Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1023a8b7 by security tracker role at 2023-12-28T08:11:37+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,65 @@
+CVE-2023-7124 (A vulnerability, which was classified as problematic, was found 
in cod ...)
+       TODO: check
+CVE-2023-7123 (A vulnerability, which was classified as critical, has been 
found in S ...)
+       TODO: check
+CVE-2023-6879 (Increasing the resolution of video frames, while performing a 
multi-th ...)
+       TODO: check
+CVE-2023-51084 (hyavijava v6.0.07.1 was discovered to contain a stack overflow 
via the ...)
+       TODO: check
+CVE-2023-51080 (The NumberUtil.toBigDecimal method in hutool-core v5.8.23 was 
discover ...)
+       TODO: check
+CVE-2023-51079 (A TimeOut error exists in the ParseTools.subCompileExpression 
method i ...)
+       TODO: check
+CVE-2023-51075 (hutool-core v5.8.23 was discovered to contain an infinite loop 
in the  ...)
+       TODO: check
+CVE-2023-51074 (json-path v2.8.0 was discovered to contain a stack overflow 
via the Cr ...)
+       TODO: check
+CVE-2023-51010 (An issue in the export component AdSdkH5Activity of 
com.sdjictec.qdmet ...)
+       TODO: check
+CVE-2023-51006 (An issue in the openFile method of Chinese Perpetual Calendar 
v9.0.0 a ...)
+       TODO: check
+CVE-2023-50692 (File Upload vulnerability in JIZHICMS v.2.5, allows remote 
attacker to ...)
+       TODO: check
+CVE-2023-50445 (Shell Injection vulnerability GL.iNet A1300 v4.4.6, AX1800 
v4.4.6, AXT ...)
+       TODO: check
+CVE-2023-50038 (There is an arbitrary file upload vulnerability in the 
background of t ...)
+       TODO: check
+CVE-2023-49469 (Reflected Cross Site Scripting (XSS) vulnerability in Shaarli 
v0.12.2, ...)
+       TODO: check
+CVE-2023-49230 (An issue was discovered in Peplink Balance Two before 8.4.0. A 
missing ...)
+       TODO: check
+CVE-2023-49229 (An issue was discovered in Peplink Balance Two before 8.4.0. A 
missing ...)
+       TODO: check
+CVE-2023-49228 (An issue was discovered in Peplink Balance Two before 8.4.0. 
Console p ...)
+       TODO: check
+CVE-2023-49003 (An issue in simplemobiletools Simple Dialer 5.18.1 allows an 
attacker  ...)
+       TODO: check
+CVE-2023-49002 (An issue in Xenom Technologies (sinous) Phone Dialer-voice 
Call Dialer ...)
+       TODO: check
+CVE-2023-49001 (An issue in Indi Browser (aka kvbrowser) v.12.11.23 allows an 
attacker ...)
+       TODO: check
+CVE-2023-49000 (An issue in ArtistScope ArtisBrowser v.34.1.5 and before 
allows an att ...)
+       TODO: check
+CVE-2023-47883 (The com.altamirano.fabricio.tvbrowser TV browser application 
through 4 ...)
+       TODO: check
+CVE-2023-47882 (The Kami Vision YI IoT com.yunyi.smartcamera application 
through 4.1.9 ...)
+       TODO: check
+CVE-2023-46989 (SQL Injection vulnerability in the Innovadeluxe Quick Order 
module for ...)
+       TODO: check
+CVE-2023-46919 (Phlox com.phlox.simpleserver (aka Simple HTTP Server) 1.8 and 
com.phlo ...)
+       TODO: check
+CVE-2023-46918 (Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server 
PLUS) 1.8.1- ...)
+       TODO: check
+CVE-2023-45702 (An HCL UrbanCode Deploy Agent installed as a Windows service 
in a non- ...)
+       TODO: check
+CVE-2023-45701 (HCL Launch could allow a remote attacker to obtain sensitive 
informati ...)
+       TODO: check
+CVE-2023-43955 (The com.phlox.tvwebbrowser TV Bro application through 2.0.0 
for Androi ...)
+       TODO: check
+CVE-2023-43481 (An issue in Shenzhen TCL Browser TV Web BrowseHere (aka 
com.tcl.browse ...)
+       TODO: check
+CVE-2023-34829 (Incorrect access control in TP-Link Tapo before v3.1.315 
allows attack ...)
+       TODO: check
 CVE-2023-7116 (A vulnerability, which was classified as critical, has been 
found in W ...)
