Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
40a02016 by security tracker role at 2024-10-29T20:16:43+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,70 +1,300 @@
-CVE-2024-10467
+CVE-2024-9990 (The Crypto plugin for WordPress is vulnerable to Cross-Site 
Request Fo ...)
+       TODO: check
+CVE-2024-9989 (The Crypto plugin for WordPress is vulnerable to authentication 
bypass ...)
+       TODO: check
+CVE-2024-9988 (The Crypto plugin for WordPress is vulnerable to authentication 
bypass ...)
+       TODO: check
+CVE-2024-9505 (The Beaver Builder \u2013 WordPress Page Builder plugin for 
WordPress  ...)
+       TODO: check
+CVE-2024-9438 (The SEUR Oficial plugin for WordPress is vulnerable to 
Reflected Cross ...)
+       TODO: check
+CVE-2024-9376 (The Kata Plus \u2013 Addons for Elementor \u2013 Widgets, 
Extensions a ...)
+       TODO: check
+CVE-2024-8924 (ServiceNow has addressed a blind SQL injection vulnerability 
that was  ...)
+       TODO: check
+CVE-2024-8923 (ServiceNow has addressed an input validation vulnerability that 
was id ...)
+       TODO: check
+CVE-2024-8309 (A vulnerability in the GraphCypherQAChain class of 
langchain-ai/langch ...)
+       TODO: check
+CVE-2024-8143 (In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, 
an iss ...)
+       TODO: check
+CVE-2024-7985 (The FileOrganizer \u2013 Manage WordPress and Website Files 
plugin for ...)
+       TODO: check
+CVE-2024-7962 (An arbitrary file read vulnerability exists in 
gaizhenbiao/chuanhuchat ...)
+       TODO: check
+CVE-2024-7807 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 
allows  ...)
+       TODO: check
+CVE-2024-7783 (mintplex-labs/anything-llm version latest contains a 
vulnerability whe ...)
+       TODO: check
+CVE-2024-7774 (A path traversal vulnerability exists in the `getFullPath` 
method of l ...)
+       TODO: check
+CVE-2024-7475 (An improper access control vulnerability in lunary-ai/lunary 
version 1 ...)
+       TODO: check
+CVE-2024-7474 (In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object 
Refere ...)
+       TODO: check
+CVE-2024-7473 (An IDOR vulnerability exists in the 'Evaluations' function of 
the 'umg ...)
+       TODO: check
+CVE-2024-7472 (lunary-ai/lunary v1.2.26 contains an email injection 
vulnerability in  ...)
+       TODO: check
+CVE-2024-7042 (A vulnerability in the GraphCypherQAChain class of 
langchain-ai/langch ...)
+       TODO: check
+CVE-2024-7010 (mudler/localai version 2.17.1 is vulnerable to a Timing Attack. 
This t ...)
+       TODO: check
+CVE-2024-6868 (mudler/LocalAI version 2.17.1 allows for arbitrary file write 
due to i ...)
+       TODO: check
+CVE-2024-6674 (A CORS misconfiguration in parisneo/lollms-webui prior to 
version 10 a ...)
+       TODO: check
+CVE-2024-6673 (A Cross-Site Request Forgery (CSRF) vulnerability exists in the 
`insta ...)
+       TODO: check
+CVE-2024-6581 (A vulnerability in the discussion image upload function of the 
Lollms  ...)
+       TODO: check
+CVE-2024-5982 (A path traversal vulnerability exists in the latest version of 
gaizhen ...)
+       TODO: check
+CVE-2024-5823 (A file overwrite vulnerability exists in 
gaizhenbiao/chuanhuchatgpt ve ...)
+       TODO: check
+CVE-2024-51181 (A Reflected Cross Site Scripting (XSS) vulnerability was found 
in /ifs ...)
+       TODO: check
+CVE-2024-51180 (A Reflected Cross Site Scripting (XSS) vulnerability was found 
in /ifs ...)
+       TODO: check
+CVE-2024-51076 (A Reflected Cross Site Scripting (XSS) vulnerability was found 
in /odm ...)
+       TODO: check
+CVE-2024-51075 (A Reflected Cross Site Scripting (XSS) vulnerability was found 
in /odm ...)
+       TODO: check
+CVE-2024-50550 (Incorrect Privilege Assignment vulnerability in LiteSpeed 
Technologies ...)
+       TODO: check
+CVE-2024-50490 (Missing Authorization vulnerability in Szabolcs Szecsenyi 
PegaPoll all ...)
+       TODO: check
+CVE-2024-50485 (: Incorrect Privilege Assignment vulnerability in Udit Rawat 
Exam Matr ...)
+       TODO: check
+CVE-2024-50481 (Incorrect Privilege Assignment vulnerability in Stack Themes 
Bstone De ...)
+       TODO: check
+CVE-2024-50476 (Missing Authorization vulnerability in GR\xdcN Software Group 
GmbH GR\ ...)
+       TODO: check
+CVE-2024-50475 (Missing Authorization vulnerability in Scott Gamon Signup Page 
allows  ...)
+       TODO: check
+CVE-2024-50473 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Ajar  ...)
+       TODO: check
+CVE-2024-50466 (Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite 
DarkMySi ...)
+       TODO: check
+CVE-2024-50459 (Missing Authorization vulnerability in HM Plugin WordPress 
Stripe Dona ...)
+       TODO: check
+CVE-2024-50427 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Devso ...)
+       TODO: check
+CVE-2024-50426 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50420 (Unrestricted Upload of File with Dangerous Type vulnerability 
in adire ...)
+       TODO: check
+CVE-2024-50418 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50415 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50414 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50413 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50412 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50411 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50410 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50409 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50407 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-50334 (Scoold is a Q&A and a knowledge sharing platform for teams. A 
semicolo ...)
+       TODO: check
+CVE-2024-50052 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x 
<= 9.5.9 ...)
+       TODO: check
+CVE-2024-49769 (Waitress is a Web Server Gateway Interface server for Python 2 
and 3.  ...)
+       TODO: check
+CVE-2024-49768 (Waitress is a Web Server Gateway Interface server for Python 2 
and 3.  ...)
+       TODO: check
+CVE-2024-49692 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49679 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49678 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49673 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49672 (Cross-Site Request Forgery (CSRF) vulnerability in Gifford 
Cheung, Bri ...)
+       TODO: check
+CVE-2024-49670 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49667 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49665 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49664 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49663 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49662 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49661 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49660 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49659 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49656 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49654 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49651 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49650 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49648 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49647 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49646 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49645 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49643 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49642 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49641 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49640 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49639 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49638 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49637 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49636 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49635 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49634 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-49632 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-48955 (In NetAdmin 4.0.30319, an attacker can steal a valid session 
cookie an ...)
+       TODO: check
+CVE-2024-48921 (Kyverno is a policy engine designed for Kubernetes. A kyverno 
ClusterP ...)
+       TODO: check
+CVE-2024-47640 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-47401 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 
9.5.x <= 9. ...)
+       TODO: check
+CVE-2024-46872 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x 
<= 9.5.9 ...)
+       TODO: check
+CVE-2024-41156 (Profile files from TRO600 series radios are extracted in 
plain-text an ...)
+       TODO: check
+CVE-2024-41153 (Command injection vulnerability in the Edge Computing UI for 
the TRO60 ...)
+       TODO: check
+CVE-2024-25566 (An Open-Redirect vulnerability exists in PingAM where 
well-crafted req ...)
+       TODO: check
+CVE-2024-22066 (There is a privilege escalation vulnerability in ZTE ZXR10 ZSR 
V2 inte ...)
+       TODO: check
+CVE-2024-10491 (A vulnerability has been identified in the Express 
response.linksfunct ...)
+       TODO: check
+CVE-2024-10474 (Focus was incorrectly allowing internal links to utilize the 
app schem ...)
+       TODO: check
+CVE-2024-10452 (Organization admins can delete pending invites created in an 
organizat ...)
+       TODO: check
+CVE-2024-10437 (The WPC Smart Messages for WooCommerce plugin for WordPress is 
vulnera ...)
+       TODO: check
+CVE-2024-10436 (The WPC Smart Messages for WooCommerce plugin for WordPress is 
vulnera ...)
+       TODO: check
+CVE-2024-10360 (The Move Addons for Elementor plugin for WordPress is 
vulnerable to Se ...)
+       TODO: check
+CVE-2024-10266 (The Premium Addons for Elementor plugin for WordPress is 
vulnerable to ...)
+       TODO: check
+CVE-2024-10241 (Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the 
channel ...)
+       TODO: check
+CVE-2024-10233 (The SMS Alert Order Notifications \u2013 WooCommerce plugin 
for WordPr ...)
+       TODO: check
+CVE-2024-10227 (The affiliate-toolkit plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-10226 (The Arconix Shortcodes plugin for WordPress is vulnerable to 
Stored Cr ...)
+       TODO: check
+CVE-2024-10185 (The StreamWeasels YouTube Integration plugin for WordPress is 
vulnerab ...)
+       TODO: check
+CVE-2024-10184 (The StreamWeasels Kick Integration plugin for WordPress is 
vulnerable  ...)
+       TODO: check
+CVE-2024-10181 (The Newsletters plugin for WordPress is vulnerable to Stored 
Cross-Sit ...)
+       TODO: check
+CVE-2024-10048 (The Post Status Notifier Lite and Premium plugins for 
WordPress is vul ...)
+       TODO: check
+CVE-2019-25219 (Asio C++ Library before 1.13.0 lacks a fallback error code in 
the case ...)
+       TODO: check
+CVE-2017-20195 (A vulnerability was found in LUNAD3v AreaLoad up to 
1a1103182ed63a06dd ...)
+       TODO: check
+CVE-2024-10467 (Memory safety bugs present in Firefox 131, Firefox ESR 128.3, 
and Thun ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10467
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10467
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10467
-CVE-2024-10466
+CVE-2024-10466 (By sending a specially crafted push message, a remote server 
could hav ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10466
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10466
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10466
-CVE-2024-10465
+CVE-2024-10465 (A clipboard "paste" button could persist across tabs which 
allowed a s ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10465
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10465
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10465
-CVE-2024-10464
+CVE-2024-10464 (Repeated writes to history interface attributes could have 
been used t ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10464
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10464
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10464
-CVE-2024-10468
+CVE-2024-10468 (Potential race conditions in IndexedDB could have caused 
memory corrup ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10468
-CVE-2024-10463
+CVE-2024-10463 (Video frames could have been leaked between origins in some 
situations ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10463
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10463
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10463
-CVE-2024-10462
+CVE-2024-10462 (Truncation of a long URL could have allowed origin spoofing in 
a permi ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10462
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10462
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10462
-CVE-2024-10461
+CVE-2024-10461 (In multipart/x-mixed-replace responses, `Content-Disposition: 
attachme ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10461
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10461
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10461
-CVE-2024-10460
+CVE-2024-10460 (The origin of an external protocol handler prompt could have 
been obsc ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10460
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10460
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10460
-CVE-2024-10459
+CVE-2024-10459 (An attacker could have caused a use-after-free when 
accessibility was  ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10459
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10459
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10459
-CVE-2024-10458
+CVE-2024-10458 (A permission leak could have occurred from a trusted site to 
an untrus ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        - thunderbird <unfixed>
@@ -72,12 +302,13 @@ CVE-2024-10458
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10458
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10458
 CVE-2024-9632
+       {DSA-5800-1 DLA-3940-1}
        - xorg-server <unfixed> (bug #1086244)
        - xwayland <unfixed> (bug #1086245)
        [bookworm] - xwayland <ignored> (Minor issue; Xwayland shouldn't be 
running as root)
        NOTE: Fixed by: 
https://gitlab.freedesktop.org/xorg/xserver/-/commit/85b776571487f52e756f68a069c768757369bfe3
        NOTE: 
https://lists.freedesktop.org/archives/xorg-announce/2024-October/003545.html
-CVE-2024-45477
+CVE-2024-45477 (Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 
2.0.0-M3 suppor ...)
        NOT-FOR-US: Apache NiFi
 CVE-2024-51509 (Tiki through 27.0 allows users who have certain permissions to 
insert  ...)
        - tikiwiki <removed>
@@ -1489,7 +1720,7 @@ CVE-2024-10278 (A vulnerability was found in ESAFENET CDG 
5. It has been classif
        NOT-FOR-US: ESAFENET CDG
 CVE-2024-10277 (A vulnerability was found in ESAFENET CDG 5 and classified as 
critical ...)
        NOT-FOR-US: ESAFENET CDG
-CVE-2024-10276 (A vulnerability has been found in Tektronix Sentry 6.0.9 and 
classifie ...)
+CVE-2024-10276 (A vulnerability has been found in Telestream Sentry 6.0.9 and 
classifi ...)
        NOT-FOR-US: Tektronix
 CVE-2024-10250 (The Nioland theme for WordPress is vulnerable to Reflected 
Cross-Site  ...)
        NOT-FOR-US: WordPress theme
@@ -9107,7 +9338,7 @@ CVE-2024-47222 (New Cloud MyOffice SDK Collaborative 
Editing Server 2.2.2 throug
        NOT-FOR-US: New Cloud MyOffice SDK Collaborative Editing Server
 CVE-2024-47069 (Oveleon Cookie Bar is a cookie bar is for the Contao Open 
Source CMS a ...)
        NOT-FOR-US: Contao CMS
-CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 
3.29.5 an ...)
+CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 
2.79.2, 3 ...)
        - node-rollup 3.29.5-1 (bug #1082712)
        [bookworm] - node-rollup <no-dsa> (Minor issue)
        [bullseye] - node-rollup <postponed> (Minor issue; can be fixed in next 
update)
@@ -14581,7 +14812,7 @@ CVE-2024-5288 (An issue was discovered in wolfSSL 
before 5.7.0. A safe-error att
        [bullseye] - wolfssl <postponed> (Minor issue)
        NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
        NOTE: https://github.com/wolfSSL/wolfssl/pull/7416
-CVE-2024-4872 (The product does not validate any query towards persistent 
data, resul ...)
+CVE-2024-4872 (A vulnerability exists in the query validation of the 
MicroSCADA Pro/X ...)
        NOT-FOR-US: Hitachi
 CVE-2024-45264 (A cross-site request forgery (CSRF) vulnerability in the admin 
panel i ...)
        NOT-FOR-US: SkySystem Arfa-CMS
@@ -14614,7 +14845,7 @@ CVE-2024-40395 (An Insecure Direct Object Reference 
(IDOR) in PTC ThingWorx v9.5
        NOT-FOR-US: PTC ThingWorx
 CVE-2024-3982 (An attacker with local access to machine where MicroSCADA X 
SYS600 is  ...)
        NOT-FOR-US: Hitachi
-CVE-2024-3980 (The product allows user input to control or influence paths or 
file na ...)
+CVE-2024-3980 (The MicroSCADA Pro/X SYS600 product allows an authenticated 
user input ...)
        NOT-FOR-US: Hitachi
 CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM 
versions prior ...)
        NOT-FOR-US: Rubrik CDM
@@ -34260,7 +34491,7 @@ CVE-2024-28024 (A vulnerability exists in the 
FOXMAN-UN/UNEM in which sensitive
        NOT-FOR-US: Hitachi
 CVE-2024-28023 (A vulnerability exists in the message queueing mechanism that 
if  expl ...)
        NOT-FOR-US: Hitachi
-CVE-2024-28022 (A vulnerability exists in the FOXMAN-UN/UNEM server / 
APIGateway that  ...)
+CVE-2024-28022 (A vulnerability exists in the UNEM server / APIGateway that if 
exploit ...)
        NOT-FOR-US: Hitachi
 CVE-2024-28021 (A vulnerability exists in the FOXMAN-UN/UNEM server that 
affects the m ...)
        NOT-FOR-US: Hitachi
@@ -102712,7 +102943,7 @@ CVE-2023-41163 (A Reflected Cross-site scripting 
(XSS) vulnerability in the file
 CVE-2023-41041 (Graylog is a free and open log management platform. In a 
multi-node Gr ...)
        - graylog2 <itp> (bug #652273)
 CVE-2023-41040 (GitPython is a python library used to interact with Git 
repositories.  ...)
-       {DLA-3589-1}
+       {DLA-3939-1 DLA-3589-1}
        - python-git 3.1.36-1
        [bookworm] - python-git 3.1.30-1+deb12u2
        NOTE: 
https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c
@@ -105184,7 +105415,7 @@ CVE-2023-4106 (Mattermost fails to check if the 
requesting user is a guest befor
 CVE-2023-4105 (Mattermost fails to delete the attachments when deleting a 
message in  ...)
        - mattermost-server <itp> (bug #823556)
 CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi 
options in c ...)
-       {DLA-3502-1}
+       {DLA-3939-1 DLA-3502-1}
        - python-git 3.1.36-1 (bug #1043503)
        [bookworm] - python-git 3.1.30-1+deb12u2
        NOTE: https://github.com/gitpython-developers/GitPython/pull/1609
@@ -213428,7 +213659,7 @@ CVE-2022-24441 (The package snyk before 1.1064.0 are 
vulnerable to Code Injectio
 CVE-2022-24440 (The package cocoapods-downloader before 1.6.0, from 1.6.2 and 
before 1 ...)
        NOT-FOR-US: cocoapods-downloader
 CVE-2022-24439 (All versions of package gitpython are vulnerable to Remote 
Code Execut ...)
-       {DLA-3502-1}
+       {DLA-3939-1 DLA-3502-1}
        - python-git 3.1.30-1 (bug #1027163)
        NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
        NOTE: 
https://github.com/gitpython-developers/GitPython/commit/787359d80d80225095567340aa5e7ec01847fa9a
 (3.1.30)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to