[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Oct 29 20:16:50 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
40a02016 by security tracker role at 2024-10-29T20:16:43+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,70 +1,300 @@
-CVE-2024-10467
+CVE-2024-9990 (The Crypto plugin for WordPress is vulnerable to Cross-Site Request Fo ...)
+ TODO: check
+CVE-2024-9989 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...)
+ TODO: check
+CVE-2024-9988 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...)
+ TODO: check
+CVE-2024-9505 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress ...)
+ TODO: check
+CVE-2024-9438 (The SEUR Oficial plugin for WordPress is vulnerable to Reflected Cross ...)
+ TODO: check
+CVE-2024-9376 (The Kata Plus \u2013 Addons for Elementor \u2013 Widgets, Extensions a ...)
+ TODO: check
+CVE-2024-8924 (ServiceNow has addressed a blind SQL injection vulnerability that was ...)
+ TODO: check
+CVE-2024-8923 (ServiceNow has addressed an input validation vulnerability that was id ...)
+ TODO: check
+CVE-2024-8309 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...)
+ TODO: check
+CVE-2024-8143 (In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an iss ...)
+ TODO: check
+CVE-2024-7985 (The FileOrganizer \u2013 Manage WordPress and Website Files plugin for ...)
+ TODO: check
+CVE-2024-7962 (An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchat ...)
+ TODO: check
+CVE-2024-7807 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows ...)
+ TODO: check
+CVE-2024-7783 (mintplex-labs/anything-llm version latest contains a vulnerability whe ...)
+ TODO: check
+CVE-2024-7774 (A path traversal vulnerability exists in the `getFullPath` method of l ...)
+ TODO: check
+CVE-2024-7475 (An improper access control vulnerability in lunary-ai/lunary version 1 ...)
+ TODO: check
+CVE-2024-7474 (In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Refere ...)
+ TODO: check
+CVE-2024-7473 (An IDOR vulnerability exists in the 'Evaluations' function of the 'umg ...)
+ TODO: check
+CVE-2024-7472 (lunary-ai/lunary v1.2.26 contains an email injection vulnerability in ...)
+ TODO: check
+CVE-2024-7042 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...)
+ TODO: check
+CVE-2024-7010 (mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This t ...)
+ TODO: check
+CVE-2024-6868 (mudler/LocalAI version 2.17.1 allows for arbitrary file write due to i ...)
+ TODO: check
+CVE-2024-6674 (A CORS misconfiguration in parisneo/lollms-webui prior to version 10 a ...)
+ TODO: check
+CVE-2024-6673 (A Cross-Site Request Forgery (CSRF) vulnerability exists in the `insta ...)
+ TODO: check
+CVE-2024-6581 (A vulnerability in the discussion image upload function of the Lollms ...)
+ TODO: check
+CVE-2024-5982 (A path traversal vulnerability exists in the latest version of gaizhen ...)
+ TODO: check
+CVE-2024-5823 (A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt ve ...)
+ TODO: check
+CVE-2024-51181 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...)
+ TODO: check
+CVE-2024-51180 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...)
+ TODO: check
+CVE-2024-51076 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...)
+ TODO: check
+CVE-2024-51075 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...)
+ TODO: check
+CVE-2024-50550 (Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies ...)
+ TODO: check
+CVE-2024-50490 (Missing Authorization vulnerability in Szabolcs Szecsenyi PegaPoll all ...)
+ TODO: check
+CVE-2024-50485 (: Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matr ...)
+ TODO: check
+CVE-2024-50481 (Incorrect Privilege Assignment vulnerability in Stack Themes Bstone De ...)
+ TODO: check
+CVE-2024-50476 (Missing Authorization vulnerability in GR\xdcN Software Group GmbH GR\ ...)
+ TODO: check
+CVE-2024-50475 (Missing Authorization vulnerability in Scott Gamon Signup Page allows ...)
