Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
46696c7d by security tracker role at 2024-10-18T08:12:15+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,99 @@
+CVE-2024-9892 (The Add Widget After Content plugin for WordPress is vulnerable
to Sto ...)
+ TODO: check
+CVE-2024-9848 (The Product Customizer Light plugin for WordPress is vulnerable
to Sto ...)
+ TODO: check
+CVE-2024-9703 (The Arconix Shortcodes plugin for WordPress is vulnerable to
Stored Cr ...)
+ TODO: check
+CVE-2024-9452 (The Branding plugin for WordPress is vulnerable to Stored
Cross-Site S ...)
+ TODO: check
+CVE-2024-9383 (The Parcel Pro plugin for WordPress is vulnerable to Reflected
Cross-S ...)
+ TODO: check
+CVE-2024-9382 (The Gantry 4 Framework plugin for WordPress is vulnerable to
Reflected ...)
+ TODO: check
+CVE-2024-9373 (The Elemenda plugin for WordPress is vulnerable to Stored
Cross-Site S ...)
+ TODO: check
+CVE-2024-9366 (The Easy Menu Manager | WPZest plugin for WordPress is
vulnerable to S ...)
+ TODO: check
+CVE-2024-9364 (The SendGrid for WordPress plugin for WordPress is vulnerable
to unaut ...)
+ TODO: check
+CVE-2024-9361 (The Bulk images optimizer: Resize, optimize, convert to webp,
rename \ ...)
+ TODO: check
+CVE-2024-9350 (The DPD Baltic Shipping plugin for WordPress is vulnerable to
Reflecte ...)
+ TODO: check
+CVE-2024-9264 (The SQL Expressions experimental feature of Grafana allows for
the eva ...)
+ TODO: check
+CVE-2024-9206 (The MAS Companies For WP Job Manager plugin for WordPress is
vulnerabl ...)
+ TODO: check
+CVE-2024-8916 (The Suki Sites Import plugin for WordPress is vulnerable to
Stored Cro ...)
+ TODO: check
+CVE-2024-8790 (The Social Share With Floating Bar plugin for WordPress is
vulnerable ...)
+ TODO: check
+CVE-2024-8740 (The GetResponse Forms by Optin Cat plugin for WordPress is
vulnerable ...)
+ TODO: check
+CVE-2024-7316 (Improper Validation of Specified Quantity in Input
vulnerability in Mi ...)
+ TODO: check
+CVE-2024-49023 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-48924 (### Impact When this library is used to deserialize
messagepack data ...)
+ TODO: check
+CVE-2024-47793 (Stored cross-site scripting vulnerability exists in Exment
v6.1.4 and ...)
+ TODO: check
+CVE-2024-46897 (Incorrect permission assignment for critical resource issue
exists in ...)
+ TODO: check
+CVE-2024-43596 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-43595 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-43587 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-43580 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
+ TODO: check
+CVE-2024-43579 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-43578 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-43566 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2024-38820 (The fix for CVE-2022-22968 made disallowedFieldspatterns in
DataBinder ...)
+ TODO: check
+CVE-2024-33453 (Buffer Overflow vulnerability in esp-idf v.5.1 allows a remote
attacke ...)
+ TODO: check
+CVE-2024-30875 (Cross Site Scripting vulnerability in JavaScript Library
jquery-ui v.1 ...)
+ TODO: check
+CVE-2024-27766 (An issue in MYSQL MariaDB v.11.1 allows a remote attacker to
execute a ...)
+ TODO: check
+CVE-2024-10119 (The wireless router WRTM326 from SECOM does not properly
validate a sp ...)
+ TODO: check
+CVE-2024-10118 (SECOM WRTR-304GN-304TW-UPSC does not properly filter user
input in the ...)
+ TODO: check
+CVE-2024-10093 (A vulnerability, which was classified as critical, was found
in VSO Co ...)
+ TODO: check
+CVE-2024-10080 (The WP Easy Post Types plugin for WordPress is vulnerable to
Stored Cr ...)
+ TODO: check
+CVE-2024-10079 (The WP Easy Post Types plugin for WordPress is vulnerable to
PHP Objec ...)
+ TODO: check
+CVE-2024-10078 (The WP Easy Post Types plugin for WordPress is vulnerable to
unauthori ...)
+ TODO: check
+CVE-2024-10055 (The Click to Chat \u2013 WP Support All-in-One Floating Widget
plugin ...)
+ TODO: check
+CVE-2024-10049 (The Edit WooCommerce Templates plugin for WordPress is
vulnerable to R ...)
+ TODO: check
+CVE-2024-10040 (The Infinite-Scroll plugin for WordPress is vulnerable to
Cross-Site R ...)
+ TODO: check
+CVE-2024-10014 (The Flat UI Button plugin for WordPress is vulnerable to
Stored Cross- ...)
+ TODO: check
+CVE-2023-6058 (A vulnerability has been identified in Bitdefender Safepay's
handling ...)
+ TODO: check
+CVE-2023-6057 (A vulnerability has been discovered in Bitdefender Total
Security HTTP ...)
+ TODO: check
+CVE-2023-6056 (A vulnerability has been discovered in Bitdefender Total
Security HTTP ...)
+ TODO: check
+CVE-2023-6055 (A vulnerability has been identified in Bitdefender Total
Security HTTP ...)
+ TODO: check
+CVE-2023-49567 (A vulnerability has been identified in the Bitdefender Total
Security ...)
+ TODO: check
+CVE-2023-39593 (Insecure permissions in the sys_exec function of Oracle MYSQL
MariaDB ...)
+ TODO: check
CVE-2024-9898 (The Parallax Image plugin for WordPress is vulnerable to Stored
Cross- ...)
NOT-FOR-US: WordPress plugin
CVE-2024-9414 (In LAquis SCADA version 4.7.1.511, a cross-site scripting
vulnerabilit ...)
@@ -127337,8 +127433,8 @@ CVE-2023-26787
RESERVED
CVE-2023-26786
RESERVED
-CVE-2023-26785
- RESERVED
+CVE-2023-26785 (MariaDB v10.5 was discovered to contain a remote code
execution (RCE) ...)
+ TODO: check
CVE-2023-26784 (SQL Injection vulnerability found in Kirin Fortress Machine
v.1.7-2020 ...)
NOT-FOR-US: Kirin
CVE-2023-26783
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/46696c7de894863d42b9edfeb22e22fa8b132762
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/46696c7de894863d42b9edfeb22e22fa8b132762
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits