Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 40a02016 by security tracker role at 2024-10-29T20:16:43+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,70 +1,300 @@ -CVE-2024-10467 +CVE-2024-9990 (The Crypto plugin for WordPress is vulnerable to Cross-Site Request Fo ...) + TODO: check +CVE-2024-9989 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...) + TODO: check +CVE-2024-9988 (The Crypto plugin for WordPress is vulnerable to authentication bypass ...) + TODO: check +CVE-2024-9505 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress ...) + TODO: check +CVE-2024-9438 (The SEUR Oficial plugin for WordPress is vulnerable to Reflected Cross ...) + TODO: check +CVE-2024-9376 (The Kata Plus \u2013 Addons for Elementor \u2013 Widgets, Extensions a ...) + TODO: check +CVE-2024-8924 (ServiceNow has addressed a blind SQL injection vulnerability that was ...) + TODO: check +CVE-2024-8923 (ServiceNow has addressed an input validation vulnerability that was id ...) + TODO: check +CVE-2024-8309 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...) + TODO: check +CVE-2024-8143 (In the latest version (20240628) of gaizhenbiao/chuanhuchatgpt, an iss ...) + TODO: check +CVE-2024-7985 (The FileOrganizer \u2013 Manage WordPress and Website Files plugin for ...) + TODO: check +CVE-2024-7962 (An arbitrary file read vulnerability exists in gaizhenbiao/chuanhuchat ...) + TODO: check +CVE-2024-7807 (A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows ...) + TODO: check +CVE-2024-7783 (mintplex-labs/anything-llm version latest contains a vulnerability whe ...) + TODO: check +CVE-2024-7774 (A path traversal vulnerability exists in the `getFullPath` method of l ...) + TODO: check +CVE-2024-7475 (An improper access control vulnerability in lunary-ai/lunary version 1 ...) + TODO: check +CVE-2024-7474 (In version 1.3.2 of lunary-ai/lunary, an Insecure Direct Object Refere ...) + TODO: check +CVE-2024-7473 (An IDOR vulnerability exists in the 'Evaluations' function of the 'umg ...) + TODO: check +CVE-2024-7472 (lunary-ai/lunary v1.2.26 contains an email injection vulnerability in ...) + TODO: check +CVE-2024-7042 (A vulnerability in the GraphCypherQAChain class of langchain-ai/langch ...) + TODO: check +CVE-2024-7010 (mudler/localai version 2.17.1 is vulnerable to a Timing Attack. This t ...) + TODO: check +CVE-2024-6868 (mudler/LocalAI version 2.17.1 allows for arbitrary file write due to i ...) + TODO: check +CVE-2024-6674 (A CORS misconfiguration in parisneo/lollms-webui prior to version 10 a ...) + TODO: check +CVE-2024-6673 (A Cross-Site Request Forgery (CSRF) vulnerability exists in the `insta ...) + TODO: check +CVE-2024-6581 (A vulnerability in the discussion image upload function of the Lollms ...) + TODO: check +CVE-2024-5982 (A path traversal vulnerability exists in the latest version of gaizhen ...) + TODO: check +CVE-2024-5823 (A file overwrite vulnerability exists in gaizhenbiao/chuanhuchatgpt ve ...) + TODO: check +CVE-2024-51181 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...) + TODO: check +CVE-2024-51180 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /ifs ...) + TODO: check +CVE-2024-51076 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...) + TODO: check +CVE-2024-51075 (A Reflected Cross Site Scripting (XSS) vulnerability was found in /odm ...) + TODO: check +CVE-2024-50550 (Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies ...) + TODO: check +CVE-2024-50490 (Missing Authorization vulnerability in Szabolcs Szecsenyi PegaPoll all ...) + TODO: check +CVE-2024-50485 (: Incorrect Privilege Assignment vulnerability in Udit Rawat Exam Matr ...) + TODO: check +CVE-2024-50481 (Incorrect Privilege Assignment vulnerability in Stack Themes Bstone De ...) + TODO: check +CVE-2024-50476 (Missing Authorization vulnerability in GR\xdcN Software Group GmbH GR\ ...) + TODO: check +CVE-2024-50475 (Missing Authorization vulnerability in Scott Gamon Signup Page allows ...) + TODO: check +CVE-2024-50473 (Unrestricted Upload of File with Dangerous Type vulnerability in Ajar ...) + TODO: check +CVE-2024-50466 (Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySi ...) + TODO: check +CVE-2024-50459 (Missing Authorization vulnerability in HM Plugin WordPress Stripe Dona ...) + TODO: check +CVE-2024-50427 (Unrestricted Upload of File with Dangerous Type vulnerability in Devso ...) + TODO: check +CVE-2024-50426 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50420 (Unrestricted Upload of File with Dangerous Type vulnerability in adire ...) + TODO: check +CVE-2024-50418 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50415 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50414 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50413 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50412 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50411 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50410 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50409 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50407 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-50334 (Scoold is a Q&A and a knowledge sharing platform for teams. A semicolo ...) + TODO: check +CVE-2024-50052 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...) + TODO: check +CVE-2024-49769 (Waitress is a Web Server Gateway Interface server for Python 2 and 3. ...) + TODO: check +CVE-2024-49768 (Waitress is a Web Server Gateway Interface server for Python 2 and 3. ...) + TODO: check +CVE-2024-49692 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49679 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49678 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49673 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49672 (Cross-Site Request Forgery (CSRF) vulnerability in Gifford Cheung, Bri ...) + TODO: check +CVE-2024-49670 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49667 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49665 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49664 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49663 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49662 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49661 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49660 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49659 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49656 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49654 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49651 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49650 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49648 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49647 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49646 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49645 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49643 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49642 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49641 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49639 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49638 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49637 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49636 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49635 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49634 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-49632 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-48955 (In NetAdmin 4.0.30319, an attacker can steal a valid session cookie an ...) + TODO: check +CVE-2024-48921 (Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterP ...) + TODO: check +CVE-2024-47640 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...) + TODO: check +CVE-2024-47401 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1 and 9.5.x <= 9. ...) + TODO: check +CVE-2024-46872 (Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 ...) + TODO: check +CVE-2024-41156 (Profile files from TRO600 series radios are extracted in plain-text an ...) + TODO: check +CVE-2024-41153 (Command injection vulnerability in the Edge Computing UI for the TRO60 ...) + TODO: check +CVE-2024-25566 (An Open-Redirect vulnerability exists in PingAM where well-crafted req ...) + TODO: check +CVE-2024-22066 (There is a privilege escalation vulnerability in ZTE ZXR10 ZSR V2 inte ...) + TODO: check +CVE-2024-10491 (A vulnerability has been identified in the Express response.linksfunct ...) + TODO: check +CVE-2024-10474 (Focus was incorrectly allowing internal links to utilize the app schem ...) + TODO: check +CVE-2024-10452 (Organization admins can delete pending invites created in an organizat ...) + TODO: check +CVE-2024-10437 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...) + TODO: check +CVE-2024-10436 (The WPC Smart Messages for WooCommerce plugin for WordPress is vulnera ...) + TODO: check +CVE-2024-10360 (The Move Addons for Elementor plugin for WordPress is vulnerable to Se ...) + TODO: check +CVE-2024-10266 (The Premium Addons for Elementor plugin for WordPress is vulnerable to ...) + TODO: check +CVE-2024-10241 (Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the channel ...) + TODO: check +CVE-2024-10233 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPr ...) + TODO: check +CVE-2024-10227 (The affiliate-toolkit plugin for WordPress is vulnerable to Stored Cro ...) + TODO: check +CVE-2024-10226 (The Arconix Shortcodes plugin for WordPress is vulnerable to Stored Cr ...) + TODO: check +CVE-2024-10185 (The StreamWeasels YouTube Integration plugin for WordPress is vulnerab ...) + TODO: check +CVE-2024-10184 (The StreamWeasels Kick Integration plugin for WordPress is vulnerable ...) + TODO: check +CVE-2024-10181 (The Newsletters plugin for WordPress is vulnerable to Stored Cross-Sit ...) + TODO: check +CVE-2024-10048 (The Post Status Notifier Lite and Premium plugins for WordPress is vul ...) + TODO: check +CVE-2019-25219 (Asio C++ Library before 1.13.0 lacks a fallback error code in the case ...) + TODO: check +CVE-2017-20195 (A vulnerability was found in LUNAD3v AreaLoad up to 1a1103182ed63a06dd ...) + TODO: check +CVE-2024-10467 (Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thun ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10467 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10467 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10467 -CVE-2024-10466 +CVE-2024-10466 (By sending a specially crafted push message, a remote server could hav ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10466 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10466 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10466 -CVE-2024-10465 +CVE-2024-10465 (A clipboard "paste" button could persist across tabs which allowed a s ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10465 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10465 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10465 -CVE-2024-10464 +CVE-2024-10464 (Repeated writes to history interface attributes could have been used t ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10464 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10464 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10464 -CVE-2024-10468 +CVE-2024-10468 (Potential race conditions in IndexedDB could have caused memory corrup ...) - firefox <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10468 -CVE-2024-10463 +CVE-2024-10463 (Video frames could have been leaked between origins in some situations ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10463 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10463 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10463 -CVE-2024-10462 +CVE-2024-10462 (Truncation of a long URL could have allowed origin spoofing in a permi ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10462 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10462 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10462 -CVE-2024-10461 +CVE-2024-10461 (In multipart/x-mixed-replace responses, `Content-Disposition: attachme ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10461 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10461 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10461 -CVE-2024-10460 +CVE-2024-10460 (The origin of an external protocol handler prompt could have been obsc ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10460 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10460 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10460 -CVE-2024-10459 +CVE-2024-10459 (An attacker could have caused a use-after-free when accessibility was ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/#CVE-2024-10459 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10459 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10459 -CVE-2024-10458 +CVE-2024-10458 (A permission leak could have occurred from a trusted site to an untrus ...) - firefox <unfixed> - firefox-esr <unfixed> - thunderbird <unfixed> @@ -72,12 +302,13 @@ CVE-2024-10458 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/#CVE-2024-10458 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/#CVE-2024-10458 CVE-2024-9632 + {DSA-5800-1 DLA-3940-1} - xorg-server <unfixed> (bug #1086244) - xwayland <unfixed> (bug #1086245) [bookworm] - xwayland <ignored> (Minor issue; Xwayland shouldn't be running as root) NOTE: Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/85b776571487f52e756f68a069c768757369bfe3 NOTE: https://lists.freedesktop.org/archives/xorg-announce/2024-October/003545.html -CVE-2024-45477 +CVE-2024-45477 (Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 suppor ...) NOT-FOR-US: Apache NiFi CVE-2024-51509 (Tiki through 