[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Dec 24 20:12:10 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d8e7d4e5 by security tracker role at 2024-12-24T20:12:03+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,71 @@
+CVE-2024-8721 (The Tracking Code Manager plugin for WordPress is vulnerable to Stored ...)
+	TODO: check
+CVE-2024-53163 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-53162 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-53161 (In the Linux kernel, the following vulnerability has been resolved:  E ...)
+	TODO: check
+CVE-2024-53160 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2024-53159 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	TODO: check
+CVE-2024-53158 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-53157 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2024-53156 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2024-53155 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	TODO: check
+CVE-2024-53154 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-53153 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
+	TODO: check
+CVE-2024-53152 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
+	TODO: check
+CVE-2024-53151 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2024-53150 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2024-53149 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	TODO: check
+CVE-2024-53148 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2024-53147 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
+	TODO: check
+CVE-2024-53146 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
+	TODO: check
+CVE-2024-53145 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	TODO: check
+CVE-2024-43441 (Authentication Bypass by Assumed-Immutable Data vulnerability in Apach ...)
+	TODO: check
+CVE-2024-12881 (The PlugVersions \u2013 Easily rollback to previous versions of your p ...)
+	TODO: check
+CVE-2024-12850 (The Database Backup and check Tables Automated With Scheduler 2024 plu ...)
+	TODO: check
+CVE-2024-12746 (A SQL injection in the Amazon Redshift ODBC Driver v2.1.5.0 (Windows o ...)
+	TODO: check
+CVE-2024-12745 (A SQL injection in the Amazon Redshift Python Connector v2.1.4 allows  ...)
+	TODO: check
+CVE-2024-12744 (A SQL injection in the Amazon Redshift JDBC Driver in v2.1.0.31 allows ...)
+	TODO: check
+CVE-2024-12468 (The WP Datepicker plugin for WordPress is vulnerable to Reflected Cros ...)
+	TODO: check
+CVE-2024-12268 (The Responsive Blocks \u2013 WordPress Gutenberg Blocks plugin for Wor ...)
+	TODO: check
+CVE-2024-12103 (The Content No Cache: prevent specific content from being cached plugi ...)
+	TODO: check
+CVE-2024-12031 (The Advanced Floating Content plugin for WordPress is vulnerable to SQ ...)
+	TODO: check
+CVE-2024-11896 (The Text Prompter \u2013 Unlimited chatgpt text prompts for openai tas ...)
+	TODO: check
+CVE-2024-11726 (The Appointment Booking Calendar Plugin and Scheduling Plugin \u2013 B ...)
+	TODO: check
+CVE-2024-10856 (The Booking Calendar WpDevArt plugin is vulnerable to time-based, blin ...)
+	TODO: check
+CVE-2024-10584 (The DirectoryPress \u2013 Business Directory And Classified Ad Listing ...)
+	TODO: check
 CVE-2024-9427 (A vulnerability in Koji was found. An unsanitized input allows for an  ...)
 	TODO: check
 CVE-2024-53961 (ColdFusion versions 2023.11, 2021.17 and earlier are affected by an Im ...)
@@ -1007,10 +1075,10 @@ CVE-2024-53144 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/b25e11f978b63cb7857890edb3a698599cddb10e (6.12-rc2)
-CVE-2024-53241 [Xen hypercall page unsafe against speculative attacks]
+CVE-2024-53241 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.12.6-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-466.html
-CVE-2024-53240 [Backend can crash Linux netfront]
+CVE-2024-53240 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.12.6-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-465.html
 CVE-2024-9624 (The WP All Import Pro plugin for WordPress is vulnerable to Server-Sid ...)
@@ -250750,8 +250818,7 @@ CVE-2022-21507
 	RESERVED
 CVE-2022-21506
 	RESERVED
-CVE-2022-21505
-	RESERVED
+CVE-2022-21505 (In the linux kernel, if IMA appraisal is used with the "ima_appraise=l ...)
 	- linux 5.18.16-1
 	[bullseye] - linux 5.10.136-1
 	[buster] - linux <not-affected> (Vulnerable code introduced later)
@@ -447369,8 +447436,8 @@ CVE-2019-2485 (Vulnerability in the Oracle Mobile Field Service component of Ora
 	NOT-FOR-US: Oracle
 CVE-2019-2484 (Vulnerability in the Application Express component of Oracle Database  ...)
 	NOT-FOR-US: Oracle
-CVE-2019-2483
-	RESERVED
+CVE-2019-2483 (Vulnerability in the Oracle iStore product of Oracle E-Business Suite  ...)
+	TODO: check
 CVE-2019-2482 (Vulnerability in the MySQL Server component of Oracle MySQL (subcompon ...)
 	- mysql-5.7 5.7.25-1 (bug #919817)
 CVE-2019-2481 (Vulnerability in the MySQL Server component of Oracle MySQL (subcompon ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8e7d4e55ae3c302bff35f7d471b0413552f0b4d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8e7d4e55ae3c302bff35f7d471b0413552f0b4d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241224/4764506c/attachment.htm>


More information about the debian-security-tracker-commits mailing list