        NOT-FOR-US: WeiYe-Jing datax-web
 CVE-2023-6531
@@ -11616,6 +11678,7 @@ CVE-2023-5625 (A regression was introduced in the Red 
Hat build of python-eventl
        - python-eventlet <not-affected> (Red Hat-specific regression)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2244717
 CVE-2023-39333
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1054892)
        [bullseye] - nodejs <not-affected> (Only affects 18.x and later)
        [buster] - nodejs <not-affected> (Only affects 18.x and later)
@@ -12433,6 +12496,7 @@ CVE-2023-39277 (SonicOS post-authentication stack-based 
buffer overflow vulnerab
 CVE-2023-39276 (SonicOS post-authentication stack-based buffer overflow 
vulnerability  ...)
        NOT-FOR-US: SonicOS
 CVE-2023-38552 (When the Node.js policy feature checks the integrity of a 
resource aga ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1054892)
        [bullseye] - nodejs <not-affected> (Only affects 18.x and later)
        [buster] - nodejs <not-affected> (Only affects 18.x and later)
@@ -22771,6 +22835,7 @@ CVE-2023-33242 (Crypto wallets implementing the 
Lindell17 TSS protocol might all
 CVE-2023-33241 (Crypto wallets implementing the GG18 or GG20 TSS protocol 
might allow  ...)
        NOT-FOR-US: Crypto wallets implementing the GG18 or GG20 TSS protocol
 CVE-2023-32559 (A privilege escalation vulnerability exists in the 
experimental policy ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1050739)
        [bullseye] - nodejs <ignored> (Only affects experimental policy 
manifests)
        [buster] - nodejs <not-affected> (v10.x doesn't support policy 
manifests)
@@ -22781,6 +22846,7 @@ CVE-2023-32558 (The use of the deprecated API 
`process.binding()` can bypass the
        - nodejs <not-affected> (Only affects 20.x and later)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#processbinding-can-bypass-the-permission-model-through-path-traversal-highcve-2023-32558
 CVE-2023-32006 (The use of `module.constructor.createRequire()` can bypass the 
policy  ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1050739)
        [bullseye] - nodejs <ignored> (Only affects experimental policy 
manifests)
        [buster] - nodejs <not-affected> (v10.x doesn't support policy 
manifests)
@@ -22797,6 +22863,7 @@ CVE-2023-32003 (`fs.mkdtemp()` and `fs.mkdtempSync()` 
can be used to bypass the
        - nodejs <not-affected> (Only affects 20.x and later)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#fsmkdtemp-and-fsmkdtempsync-are-missing-getvalidatedpath-checks-lowcve-2023-32003
 CVE-2023-32002 (The use of `Module._load()` can bypass the policy mechanism 
and requir ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1050739)
        [bullseye] - nodejs <ignored> (Only affects experimental policy 
manifests)
        [buster] - nodejs <not-affected> (v10.x doesn't support policy 
manifests)
@@ -36433,12 +36500,14 @@ CVE-2023-30592
 CVE-2023-30591 (Denial-of-service in NodeBB <= v2.8.10 allows unauthenticated 
attacker ...)
        NOT-FOR-US: NodeBB
 CVE-2023-30590 (The generateKeys() API function returned from 
crypto.createDiffieHellm ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1039990)
        [bullseye] - nodejs <ignored> (Minor issue, only updates documentation 
to clarify an API)
        [buster] - nodejs <postponed> (minor issue - Inconsistency Between 
Implementation and Documented Design)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#diffiehellman-do-not-generate-keys-after-setting-a-private-key-medium-cve-2023-30590
        NOTE: Fixed by: 
https://github.com/nodejs/node/commit/1a5c9284ebce5cd71cf7a3c29759a748c373ac85 
(v16.x)
 CVE-2023-30589 (The llhttp parser in the http module in Node v20.2.0 does not 
strictly ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1039990)
        [bullseye] - nodejs <no-dsa> (Minor issue, too intrusive to backport)
        [buster] - nodejs <not-affected> (llhttp dependency/embedding 
introduced in 12.x)
@@ -36448,6 +36517,7 @@ CVE-2023-30589 (The llhttp parser in the http module in 
Node v20.2.0 does not st
        NOTE: https://github.com/advisories/GHSA-cggh-pq45-6h9x
        NOTE: Fixed by: 
https://github.com/nodejs/node/commit/e42ff4b0180f4e0f5712364dd6ea015559640152 
(v16.x)
 CVE-2023-30588 (When an invalid public key is used to create an x509 
certificate using ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1039990)
        [bullseye] - nodejs <not-affected> (Vulnerable code not present)
        [buster] - nodejs <not-affected> (X509Certificate API introduced later)
@@ -36477,6 +36547,7 @@ CVE-2023-30582
        - nodejs <not-affected> (Vulnerable code introduced in 20.x)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#fswatchfile-bypass-in-experimental-permission-model-medium-cve-2023-30582
 CVE-2023-30581 (The use of __proto__ in process.mainModule.__proto__.require() 
can byp ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1039990)
        [bullseye] - nodejs <ignored> (Only affects experimental policy 
manifests)
        [buster] - nodejs <not-affected> (v10.x doesn't support policy 
manifests)
@@ -56896,11 +56967,12 @@ CVE-2023-0408
 CVE-2023-0407
        RESERVED
 CVE-2023-23920 (An untrusted search path vulnerability exists in Node.js. 
