[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Oct 29 20:16:50 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
40a02016 by security tracker role at 2024-10-29T20:16:43+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,70 +1,300 @@
-CVE-2024-10467
+CVE-2024-9990 (The Crypto plugin for WordPress is vulnerable to Cross-Site Request Fo ...)
+	TODO: check
+CVE-2024-9989 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...)
+	TODO: check
+CVE-2024-9988 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...)
+	TODO: check
+CVE-2024-9505 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress  ...)
+	TODO: check
+CVE-2024-9438 (The SEUR Oficial plugin for WordPress is vulnerable to Reflected Cross ...)
+	TODO: check
+CVE-2024-9376 (The Kata Plus \u2013 Addons for Elementor \u2013 Widgets, Extensions a ...)
+	TODO: check
+CVE-2024-8924 (ServiceNow has addressed a blind SQL injection vulnerability that was  ...)
+	TODO: check
+CVE-2024-8923 (ServiceNow has addressed an input validation vulnerability that was id ...)
+	TODO: check
+CVE-2024-8309 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...)
+	TODO: check
+CVE-2024-8143 (In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an iss ...)
+	TODO: check
+CVE-2024-7985 (The FileOrganizer \u2013 Manage WordPress and Website Files plugin for ...)
+	TODO: check
+CVE-2024-7962 (An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchat ...)
+	TODO: check
+CVE-2024-7807 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows  ...)
+	TODO: check
+CVE-2024-7783 (mintplex-labs/anything-llm version latest contains a vulnerability whe ...)
+	TODO: check
+CVE-2024-7774 (A path traversal vulnerability exists in the `getFullPath` method of l ...)
+	TODO: check
+CVE-2024-7475 (An improper access control vulnerability in lunary-ai/lunary version 1 ...)
+	TODO: check
+CVE-2024-7474 (In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Refere ...)
+	TODO: check
+CVE-2024-7473 (An IDOR vulnerability exists in the 'Evaluations' function of the 'umg ...)
+	TODO: check
+CVE-2024-7472 (lunary-ai/lunary v1.2.26 contains an email injection vulnerability in  ...)
+	TODO: check
+CVE-2024-7042 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...)
+	TODO: check
+CVE-2024-7010 (mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This t ...)
+	TODO: check
+CVE-2024-6868 (mudler/LocalAI version 2.17.1 allows for arbitrary file write due to i ...)
+	TODO: check
+CVE-2024-6674 (A CORS misconfiguration in parisneo/lollms-webui prior to version 10 a ...)
+	TODO: check
+CVE-2024-6673 (A Cross-Site Request Forgery (CSRF) vulnerability exists in the `insta ...)
+	TODO: check
+CVE-2024-6581 (A vulnerability in the discussion image upload function of the Lollms  ...)
+	TODO: check
+CVE-2024-5982 (A path traversal vulnerability exists in the latest version of gaizhen ...)
+	TODO: check
+CVE-2024-5823 (A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt ve ...)
+	TODO: check
+CVE-2024-51181 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...)
+	TODO: check
+CVE-2024-51180 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...)
+	TODO: check
+CVE-2024-51076 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...)
+	TODO: check
+CVE-2024-51075 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...)
+	TODO: check
+CVE-2024-50550 (Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies ...)
+	TODO: check
+CVE-2024-50490 (Missing Authorization vulnerability in Szabolcs Szecsenyi PegaPoll all ...)
+	TODO: check
+CVE-2024-50485 (: Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matr ...)
+	TODO: check
+CVE-2024-50481 (Incorrect Privilege Assignment vulnerability in Stack Themes Bstone De ...)
+	TODO: check
+CVE-2024-50476 (Missing Authorization vulnerability in GR\xdcN Software Group GmbH GR\ ...)
+	TODO: check
+CVE-2024-50475 (Missing Authorization vulnerability in Scott Gamon Signup Page allows  ...)
+	TODO: check
+CVE-2024-50473 (Unrestricted Upload of File with Dangerous Type vulnerability in Ajar  ...)
+	TODO: check
+CVE-2024-50466 (Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySi ...)
+	TODO: check
+CVE-2024-50459 (Missing Authorization vulnerability in HM Plugin WordPress Stripe Dona ...)
+	TODO: check
+CVE-2024-50427 (Unrestricted Upload of File with Dangerous Type vulnerability in Devso ...)
+	TODO: check
+CVE-2024-50426 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50420 (Unrestricted Upload of File with Dangerous Type vulnerability in adire ...)
+	TODO: check
+CVE-2024-50418 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50415 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50414 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50413 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50412 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50411 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50410 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50409 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50407 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-50334 (Scoold is a Q&A and a knowledge sharing platform for teams. A semicolo ...)
+	TODO: check
+CVE-2024-50052 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...)
+	TODO: check
+CVE-2024-49769 (Waitress is a Web Server Gateway Interface server for Python 2 and 3.  ...)
+	TODO: check
+CVE-2024-49768 (Waitress is a Web Server Gateway Interface server for Python 2 and 3.  ...)
