ba9753e/attachment.htm>


More information about the debian-security-tracker-commits mailing list