[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 8 08:13:28 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
44d32c39 by security tracker role at 2024-11-08T08:12:41+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,166 +1,244 @@
-CVE-2024-50211 [udf: refactor inode_bmap() to handle error]
+CVE-2024-8810 (A GitHub App installed in organizations could upgrade some permissions ...)
+	TODO: check
+CVE-2024-8424 (Improper Privilege Management vulnerability in WatchGuard EPDR, Panda  ...)
+	TODO: check
+CVE-2024-7982 (The Registrations for the Events Calendar  WordPress plugin before 2.1 ...)
+	TODO: check
+CVE-2024-51998 (changedetection.io is a free open source web page change detection too ...)
+	TODO: check
+CVE-2024-51987 (Duende.AccessTokenManagement.OpenIdConnect is a set of .NET libraries  ...)
+	TODO: check
+CVE-2024-51434 (Inconsistent <plaintext> tag parsing allows for XSS in Froala WYSIWYG  ...)
+	TODO: check
+CVE-2024-50766 (SourceCodester Survey Application System 1.0 is vulnerable to SQL Inje ...)
+	TODO: check
+CVE-2024-50599 (A reflected Cross-Site Scripting (XSS) vulnerability has been identifi ...)
+	TODO: check
+CVE-2024-49524 (Adobe Experience Manager versions 6.5.20 and earlier are affected by a ...)
+	TODO: check
+CVE-2024-49523 (Adobe Experience Manager versions 6.5.20 and earlier are affected by a ...)
+	TODO: check
+CVE-2024-48011 (Dell PowerProtect DD, versions prior to 7.7.5.50, contains an Exposure ...)
+	TODO: check
+CVE-2024-48010 (Dell PowerProtect DD, versions prior to 8.1.0.0, 7.13.1.10, 7.10.1.40, ...)
+	TODO: check
+CVE-2024-47072 (XStream is a simple library to serialize objects to XML and back again ...)
+	TODO: check
+CVE-2024-46961 (The Inshot com.downloader.privatebrowser (aka Video Downloader - XDown ...)
+	TODO: check
+CVE-2024-46960 (The ASD com.rocks.video.downloader (aka HD Video Downloader All Format ...)
+	TODO: check
+CVE-2024-45759 (Dell PowerProtect Data Domain, versions prior to 8.1.0.0, 7.13.1.10, 7 ...)
+	TODO: check
+CVE-2024-36064 (The NLL com.nll.cb (aka ACR Phone) application through 0.330-playStore ...)
+	TODO: check
+CVE-2024-36063 (The Goodwy com.goodwy.dialer (aka Right Dialer) application through 5. ...)
+	TODO: check
+CVE-2024-36062 (The com.callassistant.android (aka AI Call Assistant & Screener) appli ...)
+	TODO: check
+CVE-2024-24409 (Zohocorp ManageEngine ADManager Plus versions 7203 and prior are vulne ...)
+	TODO: check
+CVE-2024-21538 (Versions of the package cross-spawn before 7.0.5 are vulnerable to Reg ...)
+	TODO: check
+CVE-2024-11000 (A vulnerability classified as problematic was found in CodeAstro Real  ...)
+	TODO: check
+CVE-2024-10999 (A vulnerability classified as problematic has been found in CodeAstro  ...)
+	TODO: check
+CVE-2024-10998 (A vulnerability was found in 1000 Projects Bookstore Management System ...)
+	TODO: check
+CVE-2024-10997 (A vulnerability was found in 1000 Projects Bookstore Management System ...)
+	TODO: check
+CVE-2024-10996 (A vulnerability was found in 1000 Projects Bookstore Management System ...)
+	TODO: check
+CVE-2024-10995 (A vulnerability was found in Codezips Hospital Appointment System 1.0  ...)
+	TODO: check
+CVE-2024-10994 (A vulnerability has been found in Codezips Online Institute Management ...)
+	TODO: check
+CVE-2024-10993 (A vulnerability, which was classified as critical, was found in Codezi ...)
+	TODO: check
+CVE-2024-10991 (A vulnerability, which was classified as critical, has been found in C ...)
+	TODO: check
+CVE-2024-10990 (A vulnerability classified as critical was found in SourceCodester Onl ...)
+	TODO: check
+CVE-2024-10989 (A vulnerability classified as critical has been found in code-projects ...)
+	TODO: check
+CVE-2024-10988 (A vulnerability was found in code-projects E-Health Care System 1.0. I ...)
+	TODO: check
+CVE-2024-10987 (A vulnerability was found in code-projects E-Health Care System 1.0. I ...)
+	TODO: check
+CVE-2024-10975 (Nomad Community and Nomad Enterprise ("Nomad") volume specification is ...)
+	TODO: check
+CVE-2024-10824 (An authorization bypass vulnerability was identified in GitHub Enterpr ...)
+	TODO: check
+CVE-2024-10621 (The Simple Shortcode for Google Maps plugin for WordPress is vulnerabl ...)
+	TODO: check
+CVE-2024-10269 (The Easy SVG Support plugin for WordPress is vulnerable to Stored Cros ...)
+	TODO: check
+CVE-2024-10007 (A path collision and arbitrary code execution vulnerability was identi ...)
+	TODO: check
+CVE-2024-50211 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.11.6-1
 	NOTE: https://git.kernel.org/linus/c226964ec786f3797ed389a16392ce4357697d24 (6.12-rc2)
-CVE-2024-50210 [posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()]
+CVE-2024-50210 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.6-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/6e62807c7fbb3c758d233018caf94dfea9c65dbd (6.12-rc5)
-CVE-2024-50209 [RDMA/bnxt_re: Add a check for memory allocation]
+CVE-2024-50209 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.6-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/c5c1ae73b7741fa3b58e6e001b407825bb971225 (6.12-rc4)
-CVE-2024-50208 [RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages]
+CVE-2024-50208 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.6-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/7988bdbbb85ac85a847baf09879edcd0f70521dc (6.12-rc4)
-CVE-2024-50207 [ring-buffer: Fix reader locking when changing the sub buffer order]
+CVE-2024-50207 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.6-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/09661f75e75cb6c1d2d8326a70c311d46729235f (6.12-rc4)
-CVE-2024-50206 [net: ethernet: mtk_eth_soc: fix memory corruption during fq dma init]
+CVE-2024-50206 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.6-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/88806efc034a9830f483963326b99930ad519af1 (6.12-rc4)
-CVE-2024-50205 [ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()]
+CVE-2024-50205 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.6-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/72cafe63b35d06b5cfbaf807e90ae657907858da (6.12-rc5)
-CVE-2024-50204 [fs: don't try and remove empty rbtree node]
+CVE-2024-50204 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.6-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/229fd15908fe1f99b1de4cde3326e62d1e892611 (6.12-rc5)
-CVE-2024-50203 [bpf, arm64: Fix address emission with tag-based KASAN enabled]
+CVE-2024-50203 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.6-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a552e2ef5fd1a6c78267cd4ec5a9b49aa11bbb1c (6.12-rc5)
-CVE-2024-50202 [nilfs2: propagate directory read errors from nilfs_find_entry()]
+CVE-2024-50202 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/08cfa12adf888db98879dbd735bc741360a34168 (6.12-rc4)
-CVE-2024-50201 [drm/radeon: Fix encoder->possible_clones]
+CVE-2024-50201 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/28127dba64d8ae1a0b737b973d6d029908599611 (6.12-rc4)
-CVE-2024-50200 [maple_tree: correct tree corruption on spanning store]
+CVE-2024-50200 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bea07fd63192b61209d48cbb81ef474cc3ee4c62 (6.12-rc4)
-CVE-2024-50199 [mm/swapfile: skip HugeTLB pages for unuse_vma]
+CVE-2024-50199 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/7528c4fb1237512ee18049f852f014eba80bbe8d (6.12-rc4)
-CVE-2024-50198 [iio: light: veml6030: fix IIO device retrieval from embedded device]
+CVE-2024-50198 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/c7c44e57750c31de43906d97813273fdffcf7d02 (6.12-rc4)
-CVE-2024-50197 [pinctrl: intel: platform: fix error path in device_for_each_child_node()]
+CVE-2024-50197 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.5-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/16a6d2e685e8f9a2f51dd5a363d3f97fcad35e22 (6.12-rc4)
-CVE-2024-50196 [pinctrl: ocelot: fix system hang on level based interrupts]
+CVE-2024-50196 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/93b8ddc54507a227087c60a0013ed833b6ae7d3c (6.12-rc4)
-CVE-2024-50195 [posix-clock: Fix missing timespec64 check in pc_clock_settime()]
+CVE-2024-50195 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/d8794ac20a299b647ba9958f6d657051fc51a540 (6.12-rc4)