<19.6.1, <18 ...)
-       {DSA-5395-1 DLA-3344-1}
+       {DSA-5589-1 DSA-5395-1 DLA-3344-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1031834)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/#node-js-insecure-loading-of-icu-data-through-icu_data-environment-variable-low-cve-2023-23920
        NOTE: 
https://github.com/nodejs/node/commit/f369c0a739b9f0182ededa834a2a44e6fec322d1
 CVE-2023-23919 (A cryptographic vulnerability exists in Node.js <19.2.0, 
<18.14.1, <16 ...)
+       {DSA-5589-1}
        - nodejs 18.13.0+dfsg1-1.1 (bug #1031834)
        [bullseye] - nodejs <not-affected> (X509Certificate API introduced in 
v15.6.0)
        [buster] - nodejs <not-affected> (X509Certificate API introduced in 
v15.6.0)
@@ -56908,6 +56980,7 @@ CVE-2023-23919 (A cryptographic vulnerability exists in 
Node.js <19.2.0, <18.14.
        NOTE: https://hackerone.com/reports/1808596
        NOTE: 
https://github.com/nodejs/node/commit/438812e14d3b2a705fb639b69e37c6cc4e7c8029
 CVE-2023-23918 (A privilege escalation vulnerability exists in Node.js 
<19.6.1, <18.14 ...)
+       {DSA-5589-1}
        - nodejs 18.19.0+dfsg-2 (bug #1031834)
        [bullseye] - nodejs <not-affected> (Permissions policy introduced in 
v16.x)
        [buster] - nodejs <not-affected> (v10.x doesn't support policy 
manifests)
@@ -151068,9 +151141,9 @@ CVE-2021-43892 (Microsoft BizTalk ESB Toolkit 
Spoofing Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43891 (Visual Studio Code Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43890 (Windows AppX Installer Spoofing Vulnerability)
+CVE-2021-43890 (<p>We have investigated reports of a spoofing vulnerability in 
AppX in ...)
        NOT-FOR-US: Microsoft
-CVE-2021-43889 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-43889 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43888 (Microsoft Defender for IoT Information Disclosure 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -151084,7 +151157,7 @@ CVE-2021-43884
        RESERVED
 CVE-2021-43883 (Windows Installer Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43882 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-43882 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43881
        RESERVED
@@ -151096,7 +151169,7 @@ CVE-2021-43878
        RESERVED
 CVE-2021-43877 (ASP.NET Core and Visual Studio Elevation of Privilege 
Vulnerability)
        NOT-FOR-US: .NET core
-CVE-2021-43876 (Microsoft SharePoint Elevation of Privilege Vulnerability.)
+CVE-2021-43876 (Microsoft SharePoint Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43875 (Microsoft Office Graphics Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
@@ -154898,7 +154971,7 @@ CVE-2021-43244 (Windows Kernel Information Disclosure 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43243 (VP9 Video Extensions Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43242 (Microsoft SharePoint Server Spoofing Vulnerability This CVE ID 
is uniq ...)
+CVE-2021-43242 (Microsoft SharePoint Server Spoofing Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43241
        RESERVED
@@ -154910,9 +154983,9 @@ CVE-2021-43238 (Windows Remote Access Elevation of 
Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43237 (Windows Setup Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43236 (Microsoft Message Queuing Information Disclosure Vulnerability 
This CV ...)
+CVE-2021-43236 (Microsoft Message Queuing Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43235 (Storage Spaces Controller Information Disclosure Vulnerability 
This CV ...)
+CVE-2021-43235 (Storage Spaces Controller Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43234 (Windows Fax Service Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
@@ -154920,15 +154993,15 @@ CVE-2021-43233 (Remote Desktop Client Remote Code 
Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43232 (Windows Event Tracing Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43231 (Windows NTFS Elevation of Privilege Vulnerability This CVE ID 
is uniqu ...)
+CVE-2021-43231 (Windows NTFS Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43230 (Windows NTFS Elevation of Privilege Vulnerability This CVE ID 
is uniqu ...)
+CVE-2021-43230 (Windows NTFS Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43229 (Windows NTFS Elevation of Privilege Vulnerability This CVE ID 
is uniqu ...)
+CVE-2021-43229 (Windows NTFS Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43228 (SymCrypt Denial of Service Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-43227 (Storage Spaces Controller Information Disclosure Vulnerability 
This CV ...)
