[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 1 08:12:06 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
64233557 by security tracker role at 2024-11-01T08:11:59+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,67 @@
+CVE-2024-9655 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Feature ...)
+	TODO: check
+CVE-2024-7424 (The Multiple Page Generator Plugin \u2013 MPG plugin for WordPress is  ...)
+	TODO: check
+CVE-2024-6480 (The SIP Reviews Shortcode for WooCommerce plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2024-6479 (The SIP Reviews Shortcode for WooCommerce plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2024-49501 (Sysmac Studio provided by OMRON Corporation contains an incorrect auth ...)
+	TODO: check
+CVE-2024-47939 (Stack-based buffer overflow vulnerability exists in multiple Ricoh las ...)
+	TODO: check
+CVE-2024-21510 (Versions of the package sinatra from 0.0.0 are vulnerable to Reliance  ...)
+	TODO: check
+CVE-2024-10620 (A vulnerability was found in knightliao Disconf 2.6.36. It has been cl ...)
+	TODO: check
+CVE-2024-10619 (A vulnerability, which was classified as critical, was found in Tongda ...)
+	TODO: check
+CVE-2024-10618 (A vulnerability, which was classified as critical, has been found in T ...)
+	TODO: check
+CVE-2024-10617 (A vulnerability classified as critical was found in Tongda OA up to 11 ...)
+	TODO: check
+CVE-2024-10616 (A vulnerability classified as critical has been found in Tongda OA up  ...)
+	TODO: check
+CVE-2024-10615 (A vulnerability was found in Tongda OA 2017 up to 11.10. It has been r ...)
+	TODO: check
+CVE-2024-10613 (A vulnerability was found in ESAFENET CDG 5. It has been declared as c ...)
+	TODO: check
+CVE-2024-10612 (A vulnerability was found in ESAFENET CDG 5. It has been classified as ...)
+	TODO: check
+CVE-2024-10611 (A vulnerability was found in ESAFENET CDG 5 and classified as critical ...)
+	TODO: check
+CVE-2024-10610 (A vulnerability has been found in ESAFENET CDG 5 and classified as cri ...)
+	TODO: check
+CVE-2024-10609 (A vulnerability, which was classified as critical, was found in itsour ...)
+	TODO: check
+CVE-2024-10608 (A vulnerability was found in code-projects Courier Management System 1 ...)
+	TODO: check
+CVE-2024-10607 (A vulnerability was found in code-projects Courier Management System 1 ...)
+	TODO: check
+CVE-2024-10605 (A vulnerability was found in code-projects Blood Bank Management Syste ...)
+	TODO: check
+CVE-2024-10602 (A vulnerability was found in Tongda OA 2017 up to 11.9 and classified  ...)
+	TODO: check
+CVE-2024-10601 (A vulnerability has been found in Tongda OA 2017 up to 11.10 and class ...)
+	TODO: check
+CVE-2024-10600 (A vulnerability, which was classified as critical, was found in Tongda ...)
+	TODO: check
+CVE-2024-10599 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2024-10598 (A vulnerability classified as critical was found in Tongda OA 11.2/11. ...)
+	TODO: check
+CVE-2024-10597 (A vulnerability classified as critical has been found in ESAFENET CDG  ...)
+	TODO: check
+CVE-2024-10596 (A vulnerability was found in ESAFENET CDG 5. It has been rated as crit ...)
+	TODO: check
+CVE-2024-10595 (A vulnerability was found in ESAFENET CDG 5. It has been declared as c ...)
+	TODO: check
+CVE-2024-10594 (A vulnerability was found in ESAFENET CDG 5. It has been classified as ...)
+	TODO: check
+CVE-2024-0106 (NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit ( ...)
+	TODO: check
+CVE-2024-0105 (NVIDIA ConnectX Firmware contains a vulnerability where an attacker ma ...)
+	TODO: check
 CVE-2024-8934 (A local user with administrative access rights can enter specialy craf ...)
 	NOT-FOR-US: TwinCAT Package Manager
 CVE-2024-8553 (A vulnerability was found in Foreman's loader macros introduced with r ...)
@@ -379,8 +443,8 @@ CVE-2024-48138 (A remote code execution (RCE) vulnerability in the component /Pl
 CVE-2024-48063 (In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE.)
 	- pytorch <unfixed> (unimportant)
 	NOTE: https://rumbling-slice-eb0.notion.site/Distributed-RPC-Framework-RemoteModule-has-Deserialization-RCE-in-pytorch-pytorch-111e3cda9e8c8021a7d3cbc61ee1a20c
-        NOTE: Non issue as only documented to be used for internal communication:
-        NOTE: https://github.com/pytorch/pytorch/security/policy#using-distributed-features
+	NOTE: Non issue as only documented to be used for internal communication:
+	NOTE: https://github.com/pytorch/pytorch/security/policy#using-distributed-features
 	TODO: should probably be rejected, similar as CVE-2024-5480 got rejected, MITRE contacted
 CVE-2024-44081 (In Jitsi Meet before 2.0.9779, the functionality to share a video file ...)
 	- jitsi-meet <itp> (bug #760485)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/642335573bed1c92c840e71a1ea3c6f6b260fcaa

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/642335573bed1c92c840e71a1ea3c6f6b260fcaa
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241101/689b9377/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list