[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat May 11 21:12:15 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
06a1d63f by security tracker role at 2024-05-11T20:11:47+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,77 @@
+CVE-2024-4738 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+	TODO: check
+CVE-2024-4737 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+	TODO: check
+CVE-2024-4736 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+	TODO: check
+CVE-2024-4630 (The Starter Templates \u2014 Elementor, WordPress & Beaver Builder Tem ...)
+	TODO: check
+CVE-2024-4574 (The Graphina \u2013 Elementor Charts and Graphs plugin for WordPress i ...)
+	TODO: check
+CVE-2024-4560 (The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable ...)
+	TODO: check
+CVE-2024-4487 (The Blocksy Companion plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-4430 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress  ...)
+	TODO: check
+CVE-2024-4417 (The Falang multilanguage for WordPress plugin for WordPress is vulnera ...)
+	TODO: check
+CVE-2024-4413 (The Hotel Booking Lite plugin for WordPress is vulnerable to PHP Objec ...)
+	TODO: check
+CVE-2024-4329 (The Thim Elementor Kit plugin for WordPress is vulnerable to Stored Cr ...)
+	TODO: check
+CVE-2024-4213 (The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable ...)
+	TODO: check
+CVE-2024-4209 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Feature ...)
+	TODO: check
+CVE-2024-4046 (Cracking vulnerability in the OS security module Impact: Successful ex ...)
+	TODO: check
+CVE-2024-3055 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) ...)
+	TODO: check
+CVE-2024-32999 (Cracking vulnerability in the OS security module Impact: Successful ex ...)
+	TODO: check
+CVE-2024-32998 (NULL pointer access vulnerability in the clock module Impact: Successf ...)
+	TODO: check
+CVE-2024-32997 (Race condition vulnerability in the binder driver module Impact: Succe ...)
+	TODO: check
+CVE-2024-32996 (Privilege escalation vulnerability in the account module Impact: Succe ...)
+	TODO: check
+CVE-2024-32995 (Denial of service (DoS) vulnerability in the AMS module Impact: Succes ...)
+	TODO: check
+CVE-2024-32993 (Out-of-bounds access vulnerability in the memory module Impact: Succes ...)
+	TODO: check
+CVE-2024-32992 (Insufficient verification vulnerability in the baseband module Impact: ...)
+	TODO: check
+CVE-2024-32991 (Permission verification vulnerability in the wpa_supplicant module Imp ...)
+	TODO: check
+CVE-2024-32990 (Permission verification vulnerability in the system sharing pop-up mod ...)
+	TODO: check
+CVE-2024-32989 (Insufficient verification vulnerability in the system sharing pop-up m ...)
+	TODO: check
+CVE-2024-28761 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 thr ...)
+	TODO: check
+CVE-2024-28760 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 thr ...)
+	TODO: check
+CVE-2024-27460 (A privilege escalation exists in the updater for Plantronics Hub 3.25. ...)
+	TODO: check
+CVE-2023-5447 (Missing lock check in SynHsaService may create a use-after-free condit ...)
+	TODO: check
+CVE-2023-52721 (The WindowManager module has a vulnerability in permission control. Im ...)
+	TODO: check
+CVE-2023-52720 (Race condition vulnerability in the soundtrigger module Impact: Succes ...)
+	TODO: check
+CVE-2023-52719 (Privilege escalation vulnerability in the PMS module Impact: Successfu ...)
+	TODO: check
+CVE-2023-52384 (Double-free vulnerability in the RSMC module Impact: Successful exploi ...)
+	TODO: check
+CVE-2023-52383 (Double-free vulnerability in the RSMC module Impact: Successful exploi ...)
+	TODO: check
+CVE-2023-47712 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a local u ...)
+	TODO: check
+CVE-2023-47711 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow an authen ...)
+	TODO: check
+CVE-2023-47709 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a remote  ...)
+	TODO: check
 CVE-2024-4735 (A vulnerability has been found in Campcodes Legal Case Management Syst ...)
 	NOT-FOR-US: Campcodes Legal Case Management System
 CVE-2024-4732 (A vulnerability, which was classified as problematic, has been found i ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240511/aee53c61/attachment.htm>


More information about the debian-security-tracker-commits mailing list