+ TODO: check
+CVE-2024-50473 (Unrestricted Upload of File with Dangerous Type vulnerability in Ajar ...)
+ TODO: check
+CVE-2024-50466 (Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySi ...)
+ TODO: check
+CVE-2024-50459 (Missing Authorization vulnerability in HM Plugin WordPress Stripe Dona ...)
+ TODO: check
+CVE-2024-50427 (Unrestricted Upload of File with Dangerous Type vulnerability in Devso ...)
+ TODO: check
+CVE-2024-50426 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50420 (Unrestricted Upload of File with Dangerous Type vulnerability in adire ...)
+ TODO: check
+CVE-2024-50418 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50415 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50414 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50413 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50412 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50411 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50410 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50409 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50407 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-50334 (Scoold is a Q&A and a knowledge sharing platform for teams. A semicolo ...)
+ TODO: check
+CVE-2024-50052 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...)
+ TODO: check
+CVE-2024-49769 (Waitress is a Web Server Gateway Interface server for Python 2 and 3. ...)
+ TODO: check
+CVE-2024-49768 (Waitress is a Web Server Gateway Interface server for Python 2 and 3. ...)
+ TODO: check
+CVE-2024-49692 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49679 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49678 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49673 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49672 (Cross-Site Request Forgery (CSRF) vulnerability in Gifford Cheung, Bri ...)
+ TODO: check
+CVE-2024-49670 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49667 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49665 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49664 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49663 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49662 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49661 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49660 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49659 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49656 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49654 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49651 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49650 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49648 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49647 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49646 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49645 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49643 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49642 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49641 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49639 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49638 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49637 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49636 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49635 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49634 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-49632 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-48955 (In NetAdmin 4.0.30319, an attacker can steal a valid session cookie an ...)
+ TODO: check
+CVE-2024-48921 (Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterP ...)
+ TODO: check
+CVE-2024-47640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2024-47401 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 9.5.x <= 9. ...)
+ TODO: check
+CVE-2024-46872 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...)
+ TODO: check
+CVE-2024-41156 (Profile files from TRO600 series radios are extracted in plain-text an ...)
+ TODO: check
+CVE-2024-41153 (Command injection vulnerability in the Edge Computing UI for the TRO60 ...)
+ TODO: check
+CVE-2024-25566 (An Open-Redirect vulnerability exists in PingAM where well-crafted req ...)
+ TODO: check
+CVE-2024-22066 (There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 inte ...)
+ TODO: check
+CVE-2024-10491 (A vulnerability has been identified in the Express response.linksfunct ...)
+ TODO: check
+CVE-2024-10474 (Focus was incorrectly allowing internal links to utilize the app schem ...)
+ TODO: check
+CVE-2024-10452 (Organization admins can delete pending invites created in an organizat ...)
+ TODO: check
+CVE-2024-10437 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...)
+ TODO: check
+CVE-2024-10436 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...)
+ TODO: check
+CVE-2024-10360 (The Move Addons for Elementor plugin for WordPress is vulnerable to Se ...)
+ TODO: check
+CVE-2024-10266 (The Premium Addons for Elementor plugin for WordPress is vulnerable to ...)
+ TODO: check
+CVE-2024-10241 (Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the channel ...)
+ TODO: check
+CVE-2024-10233 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPr ...)
+ TODO: check
+CVE-2024-10227 (The affiliate-toolkit plugin for WordPress is vulnerable to Stored Cro ...)
+ TODO: check
+CVE-2024-10226 (The Arconix Shortcodes plugin for WordPress is vulnerable to Stored Cr ...)
+ TODO: check
+CVE-2024-10185 (The StreamWeasels YouTube Integration plugin for WordPress is vulnerab ...)
+ TODO: check
+CVE-2024-10184 (The StreamWeasels Kick Integration plugin for WordPress is vulnerable ...)
+ TODO: check
+CVE-2024-10181 (The Newsletters plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+ TODO: check
+CVE-2024-10048 (The Post Status Notifier Lite and Premium plugins for WordPress is vul ...)