-CVE-2024-50194 [arm64: probes: Fix uprobes for big-endian kernels]
+CVE-2024-50194 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/13f8f1e05f1dc36dbba6cba0ae03354c0dafcde7 (6.12-rc4)
-CVE-2024-50193 [x86/entry_32: Clear CPU buffers after register restore in NMI return]
+CVE-2024-50193 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/48a2440d0f20c826b884e04377ccc1e4696c84e9 (6.12-rc4)
-CVE-2024-50192 [irqchip/gic-v4: Don't allow a VMOVP on a dying VPE]
+CVE-2024-50192 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.5-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/1442ee0011983f0c5c4b92380e6853afb513841a (6.12-rc4)
-CVE-2024-50191 [ext4: don't set SB_RDONLY after filesystem errors]
+CVE-2024-50191 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/d3476f3dad4ad68ae5f6b008ea6591d1520da5d8 (6.12-rc1)
-CVE-2024-50190 [ice: fix memleak in ice_init_tx_topology()]
+CVE-2024-50190 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c188afdc36113760873ec78cbc036f6b05f77621 (6.12-rc3)
-CVE-2024-50189 [HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()]
+CVE-2024-50189 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c56f9ecb7fb6a3a90079c19eb4c8daf3bbf514b3 (6.12-rc4)
-CVE-2024-50188 [net: phy: dp83869: fix memory corruption when enabling fiber]
+CVE-2024-50188 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/a842e443ca8184f2dc82ab307b43a8b38defd6a5 (6.12-rc3)
-CVE-2024-50187 [drm/vc4: Stop the active perfmon before being destroyed]
+CVE-2024-50187 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/0b2ad4f6f2bec74a5287d96cb2325a5e11706f22 (6.12-rc3)
-CVE-2024-50186 [net: explicitly clear the sk pointer, when pf->create fails]
+CVE-2024-50186 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/631083143315d1b192bd7d915b967b37819e88ea (6.12-rc3)
-CVE-2024-50185 [mptcp: handle consistently DSS corruption]
+CVE-2024-50185 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/e32d262c89e2b22cb0640223f953b548617ed8a6 (6.12-rc3)
-CVE-2024-50184 [virtio_pmem: Check device status before requesting flush]
+CVE-2024-50184 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/e25fbcd97cf52c3c9824d44b5c56c19673c3dd50 (6.12-rc1)
-CVE-2024-50183 [scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance]
+CVE-2024-50183 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/0a3c84f71680684c1d41abb92db05f95c09111e8 (6.12-rc1)
-CVE-2024-50182 [secretmem: disable memfd_secret() if arch cannot set direct map]
+CVE-2024-50182 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/532b53cebe58f34ce1c0f34d866f5c0e335c53c6 (6.12-rc3)
-CVE-2024-50181 [clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D]
+CVE-2024-50181 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/a54c441b46a0745683c2eef5a359d22856d27323 (6.12-rc1)
-CVE-2024-50180 [fbdev: sisfb: Fix strbuf array overflow]
+CVE-2024-50180 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/9cf14f5a2746c19455ce9cb44341b5527b5e19c3 (6.12-rc1)
-CVE-2024-50179 [ceph: remove the incorrect Fw reference check when dirtying pages]
+CVE-2024-50179 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/c08dfb1b49492c09cf13838c71897493ea3b424e (6.12-rc1)
-CVE-2024-50178 [cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request()]
+CVE-2024-50178 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/2b7ec33e534f7a10033a5cf07794acf48b182bbe (6.12-rc1)
-CVE-2024-50177 [drm/amd/display: fix a UBSAN warning in DML2.1]
+CVE-2024-50177 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/eaf3adb8faab611ba57594fa915893fc93a7788c (6.12-rc1)
-CVE-2024-50176 [remoteproc: k3-r5: Fix error handling when power-up failed]
+CVE-2024-50176 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9ab27eb5866ccbf57715cfdba4b03d57776092fb (6.12-rc1)
-CVE-2024-50175 [media: qcom: camss: Remove use_count guard in stop_streaming]
+CVE-2024-50175 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/25f18cb1b673220b76a86ebef8e7fb79bd303b27 (6.12-rc1)
-CVE-2024-50174 [drm/panthor: Fix race when converting group handle to group object]
+CVE-2024-50174 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cac075706f298948898b1f63e81709df42afa75d (6.12-rc2)
-CVE-2024-50173 [drm/panthor: Fix access to uninitialized variable in tick_ctx_cleanup()]
+CVE-2024-50173 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -2860,6 +2938,7 @@ CVE-2024-44301 (The issue was addressed with improved checks. This issue is fixe
 CVE-2024-44297 (The issue was addressed with improved bounds checks. This issue is fix ...)
