[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Dec 24 20:12:10 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d8e7d4e5 by security tracker role at 2024-12-24T20:12:03+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,71 @@
+CVE-2024-8721 (The Tracking Code Manager plugin for WordPress is vulnerable to Stored ...)
+ TODO: check
+CVE-2024-53163 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-53162 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-53161 (In the Linux kernel, the following vulnerability has been resolved: E ...)
+ TODO: check
+CVE-2024-53160 (In the Linux kernel, the following vulnerability has been resolved: r ...)
+ TODO: check
+CVE-2024-53159 (In the Linux kernel, the following vulnerability has been resolved: h ...)
+ TODO: check
+CVE-2024-53158 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-53157 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2024-53156 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2024-53155 (In the Linux kernel, the following vulnerability has been resolved: o ...)
+ TODO: check
+CVE-2024-53154 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-53153 (In the Linux kernel, the following vulnerability has been resolved: P ...)
+ TODO: check
+CVE-2024-53152 (In the Linux kernel, the following vulnerability has been resolved: P ...)
+ TODO: check
+CVE-2024-53151 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2024-53150 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2024-53149 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-53148 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2024-53147 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ TODO: check
+CVE-2024-53146 (In the Linux kernel, the following vulnerability has been resolved: N ...)
+ TODO: check
+CVE-2024-53145 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2024-43441 (Authentication Bypass by Assumed-Immutable Data vulnerability in Apach ...)
+ TODO: check
+CVE-2024-12881 (The PlugVersions \u2013 Easily rollback to previous versions of your p ...)
+ TODO: check
+CVE-2024-12850 (The Database Backup and check Tables Automated With Scheduler 2024 plu ...)
+ TODO: check
+CVE-2024-12746 (A SQL injection in the Amazon Redshift ODBC Driver v2.1.5.0 (Windows o ...)
+ TODO: check
+CVE-2024-12745 (A SQL injection in the Amazon Redshift Python Connector v2.1.4 allows ...)
+ TODO: check
+CVE-2024-12744 (A SQL injection in the Amazon Redshift JDBC Driver in v2.1.0.31 allows ...)
+ TODO: check
+CVE-2024-12468 (The WP Datepicker plugin for WordPress is vulnerable to Reflected Cros ...)
+ TODO: check
+CVE-2024-12268 (The Responsive Blocks \u2013 WordPress Gutenberg Blocks plugin for Wor ...)
+ TODO: check
+CVE-2024-12103 (The Content No Cache: prevent specific content from being cached plugi ...)
+ TODO: check
+CVE-2024-12031 (The Advanced Floating Content plugin for WordPress is vulnerable to SQ ...)
+ TODO: check
+CVE-2024-11896 (The Text Prompter \u2013 Unlimited chatgpt text prompts for openai tas ...)
+ TODO: check
+CVE-2024-11726 (The Appointment Booking Calendar Plugin and Scheduling Plugin \u2013 B ...)
+ TODO: check
+CVE-2024-10856 (The Booking Calendar WpDevArt plugin is vulnerable to time-based, blin ...)
+ TODO: check
+CVE-2024-10584 (The DirectoryPress \u2013 Business Directory And Classified Ad Listing ...)
+ TODO: check
CVE-2024-9427 (A vulnerability in Koji was found. An unsanitized input allows for an ...)
TODO: check
CVE-2024-53961 (ColdFusion versions 2023.11, 2021.17 and earlier are affected by an Im ...)
@@ -1007,10 +1075,10 @@ CVE-2024-53144 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.11.4-1
[bookworm] - linux 6.1.115-1
NOTE: https://git.kernel.org/linus/b25e11f978b63cb7857890edb3a698599cddb10e (6.12-rc2)
-CVE-2024-53241 [Xen hypercall page unsafe against speculative attacks]
+CVE-2024-53241 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.12.6-1
NOTE: https://xenbits.xen.org/xsa/advisory-466.html
-CVE-2024-53240 [Backend can crash Linux netfront]
+CVE-2024-53240 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.12.6-1
NOTE: https://xenbits.xen.org/xsa/advisory-465.html
CVE-2024-9624 (The WP All Import Pro plugin for WordPress is vulnerable to Server-Sid ...)
@@ -250750,8 +250818,7 @@ CVE-2022-21507
RESERVED
CVE-2022-21506
RESERVED
-CVE-2022-21505
- RESERVED
+CVE-2022-21505 (In the linux kernel, if IMA appraisal is used with the "ima_appraise=l ...)
- linux 5.18.16-1
[bullseye] - linux 5.10.136-1
[buster] - linux <not-affected> (Vulnerable code introduced later)
@@ -447369,8 +447436,8 @@ CVE-2019-2485 (Vulnerability in the Oracle Mobile Field Service component of Ora
NOT-FOR-US: Oracle
CVE-2019-2484 (Vulnerability in the Application Express component of Oracle Database ...)
NOT-FOR-US: Oracle
-CVE-2019-2483
- RESERVED
+CVE-2019-2483 (Vulnerability in the Oracle iStore product of Oracle E-Business Suite ...)
+ TODO: check
CVE-2019-2482 (Vulnerability in the MySQL Server component of Oracle MySQL (subcompon ...)
- mysql-5.7 5.7.25-1 (bug #919817)
CVE-2019-2481 (Vulnerability in the MySQL Server component of Oracle MySQL (subcompon ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8e7d4e55ae3c302bff35f7d471b0413552f0b4d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8e7d4e55ae3c302bff35f7d471b0413552f0b4d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241224/4764506c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list