+ TODO: check
+CVE-2019-25219 (Asio C++ Library before 1.13.0 lacks a fallback error code in the case ...)
+ TODO: check
+CVE-2017-20195 (A vulnerability was found in LUNAD3v AreaLoad up to 1a1103182ed63a06dd ...)
+ TODO: check
+CVE-2024-10467 (Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thun ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10467
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10467
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10467
-CVE-2024-10466
+CVE-2024-10466 (By sending a specially crafted push message, a remote server could hav ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10466
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10466
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10466
-CVE-2024-10465
+CVE-2024-10465 (A clipboard "paste" button could persist across tabs which allowed a s ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10465
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10465
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10465
-CVE-2024-10464
+CVE-2024-10464 (Repeated writes to history interface attributes could have been used t ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10464
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10464
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10464
-CVE-2024-10468
+CVE-2024-10468 (Potential race conditions in IndexedDB could have caused memory corrup ...)
- firefox <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10468
-CVE-2024-10463
+CVE-2024-10463 (Video frames could have been leaked between origins in some situations ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10463
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10463
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10463
-CVE-2024-10462
+CVE-2024-10462 (Truncation of a long URL could have allowed origin spoofing in a permi ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10462
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10462
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10462
-CVE-2024-10461
+CVE-2024-10461 (In multipart/x-mixed-replace responses, `Content-Disposition: attachme ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10461
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10461
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10461
-CVE-2024-10460
+CVE-2024-10460 (The origin of an external protocol handler prompt could have been obsc ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10460
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10460
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10460
-CVE-2024-10459
+CVE-2024-10459 (An attacker could have caused a use-after-free when accessibility was ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10459
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10459
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10459
-CVE-2024-10458
+CVE-2024-10458 (A permission leak could have occurred from a trusted site to an untrus ...)
- firefox <unfixed>
- firefox-esr <unfixed>
- thunderbird <unfixed>
@@ -72,12 +302,13 @@ CVE-2024-10458
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10458
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10458
CVE-2024-9632
+ {DSA-5800-1 DLA-3940-1}
- xorg-server <unfixed> (bug #1086244)
- xwayland <unfixed> (bug #1086245)
[bookworm] - xwayland <ignored> (Minor issue; Xwayland shouldn't be running as root)
NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/85b776571487f52e756f68a069c768757369bfe3
NOTE: https://lists.freedesktop.org/archives/xorg-announce/2024-October/003545.html
-CVE-2024-45477
+CVE-2024-45477 (Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 suppor ...)
NOT-FOR-US: Apache NiFi
CVE-2024-51509 (Tiki through 27.0 allows users who have certain permissions to insert ...)
- tikiwiki <removed>
@@ -1489,7 +1720,7 @@ CVE-2024-10278 (A vulnerability was found in ESAFENET CDG 5. It has been classif
NOT-FOR-US: ESAFENET CDG
CVE-2024-10277 (A vulnerability was found in ESAFENET CDG 5 and classified as critical ...)
NOT-FOR-US: ESAFENET CDG
-CVE-2024-10276 (A vulnerability has been found in Tektronix Sentry 6.0.9 and classifie ...)
+CVE-2024-10276 (A vulnerability has been found in Telestream Sentry 6.0.9 and classifi ...)
NOT-FOR-US: Tektronix
CVE-2024-10250 (The Nioland theme for WordPress is vulnerable to Reflected Cross-Site ...)
NOT-FOR-US: WordPress theme
@@ -9107,7 +9338,7 @@ CVE-2024-47222 (New Cloud MyOffice SDK Collaborative Editing Server 2.2.2 throug
NOT-FOR-US: New Cloud MyOffice SDK Collaborative Editing Server
CVE-2024-47069 (Oveleon Cookie Bar is a cookie bar is for the Contao Open Source CMS a ...)
