[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Nov 16 20:12:17 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8dd06150 by security tracker role at 2024-11-16T20:12:10+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,93 @@
+CVE-2024-9938 (The Bounce Handler MailPoet 3 plugin for WordPress is vulnerable to Re ...)
+ TODO: check
+CVE-2024-9935 (The PDF Generator Addon for Elementor Page Builder plugin for WordPres ...)
+ TODO: check
+CVE-2024-9887 (The Login using WordPress Users ( WP as SAML IDP ) plugin for WordPres ...)
+ TODO: check
+CVE-2024-9850 (The SVG Case Study plugin for WordPress is vulnerable to Stored Cross- ...)
+ TODO: check
+CVE-2024-9849 (The 3D FlipBook, PDF Viewer, PDF Embedder \u2013 Real 3D FlipBook Word ...)
+ TODO: check
+CVE-2024-9839 (The The Uix Slideshow plugin for WordPress is vulnerable to arbitrary ...)
+ TODO: check
+CVE-2024-9615 (The BulkPress plugin for WordPress is vulnerable to Reflected Cross-Si ...)
+ TODO: check
+CVE-2024-9500 (A maliciously crafted DLL file when placed in temporary files and fold ...)
+ TODO: check
+CVE-2024-9386 (The Exclusive Divi \u2013 Divi Preloader, Modules for Divi & Extra The ...)
+ TODO: check
+CVE-2024-9192 (The WordPress Video Robot - The Ultimate Video Importer plugin for Wor ...)
+ TODO: check
+CVE-2024-8873 (The PeproDev WooCommerce Receipt Uploader plugin for WordPress is vuln ...)
+ TODO: check
+CVE-2024-8856 (The Backup and Staging by WP Time Capsule plugin for WordPress is vuln ...)
+ TODO: check
+CVE-2024-6628 (The EleForms \u2013 All In One Form Integration including DB for Eleme ...)
+ TODO: check
+CVE-2024-51765 (A security vulnerability has been identified in HPE Cray Data Virtuali ...)
+ TODO: check
+CVE-2024-51764 (A security vulnerability has been identified in HPE Data Management Fr ...)
+ TODO: check
+CVE-2024-50983 (FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, wh ...)
+ TODO: check
+CVE-2024-49592 (McAfee Trial Installer 16.0.53 has Incorrect Access Control that leads ...)
+ TODO: check
+CVE-2024-49060 (Azure Stack HCI Elevation of Privilege Vulnerability)
+ TODO: check
+CVE-2024-45611 (GLPI is an open-source asset and IT management software package that p ...)
+ TODO: check
+CVE-2024-45610 (GLPI is an open-source asset and IT management software package that p ...)
+ TODO: check
+CVE-2024-44758 (An arbitrary file upload vulnerability in the component /Production/Up ...)
+ TODO: check
+CVE-2024-38370 (GLPI is a free asset and IT management software package. Starting in 9 ...)
+ TODO: check
+CVE-2024-11263 (When the Global Pointer (GP) relative addressing is enabled (CONFIG_RI ...)
+ TODO: check
+CVE-2024-11262 (A vulnerability has been found in SourceCodester Student Record Manage ...)
+ TODO: check
+CVE-2024-11261 (A vulnerability, which was classified as critical, was found in Source ...)
+ TODO: check
+CVE-2024-11217 (A vulnerability was found in the OAuth-server. OAuth-server logs the O ...)
+ TODO: check
+CVE-2024-11118 (The 404 Error Monitor plugin for WordPress is vulnerable to Cross-Site ...)
+ TODO: check
+CVE-2024-11094 (The 404 Solution plugin for WordPress is vulnerable to Sensitive Infor ...)
+ TODO: check
+CVE-2024-11092 (The SVGPlus plugin for WordPress is vulnerable to Stored Cross-Site Sc ...)
+ TODO: check
+CVE-2024-11085 (The WP Log Viewer plugin for WordPress is vulnerable to unauthorized u ...)
+ TODO: check
+CVE-2024-10884 (The SimpleForm Contact Form Submissions plugin for WordPress is vulner ...)
+ TODO: check
+CVE-2024-10883 (The SimpleForm \u2013 Contact form made simple plugin for WordPress is ...)
+ TODO: check
+CVE-2024-10875 (The Gallery Manager plugin for WordPress is vulnerable to Reflected Cr ...)
+ TODO: check
+CVE-2024-10861 (The Popup Box \u2013 Create Countdown, Coupon, Video, Contact Form Pop ...)
+ TODO: check
+CVE-2024-10795 (The Popularis Extra plugin for WordPress is vulnerable to Information ...)
+ TODO: check
+CVE-2024-10786 (The Simple Local Avatars plugin for WordPress is vulnerable to unautho ...)
+ TODO: check
+CVE-2024-10728 (The Post Grid Gutenberg Blocks and WordPress Blog Plugin \u2013 PostX ...)
+ TODO: check
+CVE-2024-10645 (The Blogger 301 Redirect plugin for WordPress is vulnerable to blind t ...)
+ TODO: check
+CVE-2024-10614 (The Customer Reviews for WooCommerce plugin for WordPress is vulnerabl ...)
+ TODO: check
+CVE-2024-10592 (The Mapster WP Maps plugin for WordPress is vulnerable to Stored Cross ...)
+ TODO: check
+CVE-2024-10533 (The WP Chat App plugin for WordPress is vulnerable to unauthorized plu ...)
+ TODO: check
+CVE-2024-10262 (The The Drop Shadow Boxes plugin for WordPress is vulnerable to arbitr ...)
+ TODO: check
+CVE-2024-10147 (The Steel plugin for WordPress is vulnerable to Stored Cross-Site Scri ...)
