Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8398ca3b by security tracker role at 2024-10-29T08:12:01+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,86 +1,290 @@
-CVE-2024-50088 [btrfs: fix uninitialized pointer free in add_inode_ref()]
+CVE-2024-51509 (Tiki through 27.0 allows users who have certain permissions to 
insert  ...)
+       TODO: check
+CVE-2024-51508 (Tiki through 27.0 allows users who have certain permissions to 
insert  ...)
+       TODO: check
+CVE-2024-51507 (Tiki through 27.0 allows users who have certain permissions to 
insert  ...)
+       TODO: check
+CVE-2024-51506 (Tiki through 27.0 allows users who have certain permissions to 
insert  ...)
+       TODO: check
+CVE-2024-50496 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Web a ...)
+       TODO: check
+CVE-2024-50495 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Widgi ...)
+       TODO: check
+CVE-2024-50494 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Amin  ...)
+       TODO: check
+CVE-2024-50493 (Unrestricted Upload of File with Dangerous Type vulnerability 
in maste ...)
+       TODO: check
+CVE-2024-50484 (Unrestricted Upload of File with Dangerous Type vulnerability 
in mahla ...)
+       TODO: check
+CVE-2024-50482 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Cheta ...)
+       TODO: check
+CVE-2024-50480 (Unrestricted Upload of File with Dangerous Type vulnerability 
in azexo ...)
+       TODO: check
+CVE-2024-48594 (File Upload vulnerability in Prison Management System v.1.0 
allows a r ...)
+       TODO: check
+CVE-2024-48357 (LyLme Spage 1.2.0 through 1.6.0 is vulnerable to SQL Injection 
via /ad ...)
+       TODO: check
+CVE-2024-48356 (LyLme Spage <=1.6.0 is vulnerable to SQL Injection via 
/admin/group.ph ...)
+       TODO: check
+CVE-2024-48178 (newbee-mall v1.0.0 is vulnerable to Server-Side Request 
Forgery (SSRF) ...)
+       TODO: check
+CVE-2024-48177 (MRCMS 3.1.2 contains a SQL injection vulnerability via the RID 
paramet ...)
+       TODO: check
+CVE-2024-48107 (SparkShop <=1.1.7 is vulnerable to server-side request forgery 
(SSRF). ...)
+       TODO: check
+CVE-2024-45656 (IBM Flexible Service Processor (FSP) FW860.00 through 
FW860.B3, FW950. ...)
+       TODO: check
+CVE-2024-44302 (The issue was addressed with improved checks. This issue is 
fixed in t ...)
+       TODO: check
+CVE-2024-44301 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44297 (The issue was addressed with improved bounds checks. This 
issue is fix ...)
+       TODO: check
+CVE-2024-44296 (The issue was addressed with improved checks. This issue is 
fixed in t ...)
+       TODO: check
+CVE-2024-44295 (This issue was addressed with additional entitlement checks. 
This issu ...)
+       TODO: check
+CVE-2024-44294 (A path deletion vulnerability was addressed by preventing 
vulnerable c ...)
+       TODO: check
+CVE-2024-44289 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-44287 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44285 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2024-44284 (An out-of-bounds write issue was addressed with improved input 
validat ...)
+       TODO: check
+CVE-2024-44283 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
+       TODO: check
+CVE-2024-44282 (An out-of-bounds read was addressed with improved input 
validation. Th ...)
+       TODO: check
+CVE-2024-44281 (An out-of-bounds read was addressed with improved input 
validation. Th ...)
+       TODO: check
+CVE-2024-44280 (A downgrade issue affecting Intel-based Mac computers was 
addressed wi ...)
+       TODO: check
+CVE-2024-44279 (An out-of-bounds read was addressed with improved input 
validation. Th ...)
+       TODO: check
+CVE-2024-44278 (An information disclosure issue was addressed with improved 
private da ...)
+       TODO: check
+CVE-2024-44277 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2024-44275 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44274 (The issue was addressed with improved authentication. This 
issue is fi ...)
+       TODO: check
+CVE-2024-44273 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2024-44270 (A logic issue was addressed with improved validation. This 
issue is fi ...)