NOT-FOR-US: Contao CMS
-CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 an ...)
+CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3 ...)
- node-rollup 3.29.5-1 (bug #1082712)
[bookworm] - node-rollup <no-dsa> (Minor issue)
[bullseye] - node-rollup <postponed> (Minor issue; can be fixed in next update)
@@ -14581,7 +14812,7 @@ CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error att
[bullseye] - wolfssl <postponed> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
NOTE: https://github.com/wolfSSL/wolfssl/pull/7416
-CVE-2024-4872 (The product does not validate any query towards persistent data, resul ...)
+CVE-2024-4872 (A vulnerability exists in the query validation of the MicroSCADA Pro/X ...)
NOT-FOR-US: Hitachi
CVE-2024-45264 (A cross-site request forgery (CSRF) vulnerability in the admin panel i ...)
NOT-FOR-US: SkySystem Arfa-CMS
@@ -14614,7 +14845,7 @@ CVE-2024-40395 (An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5
NOT-FOR-US: PTC ThingWorx
CVE-2024-3982 (An attacker with local access to machine where MicroSCADA X SYS600 is ...)
NOT-FOR-US: Hitachi
-CVE-2024-3980 (The product allows user input to control or influence paths or file na ...)
+CVE-2024-3980 (The MicroSCADA Pro/X SYS600 product allows an authenticated user input ...)
NOT-FOR-US: Hitachi
CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...)
NOT-FOR-US: Rubrik CDM
@@ -34260,7 +34491,7 @@ CVE-2024-28024 (A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive
NOT-FOR-US: Hitachi
CVE-2024-28023 (A vulnerability exists in the message queueing mechanism that if expl ...)
NOT-FOR-US: Hitachi
-CVE-2024-28022 (A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway that ...)
+CVE-2024-28022 (A vulnerability exists in the UNEM server / APIGateway that if exploit ...)
NOT-FOR-US: Hitachi
CVE-2024-28021 (A vulnerability exists in the FOXMAN-UN/UNEM server that affects the m ...)
NOT-FOR-US: Hitachi
@@ -102712,7 +102943,7 @@ CVE-2023-41163 (A Reflected Cross-site scripting (XSS) vulnerability in the file
CVE-2023-41041 (Graylog is a free and open log management platform. In a multi-node Gr ...)
- graylog2 <itp> (bug #652273)
CVE-2023-41040 (GitPython is a python library used to interact with Git repositories. ...)
- {DLA-3589-1}
+ {DLA-3939-1 DLA-3589-1}
- python-git 3.1.36-1
[bookworm] - python-git 3.1.30-1+deb12u2
NOTE: https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c
@@ -105184,7 +105415,7 @@ CVE-2023-4106 (Mattermost fails to check if the requesting user is a guest befor
CVE-2023-4105 (Mattermost fails to delete the attachments when deleting a message in ...)
- mattermost-server <itp> (bug #823556)
CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi options in c ...)
- {DLA-3502-1}
+ {DLA-3939-1 DLA-3502-1}
- python-git 3.1.36-1 (bug #1043503)
[bookworm] - python-git 3.1.30-1+deb12u2
NOTE: https://github.com/gitpython-developers/GitPython/pull/1609
@@ -213428,7 +213659,7 @@ CVE-2022-24441 (The package snyk before 1.1064.0 are vulnerable to Code Injectio
CVE-2022-24440 (The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1 ...)
NOT-FOR-US: cocoapods-downloader
CVE-2022-24439 (All versions of package gitpython are vulnerable to Remote Code Execut ...)
- {DLA-3502-1}
+ {DLA-3939-1 DLA-3502-1}
- python-git 3.1.30-1 (bug #1027163)
NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
NOTE: https://github.com/gitpython-developers/GitPython/commit/787359d80d80225095567340aa5e7ec01847fa9a (3.1.30)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241029/1714f3b3/attachment.htm>
More information about the debian-security-tracker-commits
mailing list