+	TODO: check
+CVE-2024-49692 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49679 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49678 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49673 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49672 (Cross-Site Request Forgery (CSRF) vulnerability in Gifford Cheung, Bri ...)
+	TODO: check
+CVE-2024-49670 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49667 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49665 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49664 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49663 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49662 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49661 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49660 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49659 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49656 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49654 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49651 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49650 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49648 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49647 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49646 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49645 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49643 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49642 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49641 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49639 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49638 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49637 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49636 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49635 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49634 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-49632 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-48955 (In NetAdmin 4.0.30319, an attacker can steal a valid session cookie an ...)
+	TODO: check
+CVE-2024-48921 (Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterP ...)
+	TODO: check
+CVE-2024-47640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2024-47401 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 9.5.x <= 9. ...)
+	TODO: check
+CVE-2024-46872 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...)
+	TODO: check
+CVE-2024-41156 (Profile files from TRO600 series radios are extracted in plain-text an ...)
+	TODO: check
+CVE-2024-41153 (Command injection vulnerability in the Edge Computing UI for the TRO60 ...)
+	TODO: check
+CVE-2024-25566 (An Open-Redirect vulnerability exists in PingAM where well-crafted req ...)
+	TODO: check
+CVE-2024-22066 (There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 inte ...)
+	TODO: check
+CVE-2024-10491 (A vulnerability has been identified in the Express response.linksfunct ...)
+	TODO: check
+CVE-2024-10474 (Focus was incorrectly allowing internal links to utilize the app schem ...)
+	TODO: check
+CVE-2024-10452 (Organization admins can delete pending invites created in an organizat ...)
+	TODO: check
+CVE-2024-10437 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...)
+	TODO: check
+CVE-2024-10436 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...)
+	TODO: check
+CVE-2024-10360 (The Move Addons for Elementor plugin for WordPress is vulnerable to Se ...)
+	TODO: check
+CVE-2024-10266 (The Premium Addons for Elementor plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-10241 (Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the channel ...)
+	TODO: check
+CVE-2024-10233 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPr ...)
+	TODO: check
+CVE-2024-10227 (The affiliate-toolkit plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-10226 (The Arconix Shortcodes plugin for WordPress is vulnerable to Stored Cr ...)
+	TODO: check
+CVE-2024-10185 (The StreamWeasels YouTube Integration plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2024-10184 (The StreamWeasels Kick Integration plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2024-10181 (The Newsletters plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2024-10048 (The Post Status Notifier Lite and Premium plugins for WordPress is vul ...)
+	TODO: check
+CVE-2019-25219 (Asio C++ Library before 1.13.0 lacks a fallback error code in the case ...)
+	TODO: check
+CVE-2017-20195 (A vulnerability was found in LUNAD3v AreaLoad up to 1a1103182ed63a06dd ...)
+	TODO: check
+CVE-2024-10467 (Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thun ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10467
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10467
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10467
-CVE-2024-10466
+CVE-2024-10466 (By sending a specially crafted push message, a remote server could hav ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10466
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10466
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10466
-CVE-2024-10465
+CVE-2024-10465 (A clipboard "paste" button could persist across tabs which allowed a s ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10465
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10465
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10465
-CVE-2024-10464
+CVE-2024-10464 (Repeated writes to history interface attributes could have been used t ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10464
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10464
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10464
-CVE-2024-10468
+CVE-2024-10468 (Potential race conditions in IndexedDB could have caused memory corrup ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10468
-CVE-2024-10463
+CVE-2024-10463 (Video frames could have been leaked between origins in some situations ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10463
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10463
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10463
-CVE-2024-10462
+CVE-2024-10462 (Truncation of a long URL could have allowed origin spoofing in a permi ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10462
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10462
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10462
-CVE-2024-10461
+CVE-2024-10461 (In multipart/x-mixed-replace responses, `Content-Disposition: attachme ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10461
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10461
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10461
-CVE-2024-10460
+CVE-2024-10460 (The origin of an external protocol handler prompt could have been obsc ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10460
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10460
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10460
-CVE-2024-10459
+CVE-2024-10459 (An attacker could have caused a use-after-free when accessibility was  ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10459
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10459
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10459
-CVE-2024-10458
+CVE-2024-10458 (A permission leak could have occurred from a trusted site to an untrus ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
@@ -72,12 +302,13 @@ CVE-2024-10458
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10458
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10458
 CVE-2024-9632
+	{DSA-5800-1 DLA-3940-1}
 	- xorg-server <unfixed> (bug #1086244)
 	- xwayland <unfixed> (bug #1086245)
 	[bookworm] - xwayland <ignored> (Minor issue; Xwayland shouldn't be running as root)
 	NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/85b776571487f52e756f68a069c768757369bfe3
 	NOTE: https://lists.freedesktop.org/archives/xorg-announce/2024-October/003545.html
-CVE-2024-45477
+CVE-2024-45477 (Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 suppor ...)
 	NOT-FOR-US: Apache NiFi
 CVE-2024-51509 (Tiki through 27.0 allows users who have certain permissions to insert  ...)
