[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat May 11 21:12:15 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
06a1d63f by security tracker role at 2024-05-11T20:11:47+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,77 @@
+CVE-2024-4738 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+ TODO: check
+CVE-2024-4737 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+ TODO: check
+CVE-2024-4736 (A vulnerability was found in Campcodes Legal Case Management System 1. ...)
+ TODO: check
+CVE-2024-4630 (The Starter Templates \u2014 Elementor, WordPress & Beaver Builder Tem ...)
+ TODO: check
+CVE-2024-4574 (The Graphina \u2013 Elementor Charts and Graphs plugin for WordPress i ...)
+ TODO: check
+CVE-2024-4560 (The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable ...)
+ TODO: check
+CVE-2024-4487 (The Blocksy Companion plugin for WordPress is vulnerable to Stored Cro ...)
+ TODO: check
+CVE-2024-4430 (The Beaver Builder \u2013 WordPress Page Builder plugin for WordPress ...)
+ TODO: check
+CVE-2024-4417 (The Falang multilanguage for WordPress plugin for WordPress is vulnera ...)
+ TODO: check
+CVE-2024-4413 (The Hotel Booking Lite plugin for WordPress is vulnerable to PHP Objec ...)
+ TODO: check
+CVE-2024-4329 (The Thim Elementor Kit plugin for WordPress is vulnerable to Stored Cr ...)
+ TODO: check
+CVE-2024-4213 (The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable ...)
+ TODO: check
+CVE-2024-4209 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Feature ...)
+ TODO: check
+CVE-2024-4046 (Cracking vulnerability in the OS security module Impact: Successful ex ...)
+ TODO: check
+CVE-2024-3055 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) ...)
+ TODO: check
+CVE-2024-32999 (Cracking vulnerability in the OS security module Impact: Successful ex ...)
+ TODO: check
+CVE-2024-32998 (NULL pointer access vulnerability in the clock module Impact: Successf ...)
+ TODO: check
+CVE-2024-32997 (Race condition vulnerability in the binder driver module Impact: Succe ...)
+ TODO: check
+CVE-2024-32996 (Privilege escalation vulnerability in the account module Impact: Succe ...)
+ TODO: check
+CVE-2024-32995 (Denial of service (DoS) vulnerability in the AMS module Impact: Succes ...)
+ TODO: check
+CVE-2024-32993 (Out-of-bounds access vulnerability in the memory module Impact: Succes ...)
+ TODO: check
+CVE-2024-32992 (Insufficient verification vulnerability in the baseband module Impact: ...)
+ TODO: check
+CVE-2024-32991 (Permission verification vulnerability in the wpa_supplicant module Imp ...)
+ TODO: check
+CVE-2024-32990 (Permission verification vulnerability in the system sharing pop-up mod ...)
+ TODO: check
+CVE-2024-32989 (Insufficient verification vulnerability in the system sharing pop-up m ...)
+ TODO: check
+CVE-2024-28761 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 thr ...)
+ TODO: check
+CVE-2024-28760 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 12.0.1.0 thr ...)
+ TODO: check
+CVE-2024-27460 (A privilege escalation exists in the updater for Plantronics Hub 3.25. ...)
+ TODO: check
+CVE-2023-5447 (Missing lock check in SynHsaService may create a use-after-free condit ...)
+ TODO: check
+CVE-2023-52721 (The WindowManager module has a vulnerability in permission control. Im ...)
+ TODO: check
+CVE-2023-52720 (Race condition vulnerability in the soundtrigger module Impact: Succes ...)
+ TODO: check
+CVE-2023-52719 (Privilege escalation vulnerability in the PMS module Impact: Successfu ...)
+ TODO: check
+CVE-2023-52384 (Double-free vulnerability in the RSMC module Impact: Successful exploi ...)
+ TODO: check
+CVE-2023-52383 (Double-free vulnerability in the RSMC module Impact: Successful exploi ...)
+ TODO: check
+CVE-2023-47712 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a local u ...)
+ TODO: check
+CVE-2023-47711 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow an authen ...)
+ TODO: check
+CVE-2023-47709 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a remote ...)
+ TODO: check
CVE-2024-4735 (A vulnerability has been found in Campcodes Legal Case Management Syst ...)
NOT-FOR-US: Campcodes Legal Case Management System
CVE-2024-4732 (A vulnerability, which was classified as problematic, has been found i ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240511/aee53c61/attachment.htm>
More information about the debian-security-tracker-commits
mailing list