+CVE-2021-43227 (Storage Spaces Controller Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43226 (Windows Common Log File System Driver Elevation of Privilege 
Vulnerabi ...)
        NOT-FOR-US: Microsoft
@@ -154938,7 +155011,7 @@ CVE-2021-43224 (Windows Common Log File System Driver 
Information Disclosure Vul
        NOT-FOR-US: Microsoft
 CVE-2021-43223 (Windows Remote Access Connection Manager Elevation of 
Privilege Vulner ...)
        NOT-FOR-US: Microsoft
-CVE-2021-43222 (Microsoft Message Queuing Information Disclosure Vulnerability 
This CV ...)
+CVE-2021-43222 (Microsoft Message Queuing Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-43221 (Microsoft Edge (Chromium-based) Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
@@ -154950,7 +155023,7 @@ CVE-2021-43218
        RESERVED
 CVE-2021-43217 (Windows Encrypting File System (EFS) Remote Code Execution 
Vulnerabili ...)
        NOT-FOR-US: Microsoft
-CVE-2021-43216 (Microsoft Local Security Authority Server (lsasrv) Information 
Disclos ...)
+CVE-2021-43216 (Microsoft Local Security Authority (LSA) Server Information 
Disclosure ...)
        NOT-FOR-US: Microsoft
 CVE-2021-43215 (iSNS Server Memory Corruption Vulnerability Can Lead to Remote 
Code Ex ...)
        NOT-FOR-US: Microsoft
@@ -158560,7 +158633,7 @@ CVE-2021-42322 (Visual Studio Code Elevation of 
Privilege Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-42321 (Microsoft Exchange Server Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42320 (Microsoft SharePoint Server Spoofing Vulnerability This CVE ID 
is uniq ...)
+CVE-2021-42320 (Microsoft SharePoint Server Spoofing Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-42319 (Visual Studio Elevation of Privilege Vulnerability)
        NOT-FOR-US: Microsoft
@@ -158570,19 +158643,19 @@ CVE-2021-42317
        RESERVED
 CVE-2021-42316 (Microsoft Dynamics 365 (on-premises) Remote Code Execution 
Vulnerabili ...)
        NOT-FOR-US: Microsoft
-CVE-2021-42315 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-42315 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42314 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-42314 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42313 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-42313 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42312 (Microsoft Defender for IOT Elevation of Privilege 
Vulnerability)
+CVE-2021-42312 (Microsoft Defender for IoT Elevation of Privilege 
Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42311 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-42311 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42310 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-42310 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42309 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability This C ...)
+CVE-2021-42309 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-42308 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
        NOT-FOR-US: Microsoft
@@ -158612,7 +158685,7 @@ CVE-2021-42296 (Microsoft Word Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-42295 (Visual Basic for Applications Information Disclosure 
Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-42294 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability This C ...)
+CVE-2021-42294 (Microsoft SharePoint Server Remote Code Execution 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-42293 (Microsoft Jet Red Database Engine and Access Connectivity 
Engine Eleva ...)
        NOT-FOR-US: Microsoft
@@ -160992,7 +161065,7 @@ CVE-2021-41367 (NTFS Elevation of Privilege 
Vulnerability This CVE ID is unique
        NOT-FOR-US: Microsoft
 CVE-2021-41366 (Credential Security Support Provider Protocol (CredSSP) 
Elevation of P ...)
        NOT-FOR-US: Microsoft
-CVE-2021-41365 (Microsoft Defender for IoT Remote Code Execution Vulnerability 
This CV ...)
+CVE-2021-41365 (Microsoft Defender for IoT Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-41364
        RESERVED
@@ -161002,7 +161075,7 @@ CVE-2021-41362
        RESERVED
 CVE-2021-41361 (Active Directory Federation Server Spoofing Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-41360 (HEVC Video Extensions Remote Code Execution Vulnerability This 
CVE ID  ...)
+CVE-2021-41360 (HEVC Video Extensions Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-41359
        RESERVED
@@ -163409,9 +163482,9 @@ CVE-2021-40455 (Windows Installer Spoofing 
Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-40454 (Rich Text Edit Control Information Disclosure Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-40453 (HEVC Video Extensions Remote Code Execution Vulnerability This 
CVE ID  ...)
+CVE-2021-40453 (HEVC Video Extensions Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
-CVE-2021-40452 (HEVC Video Extensions Remote Code Execution Vulnerability This 
CVE ID  ...)
+CVE-2021-40452 (HEVC Video Extensions Remote Code Execution Vulnerability)
        NOT-FOR-US: Microsoft
 CVE-2021-40451
        RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1023a8b75256a37689dab41899990d0e58b22d86

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1023a8b75256a37689dab41899990d0e58b22d86
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to