Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
20ed4bca by security tracker role at 2024-12-13T08:12:17+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,51 @@
+CVE-2024-9508 (Horner Automation Cscape contains a memory corruption
vulnerability, w ...)
+ TODO: check
+CVE-2024-55918 (An issue was discovered in the Graphics::ColorNames package
before 3.2 ...)
+ TODO: check
+CVE-2024-21544 (Versions of the package spatie/browsershot before 5.0.1 are
vulnerable ...)
+ TODO: check
+CVE-2024-21543 (Versions of the package djoser before 2.3.0 are vulnerable to
Authenti ...)
+ TODO: check
+CVE-2024-12603 (A logic vulnerability in the the mobile application
(com.transsion.app ...)
+ TODO: check
+CVE-2024-12581 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder
Feature ...)
+ TODO: check
+CVE-2024-12579 (The Minify HTML plugin for WordPress is vulnerable to Regular
Expressi ...)
+ TODO: check
+CVE-2024-12574 (The SVG Shortcode plugin for WordPress is vulnerable to Stored
Cross-S ...)
+ TODO: check
+CVE-2024-12572 (The Hello In All Languages plugin for WordPress is vulnerable
to Cross ...)
+ TODO: check
+CVE-2024-12300 (The AR for WordPress plugin for WordPress is vulnerable to
unauthorize ...)
+ TODO: check
+CVE-2024-12289 (Boundary Community Edition and Boundary Enterprise
(\u201cBoundary\u20 ...)
+ TODO: check
+CVE-2024-12212 (The vulnerability occurs in the parsing of CSP files. The
issues resul ...)
+ TODO: check
+CVE-2024-11839 (Deserialization of Untrusted Data vulnerability in PlexTrac
(Runbooks ...)
+ TODO: check
+CVE-2024-11838 (External Control of File Name or Path vulnerability in
PlexTrac allows ...)
+ TODO: check
+CVE-2024-11837 (Improper Neutralization of Special Elements used in an N1QL
Command (' ...)
+ TODO: check
+CVE-2024-11836 (Server-Side Request Forgery (SSRF) vulnerability in PlexTrac
allowing ...)
+ TODO: check
+CVE-2024-11835 (Uncontrolled Resource Consumption vulnerability in PlexTrac
allows Web ...)
+ TODO: check
+CVE-2024-11834 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-11833 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2024-11809 (The Primer MyData for Woocommerce plugin for WordPress is
vulnerable t ...)
+ TODO: check
+CVE-2024-11767 (The NewsmanApp plugin for WordPress is vulnerable to Stored
Cross-Site ...)
+ TODO: check
+CVE-2024-10939 (The Image Widget WordPress plugin before 4.4.11 does not
sanitise and ...)
+ TODO: check
+CVE-2024-10678 (The Ultimate Blocks WordPress plugin before 3.2.4 does not
validate a ...)
+ TODO: check
+CVE-2019-25221 (The Responsive Filterable Portfolio plugin for WordPress is
vulnerable ...)
+ TODO: check
CVE-2024-12455 [powerpc: getrandom() returns EINVAL as retcode instead of
errno]
- glibc <not-affected> (Vulnerable code not present)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32440
@@ -45,7 +93,8 @@ CVE-2024-54122 (Concurrent variable access vulnerability in
the ability module I
NOT-FOR-US: Huawei
CVE-2024-54119 (Cross-process screen stack vulnerability in the UIExtension
module Imp ...)
NOT-FOR-US: Huawei
-CVE-2024-54118 (Cross-process screen stack vulnerability in the UIExtension
module Imp ...)
+CVE-2024-54118
+ REJECTED
NOT-FOR-US: Huawei
CVE-2024-54117 (Cross-process screen stack vulnerability in the UIExtension
module Imp ...)
NOT-FOR-US: Huawei
@@ -100047,7 +100096,8 @@ CVE-2023-6577 (A vulnerability was found in Byzoro
PatrolFlow 2530Pro up to 2023
NOT-FOR-US: Beijing Baichuo PatrolFlow 2530Pro
CVE-2023-6576 (A vulnerability was found in Byzoro S210 up to 20231123. It has
been d ...)
NOT-FOR-US: Beijing Baichuo S210
-CVE-2023-6061 (Multiple components of Iconics SCADA Suite are prone to a
Phantom DLL ...)
+CVE-2023-6061
+ REJECTED
NOT-FOR-US: Iconics SCADA Suite
CVE-2023-5058 (Improper Input Validation in the processing of user-supplied
splash sc ...)
NOT-FOR-US: Phoenix
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20ed4bcac5c0b5d44968bc0dff774641fd47bd34
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20ed4bcac5c0b5d44968bc0dff774641fd47bd34
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits