Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
06a1d63f by security tracker role at 2024-05-11T20:11:47+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,77 @@
+CVE-2024-4738 (A vulnerability was found in Campcodes Legal Case Management 
System 1. ...)
+       TODO: check
+CVE-2024-4737 (A vulnerability was found in Campcodes Legal Case Management 
System 1. ...)
+       TODO: check
+CVE-2024-4736 (A vulnerability was found in Campcodes Legal Case Management 
System 1. ...)
+       TODO: check
+CVE-2024-4630 (The Starter Templates \u2014 Elementor, WordPress & Beaver 
Builder Tem ...)
+       TODO: check
+CVE-2024-4574 (The Graphina \u2013 Elementor Charts and Graphs plugin for 
WordPress i ...)
+       TODO: check
+CVE-2024-4560 (The Kognetiks Chatbot for WordPress plugin for WordPress is 
vulnerable ...)
+       TODO: check
+CVE-2024-4487 (The Blocksy Companion plugin for WordPress is vulnerable to 
Stored Cro ...)
+       TODO: check
+CVE-2024-4430 (The Beaver Builder \u2013 WordPress Page Builder plugin for 
WordPress  ...)
+       TODO: check
+CVE-2024-4417 (The Falang multilanguage for WordPress plugin for WordPress is 
vulnera ...)
+       TODO: check
+CVE-2024-4413 (The Hotel Booking Lite plugin for WordPress is vulnerable to 
PHP Objec ...)
+       TODO: check
+CVE-2024-4329 (The Thim Elementor Kit plugin for WordPress is vulnerable to 
Stored Cr ...)
+       TODO: check
+CVE-2024-4213 (The Shopping Cart & eCommerce Store plugin for WordPress is 
vulnerable ...)
+       TODO: check
+CVE-2024-4209 (The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder 
Feature ...)
+       TODO: check
+CVE-2024-4046 (Cracking vulnerability in the OS security module Impact: 
Successful ex ...)
+       TODO: check
+CVE-2024-3055 (The Unlimited Elements For Elementor (Free Widgets, Addons, 
Templates) ...)
+       TODO: check
+CVE-2024-32999 (Cracking vulnerability in the OS security module Impact: 
Successful ex ...)
+       TODO: check
+CVE-2024-32998 (NULL pointer access vulnerability in the clock module Impact: 
Successf ...)
+       TODO: check
+CVE-2024-32997 (Race condition vulnerability in the binder driver module 
Impact: Succe ...)
+       TODO: check
+CVE-2024-32996 (Privilege escalation vulnerability in the account module 
Impact: Succe ...)
+       TODO: check
+CVE-2024-32995 (Denial of service (DoS) vulnerability in the AMS module 
Impact: Succes ...)
+       TODO: check
+CVE-2024-32993 (Out-of-bounds access vulnerability in the memory module 
Impact: Succes ...)
+       TODO: check
+CVE-2024-32992 (Insufficient verification vulnerability in the baseband module 
Impact: ...)
+       TODO: check
+CVE-2024-32991 (Permission verification vulnerability in the wpa_supplicant 
module Imp ...)
+       TODO: check
+CVE-2024-32990 (Permission verification vulnerability in the system sharing 
pop-up mod ...)
+       TODO: check
+CVE-2024-32989 (Insufficient verification vulnerability in the system sharing 
pop-up m ...)
+       TODO: check
+CVE-2024-28761 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 
12.0.1.0 thr ...)
+       TODO: check
+CVE-2024-28760 (IBM App Connect Enterprise 11.0.0.1 through 11.0.0.25 and 
12.0.1.0 thr ...)
+       TODO: check
+CVE-2024-27460 (A privilege escalation exists in the updater for Plantronics 
Hub 3.25. ...)
+       TODO: check
+CVE-2023-5447 (Missing lock check in SynHsaService may create a use-after-free 
condit ...)
+       TODO: check
+CVE-2023-52721 (The WindowManager module has a vulnerability in permission 
control. Im ...)
+       TODO: check
+CVE-2023-52720 (Race condition vulnerability in the soundtrigger module 
Impact: Succes ...)
+       TODO: check
+CVE-2023-52719 (Privilege escalation vulnerability in the PMS module Impact: 
Successfu ...)
+       TODO: check
+CVE-2023-52384 (Double-free vulnerability in the RSMC module Impact: 
Successful exploi ...)
+       TODO: check
+CVE-2023-52383 (Double-free vulnerability in the RSMC module Impact: 
Successful exploi ...)
+       TODO: check
+CVE-2023-47712 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a 
local u ...)
+       TODO: check
+CVE-2023-47711 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow 
an authen ...)
+       TODO: check
+CVE-2023-47709 (IBM Security Guardium 11.3, 11.4, 11.5, and 12.0 could allow a 
remote  ...)
+       TODO: check
 CVE-2024-4735 (A vulnerability has been found in Campcodes Legal Case 
Management Syst ...)
        NOT-FOR-US: Campcodes Legal Case Management System
 CVE-2024-4732 (A vulnerability, which was classified as problematic, has been 
found i ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06a1d63f9e1efa4eab9f0780b051baa8bd2f6539
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to