+ TODO: check
+CVE-2024-10017 (The PJW Mime Config plugin for WordPress is vulnerable to Stored Cross ...)
+ TODO: check
+CVE-2024-10015 (The ConvertCalculator for WordPress plugin for WordPress is vulnerable ...)
+ TODO: check
CVE-2024-41151
NOT-FOR-US: Apache HertzBeat
CVE-2024-45791
@@ -580,28 +670,28 @@ CVE-2024-10921 (An authorized user may trigger crashes or receive the contents o
CVE-2024-10571 (The Chartify \u2013 WordPress Chart Plugin plugin for WordPress is vul ...)
NOT-FOR-US: WordPress plugin
CVE-2024-10979 (Incorrect control of environment variables in PostgreSQL PL/Perl allow ...)
- {DSA-5812-1}
+ {DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- postgresql-16 <unfixed>
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10979/
CVE-2024-10978 (Incorrect privilege assignment in PostgreSQL allows a less-privileged ...)
- {DSA-5812-1}
+ {DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- postgresql-16 <unfixed>
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10978/
CVE-2024-10977 (Client use of server error message in PostgreSQL allows a server not t ...)
- {DSA-5812-1}
+ {DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- postgresql-16 <unfixed>
- postgresql-15 <removed>
- postgresql-13 <removed>
NOTE: https://www.postgresql.org/support/security/CVE-2024-10977/
CVE-2024-10976 (Incomplete tracking in PostgreSQL of tables with row security allows a ...)
- {DSA-5812-1}
+ {DSA-5812-1 DLA-3954-1}
- postgresql-17 17.1-1
- postgresql-16 <unfixed>
- postgresql-15 <removed>
@@ -1775,6 +1865,7 @@ CVE-2023-44255 (An exposure of sensitive information to an unauthorized actor [C
CVE-2023-32736 (A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All vers ...)
NOT-FOR-US: Siemens
CVE-2024-49369 (Icinga is a monitoring system which checks the availability of network ...)
+ {DLA-3953-1}
- icinga2 2.14.3-1 (bug #1087384)
[bookworm] - icinga2 <no-dsa> (Will be fixed via point release; Only affects deployments with access to Icinga API via client certificates)
NOTE: https://github.com/Icinga/icinga2/security/advisories/GHSA-j7wq-r9mg-9wpv
@@ -259599,7 +259690,7 @@ CVE-2021-37700 (@github/paste-markdown is an npm package for pasting markdown ob
CVE-2021-37699 (Next.js is an open source website development framework to be used wit ...)
NOT-FOR-US: next.js
CVE-2021-37698 (Icinga is a monitoring system which checks the availability of network ...)
- {DLA-2816-1}
+ {DLA-3953-1 DLA-2816-1}
- icinga2 2.13.1-1
[buster] - icinga2 <no-dsa> (Minor issue)
NOTE: https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2
@@ -271849,7 +271940,7 @@ CVE-2021-32745 (Collabora Online is a collaborative online office suite. A refle
CVE-2021-32744 (Collabora Online is a collaborative online office suite. In versions p ...)
NOT-FOR-US: Collabora Online
CVE-2021-32743 (Icinga is a monitoring system which checks the availability of network ...)
- {DLA-2816-1}
+ {DLA-3953-1 DLA-2816-1}
[experimental] - icinga2 2.12.5-1~exp1
- icinga2 2.12.5-1 (bug #991494)
[buster] - icinga2 <no-dsa> (Minor issue)
@@ -271867,7 +271958,7 @@ CVE-2021-32740 (Addressable is an alternative implementation to the URI implemen
NOTE: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g
NOTE: https://github.com/sporkmonger/addressable/commit/b48ff03347a6d46e8dc674e242ce74c6381962a5#diff-fb36d3dc67e6565ffde17e666a98697f48e76dac38fabf1bb9e97cdf3b583d76
CVE-2021-32739 (Icinga is a monitoring system which checks the availability of network ...)
- {DLA-2816-1}
+ {DLA-3953-1 DLA-2816-1}
[experimental] - icinga2 2.12.5-1~exp1
- icinga2 2.12.5-1 (bug #991494)
[buster] - icinga2 <no-dsa> (Minor issue)
@@ -510297,18 +510388,18 @@ CVE-2017-13316
NOT-FOR-US: Android
CVE-2017-13315
RESERVED
-CVE-2017-13314
- RESERVED
-CVE-2017-13313
- RESERVED
-CVE-2017-13312
- RESERVED
-CVE-2017-13311
- RESERVED
-CVE-2017-13310
- RESERVED
-CVE-2017-13309
- RESERVED
+CVE-2017-13314 (In setAllowOnlyVpnForUids of NetworkManagementService.java, there is a ...)
+ TODO: check
+CVE-2017-13313 (In ElementaryStreamQueue::dequeueAccessUnitMPEG4Video of ESQueue.cpp, ...)
+ TODO: check
+CVE-2017-13312 (In createFromParcel of MediaCas.java, there is a possible parcel read/ ...)
+ TODO: check
+CVE-2017-13311 (In the read() function of ProcessStats.java, there is a possible read/ ...)
+ TODO: check
+CVE-2017-13310 (In createFromParcel of ViewPager.java, there is a possible read/write ...)
+ TODO: check
+CVE-2017-13309 (In readEncryptedData of ConscryptEngine.java, there is a possible plai ...)
+ TODO: check
CVE-2017-13308
RESERVED
CVE-2017-13307 (A elevation of privilege vulnerability in the Upstream kernel pci sysf ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8dd0615089d8120683ff9218f2bcecf5a1ba6ebb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8dd0615089d8120683ff9218f2bcecf5a1ba6ebb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241116/e438f80e/attachment.htm>
More information about the debian-security-tracker-commits
mailing list