+       TODO: check
+CVE-2024-44269 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-44267 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44265 (The issue was addressed by restricting options offered on a 
locked dev ...)
+       TODO: check
+CVE-2024-44264 (This issue was addressed with improved validation of symlinks. 
This is ...)
+       TODO: check
+CVE-2024-44263 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-44262 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-44261 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2024-44260 (This issue was addressed by removing the vulnerable code. This 
issue i ...)
+       TODO: check
+CVE-2024-44259 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-44258 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2024-44257 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-44256 (The issue was addressed with improved input sanitization. This 
issue i ...)
+       TODO: check
+CVE-2024-44255 (A path handling issue was addressed with improved logic. This 
issue is ...)
+       TODO: check
+CVE-2024-44254 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-44253 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44252 (A logic issue was addressed with improved file handling. This 
issue is ...)
+       TODO: check
+CVE-2024-44251 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-44247 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44244 (A memory corruption issue was addressed with improved input 
validation ...)
+       TODO: check
+CVE-2024-44240 (The issue was addressed with improved checks. This issue is 
fixed in t ...)
+       TODO: check
+CVE-2024-44239 (An information disclosure issue was addressed with improved 
private da ...)
+       TODO: check
+CVE-2024-44237 (An out-of-bounds access issue was addressed with improved 
bounds check ...)
+       TODO: check
+CVE-2024-44236 (An out-of-bounds access issue was addressed with improved 
bounds check ...)
+       TODO: check
+CVE-2024-44235 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
+       TODO: check
+CVE-2024-44229 (An information leakage was addressed with additional 
validation. This  ...)
+       TODO: check
+CVE-2024-44228 (This issue was addressed with improved permissions checking. 
This issu ...)
+       TODO: check
+CVE-2024-44222 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-44218 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2024-44217 (A permissions issue was addressed by removing vulnerable code 
and addi ...)
+       TODO: check
+CVE-2024-44216 (An access issue was addressed with additional sandbox 
restrictions. Th ...)
+       TODO: check
+CVE-2024-44215 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2024-44213 (An issue existed in the parsing of URLs. This issue was 
addressed with ...)
+       TODO: check
+CVE-2024-44208 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-44203 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-44197 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2024-44196 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-44194 (This issue was addressed with improved redaction of sensitive 
informat ...)
+       TODO: check
+CVE-2024-44175 (This issue was addressed with improved validation of symlinks. 
This is ...)
+       TODO: check
+CVE-2024-44174 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44159 (A path deletion vulnerability was addressed by preventing 
vulnerable c ...)
+       TODO: check
+CVE-2024-44156 (A path deletion vulnerability was addressed by preventing 
vulnerable c ...)
+       TODO: check
+CVE-2024-44155 (A custom URL scheme handling issue was addressed with improved 
input v ...)
+       TODO: check
+CVE-2024-44145 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-44144 (A buffer overflow was addressed with improved size validation. 
This is ...)
+       TODO: check
+CVE-2024-44137 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44126 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-44123 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-44122 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-42011 (The Spotify app 8.9.58 for iOS has a buffer overflow in its 
use of str ...)
+       TODO: check
+CVE-2024-40867 (A custom URL scheme handling issue was addressed with improved 
input v ...)
+       TODO: check
+CVE-2024-40855 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-40853 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2024-40851 (This issue was addressed by restricting options offered on a 
locked de ...)
+       TODO: check
+CVE-2024-40792 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2024-30106 (HCL Connections is vulnerable to an information disclosure 
vulnerabili ...)
+       TODO: check
+CVE-2024-27849 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2024-22065 (There is a command injection vulnerability in ZTE MF258 Pro 
product. D ...)
+       TODO: check
+CVE-2024-10479 (A vulnerability, which was classified as problematic, was 
found in Lin ...)
+       TODO: check
+CVE-2024-10478 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2024-10477 (A vulnerability classified as problematic was found in 
LinZhaoguan pb- ...)
+       TODO: check
+CVE-2024-10312 (The Exclusive Addons for Elementor plugin for WordPress is 
vulnerable  ...)
+       TODO: check
+CVE-2024-10008 (The Masteriyo LMS \u2013 eLearning and Online Course Builder 
for WordP ...)
+       TODO: check
+CVE-2024-10000 (The Masteriyo LMS \u2013 eLearning and Online Course Builder 
for WordP ...)
+       TODO: check
+CVE-2024-50088 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/66691c6e2f18d2aa4b22ffb624b9bdc97e9979e4 (6.12-rc4)
-CVE-2024-50087 [btrfs: fix uninitialized pointer free on read_alloc_one_name() 
error]
+CVE-2024-50087 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2ab5e243c2266c841e0f6904fad1514b18eaf510 (6.12-rc4)
-CVE-2024-50086 [ksmbd: fix user-after-free from session log off]
+CVE-2024-50086 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/7aa8804c0b67b3cb263a472d17f2cb50d7f1a930 (6.12-rc4)
-CVE-2024-50085 [mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow]
+CVE-2024-50085 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7decd1f5904a489d3ccdcf131972f94645681689 (6.12-rc4)
-CVE-2024-50084 [net: microchip: vcap api: Fix memory leaks in 
vcap_api_encode_rule_test()]
+CVE-2024-50084 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/217a3d98d1e9891a8b1438a27dfbc64ddf01f691 (6.12-rc4)
-CVE-2024-50083 [tcp: fix mptcp DSS corruption due to large pmtu xmit]
+CVE-2024-50083 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/4dabcdf581217e60690467a37c956a5b8dbc6bd9 (6.12-rc3)
-CVE-2024-50082 [blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function 
race]
+CVE-2024-50082 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/e972b08b91ef48488bae9789f03cfedb148667fb (6.12-rc4)
-CVE-2024-50081 [blk-mq: setup queue ->tag_set before initializing hctx]
+CVE-2024-50081 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/c25c0c9035bb8b28c844dfddeda7b8bdbcfcae95 (6.12-rc4)
-CVE-2024-50080 [ublk: don't allow user copy for unprivileged device]
+CVE-2024-50080 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/42aafd8b48adac1c3b20fe5892b1b91b80c1a1e6 (6.12-rc4)
-CVE-2024-50079 [io_uring/sqpoll: ensure task state is TASK_RUNNING when 
running task_work]
+CVE-2024-50079 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/8f7033aa4089fbaf7a33995f0f2ee6c9d7b9ca1b (6.12-rc4)
-CVE-2024-50078 [Bluetooth: Call iso_exit() on module unload]
+CVE-2024-50078 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/d458cd1221e9e56da3b2cc5518ad3225caa91f20 (6.12-rc4)
-CVE-2024-50077 [Bluetooth: ISO: Fix multiple init when debugfs is disabled]
+CVE-2024-50077 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/a9b7b535ba192c6b77e6c15a4c82d853163eab8c (6.12-rc4)
-CVE-2024-50076 [vt: prevent kernel-infoleak in con_font_get()]
+CVE-2024-50076 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/f956052e00de211b5c9ebaa1958366c23f82ee9e (6.12-rc4)
-CVE-2024-50075 [xhci: tegra: fix checked USB2 port number]
+CVE-2024-50075 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7d381137cb6ecf558ef6698c7730ddd482d4c8f2 (6.12-rc4)
-CVE-2024-50074 [parport: Proper fix for array out-of-bounds access]
+CVE-2024-50074 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/02ac3a9ef3a18b58d8f3ea2b6e46de657bf6c4f9 (6.12-rc4)
-CVE-2024-50073 [tty: n_gsm: Fix use-after-free in gsm_cleanup_mux]
+CVE-2024-50073 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/9462f4ca56e7d2430fdb6dcc8498244acbfc4489 (6.12-rc4)
-CVE-2024-50072 [x86/bugs: Use code segment selector for VERW operand]
+CVE-2024-50072 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
        - linux 6.11.5-1
        NOTE: 
https://git.kernel.org/linus/e4d2102018542e3ae5e297bc6e229303abff8a0f (6.12-rc4)
-CVE-2024-50071 [pinctrl: nuvoton: fix a double free in 
ma35_pinctrl_dt_node_to_map_func()]
+CVE-2024-50071 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3fd976afe9743110f20a23f93b7ff9693f2be4bf (6.12-rc4)
-CVE-2024-50070 [pinctrl: stm32: check devm_kasprintf() returned value]
+CVE-2024-50070 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b0f0e3f0552a566def55c844b0d44250c58e4df6 (6.12-rc4)
-CVE-2024-50069 [pinctrl: apple: check devm_kasprintf() returned value]
+CVE-2024-50069 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.11.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/665a58fe663ac7a9ea618dc0b29881649324b116 (6.12-rc4)
-CVE-2024-50068 [mm/damon/tests/sysfs-kunit.h: fix memory leak in 
damon_sysfs_test_add_targets()]
+CVE-2024-50068 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 6.11.5-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -22931,7 +23135,7 @@ CVE-2024-33519 (A vulnerability in the web-based 
management interface of HPE Aru
        NOT-FOR-US: HPE Aruba Networking EdgeConnect SD-WAN gateway
 CVE-2024-31977 (Adtran 834-5 11.1.0.101-202106231430, and fixed as of SmartOS 
Version  ...)
        NOT-FOR-US: Adtran 834-5
-CVE-2024-31971 (**UNSUPPORTED WHEN ASSIGNED** Multiple stored cross-site 
scripting (XS ...)
+CVE-2024-31971 (Multiple stored cross-site scripting (XSS) vulnerabilities on 
AdTran N ...)
        NOT-FOR-US: AdTran NetVanta 3120 devices
 CVE-2024-31970 (AdTran SRG 834-5 HDC17600021F1 devices (with SmartOS 11.1.1.1 
and fixe ...)
        NOT-FOR-US: Adtran 834-5 devices
@@ -24366,7 +24570,7 @@ CVE-2024-40516 (An issue in H3C Technologies Co., 
Limited H3C Magic RC3000 RC300
        NOT-FOR-US: H3C Magic RC3000 RC3000V100R009
 CVE-2024-40515 (An issue in SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro 
V16.03.29.4 ...)
        NOT-FOR-US: Tenda
-CVE-2024-40505 (**UNSUPPORTED WHEN ASSIGNED** Directory Traversal 
vulnerability in D-L ...)
+CVE-2024-40505 (Directory Traversal vulnerability in D-Link DAP-1650 Firmware 
v.1.03 a ...)
        NOT-FOR-US: D-Link
 CVE-2024-40503 (An issue in Tenda AX12 v.16.03.49.18_cn+ allows a remote 
attacker to c ...)
        NOT-FOR-US: Tenda
@@ -35079,7 +35283,8 @@ CVE-2024-37160 (Formwork is a flat file-based Content 
Management System (CMS). A
        NOT-FOR-US: Formwork CMS
 CVE-2024-36827 (An XML External Entity (XXE) vulnerability in the 
ebookmeta.get_metada ...)
        NOT-FOR-US: ebookmeta
-CVE-2024-36811 (An arbitrary file upload vulnerability in the image upload 
function of ...)
+CVE-2024-36811
+       REJECTED
        NOT-FOR-US: Aimeos
 CVE-2024-36792 (An issue in the implementation of the WPS in Netgear WNR614 
JNR1010V2/ ...)
        NOT-FOR-US: Netgear
@@ -61587,7 +61792,7 @@ CVE-2024-28131 (EasyRange Ver 1.41 contains an issue 
with the executable file se
        NOT-FOR-US: EasyRange
 CVE-2024-28126 (Cross-site scripting vulnerability exists in 0ch BBS Script 
ver.4.00.  ...)
        NOT-FOR-US: 0ch BBS Script
-CVE-2024-28093 (**UNSUPPORTED WHEN ASSIGNED** The TELNET service of AdTran 
NetVanta 31 ...)
+CVE-2024-28093 (The TELNET service of AdTran NetVanta 3120 18.01.01.00.E 
devices is en ...)
        NOT-FOR-US: AdTran NetVanta devices
 CVE-2024-28048 (OS command injection vulnerability exists in ffBull ver.4.11, 
which ma ...)
        NOT-FOR-US: ffBull



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8398ca3b29516429e44a2c9a4c7c654c91e33d8e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8398ca3b29516429e44a2c9a4c7c654c91e33d8e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to