 	- tikiwiki <removed>
@@ -1489,7 +1720,7 @@ CVE-2024-10278 (A vulnerability was found in ESAFENET CDG 5. It has been classif
 	NOT-FOR-US: ESAFENET CDG
 CVE-2024-10277 (A vulnerability was found in ESAFENET CDG 5 and classified as critical ...)
 	NOT-FOR-US: ESAFENET CDG
-CVE-2024-10276 (A vulnerability has been found in Tektronix Sentry 6.0.9 and classifie ...)
+CVE-2024-10276 (A vulnerability has been found in Telestream Sentry 6.0.9 and classifi ...)
 	NOT-FOR-US: Tektronix
 CVE-2024-10250 (The Nioland theme for WordPress is vulnerable to Reflected Cross-Site  ...)
 	NOT-FOR-US: WordPress theme
@@ -9107,7 +9338,7 @@ CVE-2024-47222 (New Cloud MyOffice SDK Collaborative Editing Server 2.2.2 throug
 	NOT-FOR-US: New Cloud MyOffice SDK Collaborative Editing Server
 CVE-2024-47069 (Oveleon Cookie Bar is a cookie bar is for the Contao Open Source CMS a ...)
 	NOT-FOR-US: Contao CMS
-CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 an ...)
+CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3 ...)
 	- node-rollup 3.29.5-1 (bug #1082712)
 	[bookworm] - node-rollup <no-dsa> (Minor issue)
 	[bullseye] - node-rollup <postponed> (Minor issue; can be fixed in next update)
@@ -14581,7 +14812,7 @@ CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error att
 	[bullseye] - wolfssl <postponed> (Minor issue)
 	NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/7416
-CVE-2024-4872 (The product does not validate any query towards persistent data, resul ...)
+CVE-2024-4872 (A vulnerability exists in the query validation of the MicroSCADA Pro/X ...)
 	NOT-FOR-US: Hitachi
 CVE-2024-45264 (A cross-site request forgery (CSRF) vulnerability in the admin panel i ...)
 	NOT-FOR-US: SkySystem Arfa-CMS
@@ -14614,7 +14845,7 @@ CVE-2024-40395 (An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5
 	NOT-FOR-US: PTC ThingWorx
 CVE-2024-3982 (An attacker with local access to machine where MicroSCADA X SYS600 is  ...)
 	NOT-FOR-US: Hitachi
-CVE-2024-3980 (The product allows user input to control or influence paths or file na ...)
+CVE-2024-3980 (The MicroSCADA Pro/X SYS600 product allows an authenticated user input ...)
 	NOT-FOR-US: Hitachi
 CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...)
 	NOT-FOR-US: Rubrik CDM
@@ -34260,7 +34491,7 @@ CVE-2024-28024 (A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive
 	NOT-FOR-US: Hitachi
 CVE-2024-28023 (A vulnerability exists in the message queueing mechanism that if  expl ...)
 	NOT-FOR-US: Hitachi
-CVE-2024-28022 (A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway that  ...)
+CVE-2024-28022 (A vulnerability exists in the UNEM server / APIGateway that if exploit ...)
 	NOT-FOR-US: Hitachi
 CVE-2024-28021 (A vulnerability exists in the FOXMAN-UN/UNEM server that affects the m ...)
 	NOT-FOR-US: Hitachi
@@ -102712,7 +102943,7 @@ CVE-2023-41163 (A Reflected Cross-site scripting (XSS) vulnerability in the file
 CVE-2023-41041 (Graylog is a free and open log management platform. In a multi-node Gr ...)
 	- graylog2 <itp> (bug #652273)
 CVE-2023-41040 (GitPython is a python library used to interact with Git repositories.  ...)
-	{DLA-3589-1}
+	{DLA-3939-1 DLA-3589-1}
 	- python-git 3.1.36-1
 	[bookworm] - python-git 3.1.30-1+deb12u2
 	NOTE: https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c
@@ -105184,7 +105415,7 @@ CVE-2023-4106 (Mattermost fails to check if the requesting user is a guest befor
 CVE-2023-4105 (Mattermost fails to delete the attachments when deleting a message in  ...)
 	- mattermost-server <itp> (bug #823556)
 CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi options in c ...)
-	{DLA-3502-1}
+	{DLA-3939-1 DLA-3502-1}
 	- python-git 3.1.36-1 (bug #1043503)
 	[bookworm] - python-git 3.1.30-1+deb12u2
 	NOTE: https://github.com/gitpython-developers/GitPython/pull/1609
@@ -213428,7 +213659,7 @@ CVE-2022-24441 (The package snyk before 1.1064.0 are vulnerable to Code Injectio
 CVE-2022-24440 (The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1 ...)
 	NOT-FOR-US: cocoapods-downloader
 CVE-2022-24439 (All versions of package gitpython are vulnerable to Remote Code Execut ...)
-	{DLA-3502-1}
+	{DLA-3939-1 DLA-3502-1}
 	- python-git 3.1.30-1 (bug #1027163)
 	NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
 	NOTE: https://github.com/gitpython-developers/GitPython/commit/787359d80d80225095567340aa5e7ec01847fa9a (3.1.30)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241029/1714f3b3/attachment.htm>


More information about the debian-security-tracker-commits mailing list