27.0 allows users who have certain permissions to insert ...) - tikiwiki <removed> @@ -1489,7 +1720,7 @@ CVE-2024-10278 (A vulnerability was found in ESAFENET CDG 5. It has been classif NOT-FOR-US: ESAFENET CDG CVE-2024-10277 (A vulnerability was found in ESAFENET CDG 5 and classified as critical ...) NOT-FOR-US: ESAFENET CDG -CVE-2024-10276 (A vulnerability has been found in Tektronix Sentry 6.0.9 and classifie ...) +CVE-2024-10276 (A vulnerability has been found in Telestream Sentry 6.0.9 and classifi ...) NOT-FOR-US: Tektronix CVE-2024-10250 (The Nioland theme for WordPress is vulnerable to Reflected Cross-Site ...) NOT-FOR-US: WordPress theme @@ -9107,7 +9338,7 @@ CVE-2024-47222 (New Cloud MyOffice SDK Collaborative Editing Server 2.2.2 throug NOT-FOR-US: New Cloud MyOffice SDK Collaborative Editing Server CVE-2024-47069 (Oveleon Cookie Bar is a cookie bar is for the Contao Open Source CMS a ...) NOT-FOR-US: Contao CMS -CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 an ...) +CVE-2024-47068 (Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3 ...) - node-rollup 3.29.5-1 (bug #1082712) [bookworm] - node-rollup <no-dsa> (Minor issue) [bullseye] - node-rollup <postponed> (Minor issue; can be fixed in next update) @@ -14581,7 +14812,7 @@ CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error att [bullseye] - wolfssl <postponed> (Minor issue) NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable NOTE: https://github.com/wolfSSL/wolfssl/pull/7416 -CVE-2024-4872 (The product does not validate any query towards persistent data, resul ...) +CVE-2024-4872 (A vulnerability exists in the query validation of the MicroSCADA Pro/X ...) NOT-FOR-US: Hitachi CVE-2024-45264 (A cross-site request forgery (CSRF) vulnerability in the admin panel i ...) NOT-FOR-US: SkySystem Arfa-CMS @@ -14614,7 +14845,7 @@ CVE-2024-40395 (An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5 NOT-FOR-US: PTC ThingWorx CVE-2024-3982 (An attacker with local access to machine where MicroSCADA X SYS600 is ...) NOT-FOR-US: Hitachi -CVE-2024-3980 (The product allows user input to control or influence paths or file na ...) +CVE-2024-3980 (The MicroSCADA Pro/X SYS600 product allows an authenticated user input ...) NOT-FOR-US: Hitachi CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...) NOT-FOR-US: Rubrik CDM @@ -34260,7 +34491,7 @@ CVE-2024-28024 (A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive NOT-FOR-US: Hitachi CVE-2024-28023 (A vulnerability exists in the message queueing mechanism that if expl ...) NOT-FOR-US: Hitachi -CVE-2024-28022 (A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway that ...) +CVE-2024-28022 (A vulnerability exists in the UNEM server / APIGateway that if exploit ...) NOT-FOR-US: Hitachi CVE-2024-28021 (A vulnerability exists in the FOXMAN-UN/UNEM server that affects the m ...) NOT-FOR-US: Hitachi @@ -102712,7 +102943,7 @@ CVE-2023-41163 (A Reflected Cross-site scripting (XSS) vulnerability in the file CVE-2023-41041 (Graylog is a free and open log management platform. In a multi-node Gr ...) - graylog2 <itp> (bug #652273) CVE-2023-41040 (GitPython is a python library used to interact with Git repositories. ...) - {DLA-3589-1} + {DLA-3939-1 DLA-3589-1} - python-git 3.1.36-1 [bookworm] - python-git 3.1.30-1+deb12u2 NOTE: https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c @@ -105184,7 +105415,7 @@ CVE-2023-4106 (Mattermost fails to check if the requesting user is a guest befor CVE-2023-4105 (Mattermost fails to delete the attachments when deleting a message in ...) - mattermost-server <itp> (bug #823556) CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi options in c ...) - {DLA-3502-1} + {DLA-3939-1 DLA-3502-1} - python-git 3.1.36-1 (bug #1043503) [bookworm] - python-git 3.1.30-1+deb12u2 NOTE: https://github.com/gitpython-developers/GitPython/pull/1609 @@ -213428,7 +213659,7 @@ CVE-2022-24441 (The package snyk before 1.1064.0 are vulnerable to Code Injectio CVE-2022-24440 (The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1 ...) NOT-FOR-US: cocoapods-downloader CVE-2022-24439 (All versions of package gitpython are vulnerable to Remote Code Execut ...) - {DLA-3502-1} + {DLA-3939-1 DLA-3502-1} - python-git 3.1.30-1 (bug #1027163) NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858 NOTE: https://github.com/gitpython-developers/GitPython/commit/787359d80d80225095567340aa5e7ec01847fa9a (3.1.30) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40a02016a7f55caebfeb02097efb7c4b2b4d9be3 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits