Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
54a17456 by security tracker role at 2024-05-25T08:11:55+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,21 @@
+CVE-2024-5229 (The Primary Addon for Elementor plugin for WordPress is
vulnerable to ...)
+ TODO: check
+CVE-2024-5220 (The ND Shortcodes plugin for WordPress is vulnerable to Stored
Cross-S ...)
+ TODO: check
+CVE-2024-5218 (The Reviews and Rating \u2013 Google Reviews plugin for
WordPress is v ...)
+ TODO: check
+CVE-2024-4858 (The Testimonial Carousel For Elementor plugin for WordPress is
vulnera ...)
+ TODO: check
+CVE-2024-4045 (The Popup Builder by OptinMonster \u2013 WordPress Popups for
Optins, ...)
+ TODO: check
+CVE-2024-36079 (An issue was discovered in Vaultize 21.07.27. When uploading
files, th ...)
+ TODO: check
+CVE-2024-35374 (Mocodo Mocodo Online 4.2.6 and below does not properly
sanitize the sq ...)
+ TODO: check
+CVE-2024-35373 (Mocodo Mocodo Online 4.2.6 and below is vulnerable to Remote
Code Exec ...)
+ TODO: check
+CVE-2024-35232 (github.com/huandu/facebook is a Go package that fully supports
the Fac ...)
+ TODO: check
CVE-2024-5318 (An issue has been discovered in GitLab CE/EE affecting all
versions st ...)
- gitlab <not-affected> (Vulnerable code introduced later)
CVE-2024-5315 (Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1
and al ...)
@@ -19901,7 +19919,7 @@ CVE-2024-26745 (In the Linux kernel, the following
vulnerability has been resolv
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/09a3c1e46142199adcee372a420b024b4fc61051 (6.8-rc7)
CVE-2024-24795 (HTTP Response splitting in multiple modules in Apache HTTP
Server allo ...)
- {DSA-5662-1}
+ {DSA-5662-1 DLA-3818-1}
- apache2 2.4.59-1 (bug #1068412)
- uwsgi <unfixed> (unimportant)
NOTE: https://www.openwall.com/lists/oss-security/2024/04/04/5
@@ -19913,13 +19931,13 @@ CVE-2024-24795 (HTTP Response splitting in multiple
modules in Apache HTTP Serve
NOTE: packages which are provided by src:apache2 itself.
NOTE: https://github.com/unbit/uwsgi/issues/2635
CVE-2023-38709 (Faulty input validation in the core of Apache allows malicious
or expl ...)
- {DSA-5662-1}
+ {DSA-5662-1 DLA-3818-1}
- apache2 2.4.59-1 (bug #1068412)
NOTE: https://www.openwall.com/lists/oss-security/2024/04/04/3
NOTE:
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-38709
NOTE:
https://github.com/apache/httpd/commit/ac20389f3c816d990aba21720f1492b69ac5cb44
CVE-2024-27316 (HTTP/2 incoming headers exceeding the limit are temporarily
buffered i ...)
- {DSA-5662-1}
+ {DSA-5662-1 DLA-3818-1}
- apache2 2.4.59-1 (bug #1068412)
NOTE: https://www.kb.cert.org/vuls/id/421644
NOTE: https://www.openwall.com/lists/oss-security/2024/04/04/4
@@ -55873,7 +55891,7 @@ CVE-2020-36706 (The Simple:Press \u2013 WordPress Forum
Plugin for WordPress is
CVE-2020-36698 (The Security & Malware scan by CleanTalk plugin for WordPress
is vulne ...)
NOT-FOR-US: WordPress plugin
CVE-2023-45802 (When a HTTP/2 stream was reset (RST frame) by a client, there
was a ti ...)
- {DSA-5662-1}
+ {DSA-5662-1 DLA-3818-1}
- apache2 2.4.58-1
NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/6
NOTE:
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-45802
@@ -78703,7 +78721,7 @@ CVE-2023-2259 (Improper Neutralization of Special
Elements Used in a Template En
CVE-2023-2258 (Improper Neutralization of Formula Elements in a CSV File in
GitHub re ...)
NOT-FOR-US: Alf.io
CVE-2023-31122 (Out-of-bounds Read vulnerability in mod_macro of Apache HTTP
Server.Th ...)
- {DSA-5662-1}
+ {DSA-5662-1 DLA-3818-1}
- apache2 2.4.58-1
NOTE: https://www.openwall.com/lists/oss-security/2023/10/19/4
NOTE:
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-31122
@@ -347017,6 +347035,7 @@ CVE-2019-17569 (The refactoring present in Apache
Tomcat 9.0.28 to 9.0.30, 8.5.4
CVE-2019-17568
REJECTED
CVE-2019-17567 (Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel
configu ...)
+ {DLA-3818-1}
[experimental] - apache2 2.4.48-1
- apache2 2.4.48-2
[stretch] - apache2 <ignored> (Intrusive and risky backport)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/54a1745646757b78eb1007dd43941003ea258867
--
This project does not include diff previews in email notifications.
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/54a1745646757b78eb1007dd43941003ea258867
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits