Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
51ad0425 by security tracker role at 2025-01-15T20:11:52+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,305 @@
+CVE-2025-23040 (GitHub Desktop is an open-source Electron-based GitHub app 
designed fo ...)
+       TODO: check
+CVE-2025-22968 (An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker 
to execu ...)
+       TODO: check
+CVE-2025-22799 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2025-22798 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22797 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22795 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22793 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22788 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22787 (Missing Authorization vulnerability in bPlugins LLC Button 
Block allow ...)
+       TODO: check
+CVE-2025-22786 (Path Traversal vulnerability in ElementInvader ElementInvader 
Addons f ...)
+       TODO: check
+CVE-2025-22785 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2025-22784 (Cross-Site Request Forgery (CSRF) vulnerability in Johan 
Str\xf6m Back ...)
+       TODO: check
+CVE-2025-22782 (Unrestricted Upload of File with Dangerous Type vulnerability 
in Web R ...)
+       TODO: check
+CVE-2025-22781 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22780 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22779 (Missing Authorization vulnerability in Ugur CELIK WP News 
Sliders allo ...)
+       TODO: check
+CVE-2025-22778 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22776 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22773 (Insertion of Sensitive Information into Externally-Accessible 
File or  ...)
+       TODO: check
+CVE-2025-22769 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22766 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22765 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22764 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22762 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22761 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22760 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22759 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22758 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22755 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22754 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22753 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22752 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22751 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22750 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22749 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22748 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22747 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22746 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22745 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22744 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22743 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22742 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22738 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22737 (Missing Authorization vulnerability in MagePeople Team 
WpTravelly allo ...)
+       TODO: check
+CVE-2025-22736 (Incorrect Privilege Assignment vulnerability in WPExperts User 
Managem ...)
+       TODO: check
+CVE-2025-22734 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22731 (Cross-Site Request Forgery (CSRF) vulnerability in 
silverplugins217 Bu ...)
+       TODO: check
+CVE-2025-22729 (Missing Authorization vulnerability in Infomaniak Staff VOD 
Infomaniak ...)
+       TODO: check
+CVE-2025-22724 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22587 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22346 (Server-Side Request Forgery (SSRF) vulnerability in Faizaan 
Gagan Cour ...)
+       TODO: check
+CVE-2025-22329 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22317 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2025-22146 (Sentry is a developer-first error tracking and performance 
monitoring  ...)
+       TODO: check
+CVE-2025-21630 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2025-21629 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2025-21088 (Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x 
<= 10.0 ...)
+       TODO: check
+CVE-2025-21083 (Mattermost Mobile Apps versions <=2.22.0 fail to properly 
validate pos ...)
+       TODO: check
+CVE-2025-20088 (Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x 
<= 10.0 ...)
+       TODO: check
+CVE-2025-20086 (Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x 
<= 10.0 ...)
+       TODO: check
+CVE-2025-20036 (Mattermost Mobile Apps versions <=2.22.0 fail to properly 
validate pos ...)
+       TODO: check
+CVE-2025-0502 (Transmission of Private Resources into a New Sphere ('Resource 
Leak')  ...)
+       TODO: check
+CVE-2025-0501 (An issue in the native clients for Amazon WorkSpaces Clients 
when runn ...)
+       TODO: check
+CVE-2025-0500 (An issue in the native clients for Amazon WorkSpaces, Amazon 
AppStream ...)
+       TODO: check
+CVE-2025-0485 (A vulnerability was found in Fanli2012 native-php-cms 1.0. It 
has been ...)
+       TODO: check
+CVE-2025-0484 (A vulnerability was found in Fanli2012 native-php-cms 1.0 and 
classifi ...)
+       TODO: check
+CVE-2025-0483 (A vulnerability has been found in Fanli2012 native-php-cms 1.0 
and cla ...)
+       TODO: check
+CVE-2025-0482 (A vulnerability, which was classified as critical, was found in 
Fanli2 ...)
+       TODO: check
+CVE-2025-0481 (A vulnerability classified as problematic has been found in 
D-Link DIR ...)
+       TODO: check
+CVE-2025-0480 (A vulnerability classified as problematic has been found in 
wuzhicms 4 ...)
+       TODO: check
+CVE-2025-0193 (A stored Cross-site Scripting (XSS) vulnerability exists in the 
MGate  ...)
+       TODO: check
+CVE-2024-9636 (The Post Grid and Gutenberg Blocks plugin for WordPress is 
vulnerable  ...)
+       TODO: check
+CVE-2024-8603 (A \u201cUse of a Broken or Risky Cryptographic Algorithm\u201d 
vulnera ...)
+       TODO: check
+CVE-2024-7085 (Improper Neutralization of Input During Web Page Generation 
(XSS or 'C ...)
+       TODO: check
+CVE-2024-5198 (OpenVPN ovpn-dco for Windows version 1.1.1 allows an 
unprivileged loca ...)
+       TODO: check
+CVE-2024-57903 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-57902 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
+       TODO: check
+CVE-2024-57901 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
+       TODO: check
+CVE-2024-57900 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
+       TODO: check
+CVE-2024-57899 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-57898 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-57897 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-57896 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
+       TODO: check
+CVE-2024-57895 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
+       TODO: check
+CVE-2024-57894 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
+       TODO: check
+CVE-2024-57893 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
+       TODO: check
+CVE-2024-57892 (In the Linux kernel, the following vulnerability has been 
resolved:  o ...)
+       TODO: check
+CVE-2024-57891 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
+       TODO: check
+CVE-2024-57890 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2024-57889 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
+       TODO: check
+CVE-2024-57888 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
+       TODO: check
+CVE-2024-57887 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-57886 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-57885 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-57884 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-57883 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-57882 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
+       TODO: check
+CVE-2024-57857 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2024-57844 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
+       TODO: check
+CVE-2024-57841 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-57802 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-57801 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-57795 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2024-57025 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57024 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57023 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57022 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57021 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57020 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57019 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57018 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57017 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57016 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57015 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57014 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57013 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57012 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-57011 (TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to 
contain an O ...)
+       TODO: check
+CVE-2024-56295 (Missing Authorization vulnerability in Poll Maker Team Poll 
Maker allo ...)
+       TODO: check
+CVE-2024-54540 (The issue was addressed with improved input sanitization. This 
issue i ...)
+       TODO: check
+CVE-2024-54535 (A path handling issue was addressed with improved logic. This 
issue is ...)
+       TODO: check
+CVE-2024-54470 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2024-54031 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-53681 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-52783 (Insecure permissions in the XNetSocketClient component of 
XINJE XDPPro ...)
+       TODO: check
+CVE-2024-52005 (Git is a source code management tool. When cloning from a 
server (or f ...)
+       TODO: check
+CVE-2024-50954 (The XINJE XL5E-16T and XD5E-24R-E programmable logic 
controllers V3.5. ...)
+       TODO: check
+CVE-2024-50953 (An issue in XINJE XL5E-16T V3.7.2a allows attackers to cause a 
Denial  ...)
+       TODO: check
+CVE-2024-47140 (A cross-site scripting (xss) vulnerability exists in the 
add_alert_che ...)
+       TODO: check
+CVE-2024-47002 (A html code injection vulnerability exists in the vlan 
management part ...)
+       TODO: check
+CVE-2024-45061 (A cross-site scripting (xss) vulnerability exists in the 
weather map e ...)
+       TODO: check
+CVE-2024-44136 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-40854 (A memory initialization issue was addressed with improved 
memory handl ...)
+       TODO: check
+CVE-2024-40839 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2024-40771 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2024-39282 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
+       TODO: check
+CVE-2024-36476 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
+       TODO: check
+CVE-2024-35280 (A improper neutralization of input during web page generation 
('cross- ...)
+       TODO: check
+CVE-2024-27856 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2024-13351 (The Social proof testimonials and reviews by Repuso plugin for 
WordPre ...)
+       TODO: check
+CVE-2024-13215 (The Elementor Addon Elements plugin for WordPress is 
vulnerable to Sen ...)
+       TODO: check
+CVE-2024-12818 (The WP Smart TV plugin for WordPress is vulnerable to Stored 
Cross-Sit ...)
+       TODO: check
+CVE-2024-12593 (The PDF for WPForms + Drag and Drop Template Builder plugin 
for WordPr ...)
+       TODO: check
+CVE-2024-12423 (The Contact Form 7 Redirect & Thank You Page plugin for 
WordPress is v ...)
+       TODO: check
+CVE-2024-12403 (The Image Gallery \u2013 Responsive Photo Gallery plugin for 
WordPress ...)
+       TODO: check
+CVE-2024-12297 (Moxa\u2019s Ethernet switch EDS-508A Series, running firmware 
version  ...)
+       TODO: check
+CVE-2024-11851 (The NitroPack plugin for WordPress is vulnerable to 
unauthorized arbit ...)
+       TODO: check
+CVE-2024-11848 (The NitroPack plugin for WordPress is vulnerable to 
unauthorized modif ...)
+       TODO: check
+CVE-2024-11322 (A denial-of-service vulnerability exists in CyberPower 
PowerPanel Busi ...)
+       TODO: check
+CVE-2024-11029 (A flaw was found in the FreeIPA API audit, where it sends the 
whole Fr ...)
+       TODO: check
+CVE-2024-10775 (The Piotnet Addons For Elementor plugin for WordPress is 
vulnerable to ...)
+       TODO: check
 CVE-2025-23061 (Mongoose before 8.9.5 can improperly use a nested $where 
filter with a ...)
        NOT-FOR-US: Mongoose
 CVE-2025-23013 (In Yubico pam-u2f before 1.3.1, local privilege escalation can 
sometim ...)
@@ -92,43 +394,56 @@ CVE-2024-10254 (A potential buffer overflow vulnerability 
was reported in PC Man
        NOT-FOR-US: Lenovo
 CVE-2024-10253 (A potential TOCTOU vulnerability was reported in PC Manager, 
Lenovo Br ...)
        NOT-FOR-US: Lenovo
-CVE-2025-0448
+CVE-2025-0448 (Inappropriate implementation in Compositing in Google Chrome 
prior to  ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0447
+CVE-2025-0447 (Inappropriate implementation in Navigation in Google Chrome 
prior to 1 ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0446
+CVE-2025-0446 (Inappropriate implementation in Extensions in Google Chrome 
prior to 1 ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0443
+CVE-2025-0443 (Insufficient data validation in Extensions in Google Chrome 
prior to 1 ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0442
+CVE-2025-0442 (Inappropriate implementation in Payments in Google Chrome prior 
to 132 ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0441
+CVE-2025-0441 (Inappropriate implementation in Fenced Frames in Google Chrome 
prior t ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0440
+CVE-2025-0440 (Inappropriate implementation in Fullscreen in Google Chrome on 
Windows ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0439
+CVE-2025-0439 (Race in Frames in Google Chrome prior to 132.0.6834.83 allowed 
a remot ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0438
+CVE-2025-0438 (Stack buffer overflow in Tracing in Google Chrome prior to 
132.0.6834. ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0437
+CVE-2025-0437 (Out of bounds read in Metrics in Google Chrome prior to 
132.0.6834.83  ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0436
+CVE-2025-0436 (Integer overflow in Skia in Google Chrome prior to 
132.0.6834.83 allow ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0435
+CVE-2025-0435 (Inappropriate implementation in Navigation in Google Chrome on 
Android ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-0434
+CVE-2025-0434 (Out of bounds memory access in V8 in Google Chrome prior to 
132.0.6834 ...)
+       {DSA-5844-1}
        - chromium 132.0.6834.83-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-23366 (A flaw was found in the HAL Console in the Wildfly component, 
which do ...)
@@ -919,7 +1234,7 @@ CVE-2024-12085 (A flaw was found in the rsync daemon which 
could be triggered wh
        - rsync 3.3.0+ds1-3
        NOTE: https://www.openwall.com/lists/oss-security/2025/01/14/3
        NOTE: Fixed by: 
https://git.samba.org/?p=rsync.git;a=commit;h=589b0691e59f761ccb05ddb8e1124991440db2c7
 (v3.4.0)
-CVE-2024-12084
+CVE-2024-12084 (A heap-based buffer overflow flaw was found in the rsync 
daemon. This  ...)
        {DSA-5843-1}
        - rsync 3.3.0+ds1-3
        [bullseye] - rsync <not-affected> (Vulnerable code introduced later)
@@ -383530,8 +383845,8 @@ CVE-2020-8096 (Untrusted Search Path vulnerability in 
Bitdefender High-Level Ant
        NOT-FOR-US: Bitdefender
 CVE-2020-8095 (A vulnerability in the improper handling of junctions before 
deletion  ...)
        NOT-FOR-US: Bitdefender Total Security
-CVE-2020-8094
-       RESERVED
+CVE-2020-8094 (An untrusted search path vulnerability in testinitsigs.exe as 
used in  ...)
+       TODO: check
 CVE-2020-8093 (A vulnerability in the AntivirusforMac binary as used in 
Bitdefender A ...)
        NOT-FOR-US: Bitdefender Antivirus for Mac
 CVE-2020-8092 (A privilege escalation vulnerability in BDLDaemon as used in 
Bitdefend ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51ad042529d97919a677f816d4808ef6b116a67c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51ad042529d97919a677f816d4808ef6b116a67c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to