Oracle reports:
+++ +36 new security patches for Oracle MySQL. 11 of these vulnerabilities + may be remotely exploitable without authentication, i.e., may be + exploited over a network without requiring user credentials. + The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle + MySQL is 9.8.
+
Electron developers report:
+++ +This update fixes the following vulnerabilities:
++
+- Security: backported fix for CVE-2024-5493.
+- Security: backported fix for CVE-2024-5831.
+- Security: backported fix for CVE-2024-5832.
+- Security: backported fix for CVE-2024-6100.
+- Security: backported fix for CVE-2024-6101.
+- Security: backported fix for CVE-2024-6103.
+- Security: backported fix for CVE-2024-6291.
+- Security: backported fix for CVE-2024-6293.
+- Security: backported fix for CVE-2024-6290.
+- Security: backported fix for CVE-2024-6292.
+
Electron developers report:
+++ +This update fixes the following vulnerabilities:
++
+- Security: backported fix for CVE-2024-6291.
+- Security: backported fix for CVE-2024-6293.
+- Security: backported fix for CVE-2024-6290.
+- Security: backported fix for CVE-2024-6292.
+
Gitlab reports:
+++ +An attacker can run pipeline jobs as an arbitrary user
+Developer user with admin_compliance_framework permission can change group URL
+Admin push rules custom role allows creation of project level deploy token
+Package registry vulnerable to manifest confusion
+User with admin_group_member permission can ban group members
+Subdomain takeover in GitLab Pages
+
Django reports:
+++ +CVE-2024-38875: Potential denial-of-service in django.utils.html.urlize().
+CVE-2024-39329: Username enumeration through timing difference for users with unusable passwords.
+CVE-2024-39330: Potential directory-traversal in django.core.files.storage.Storage.save().
+CVE-2024-39614: Potential denial-of-service in django.utils.translation.get_supported_language_variant().
+