 	NOT-FOR-US: Apple
 CVE-2024-44296 (The issue was addressed with improved checks. This issue is fixed in t ...)
+	{DSA-5804-1}
 	- webkit2gtk 2.46.3-1
 	[buster] - webkit2gtk <end-of-life> (EOL in buster LTS)
 	- wpewebkit 2.46.3-1
@@ -2937,6 +3016,7 @@ CVE-2024-44251 (This issue was addressed through improved state management. This
 CVE-2024-44247 (The issue was addressed with improved checks. This issue is fixed in m ...)
 	NOT-FOR-US: Apple
 CVE-2024-44244 (A memory corruption issue was addressed with improved input validation ...)
+	{DSA-5804-1}
 	- webkit2gtk 2.46.3-1
 	[buster] - webkit2gtk <end-of-life> (EOL in buster LTS)
 	- wpewebkit 2.46.3-1
@@ -133145,8 +133225,8 @@ CVE-2023-27197 (PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can
 	NOT-FOR-US: PAX
 CVE-2023-27196
 	RESERVED
-CVE-2023-27195
-	RESERVED
+CVE-2023-27195 (Trimble TM4Web 22.2.0 allows unauthenticated attackers to access /inc/ ...)
+	TODO: check
 CVE-2023-27194
 	RESERVED
 CVE-2023-27193 (An issue found in DUALSPACE v.1.1.3 allows a local attacker to gain pr ...)
@@ -360703,14 +360783,14 @@ CVE-2020-9008 (Stored Cross-site scripting (XSS) vulnerability in Blackboard Lea
 	NOT-FOR-US: Blackboard Learn/PeopleTool
 CVE-2019-20473 (An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.865 ...)
 	NOT-FOR-US: TK-Star Q90 Junior GPS horloge
-CVE-2019-20472
-	RESERVED
+CVE-2019-20472 (An issue was discovered on One2Track 2019-12-08 devices. Any SIM card  ...)
+	TODO: check
 CVE-2019-20471 (An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.865 ...)
 	NOT-FOR-US: TK-Star Q90 Junior GPS horloge
 CVE-2019-20470 (An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.865 ...)
 	NOT-FOR-US: TK-Star Q90 Junior GPS horloge
-CVE-2019-20469
-	RESERVED
+CVE-2019-20469 (An issue was discovered on One2Track 2019-12-08 devices. Confidential  ...)
+	TODO: check
 CVE-2019-20468 (An issue was discovered in SeTracker2 for TK-Star Q90 Junior GPS horlo ...)
 	NOT-FOR-US: TK-Star Q90 Junior GPS horloge
 CVE-2019-20467 (An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2  ...)
@@ -360723,12 +360803,12 @@ CVE-2019-20464 (An issue was discovered on Sannce Smart HD Wifi Security Camera
 	NOT-FOR-US: Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices
 CVE-2019-20463 (An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2  ...)
 	NOT-FOR-US: Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices
-CVE-2019-20462
-	RESERVED
-CVE-2019-20461
-	RESERVED
-CVE-2019-20460
-	RESERVED
+CVE-2019-20462 (An issue was discovered on Alecto IVM-100 2019-11-12 devices. The devi ...)
+	TODO: check
+CVE-2019-20461 (An issue was discovered on Alecto IVM-100 2019-11-12 devices. The devi ...)
+	TODO: check
+CVE-2019-20460 (An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 de ...)
+	TODO: check
 CVE-2019-20459 (An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 de ...)
 	NOT-FOR-US: Epson Expression Home XP255
 CVE-2019-20458 (An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 de ...)
@@ -363298,8 +363378,8 @@ CVE-2020-8009 (AVB MOTU devices through 2020-01-22 allow /.. Directory Traversal
 	NOT-FOR-US: AVB MOTU devices
 CVE-2020-8008
 	RESERVED
-CVE-2020-8007
-	RESERVED
+CVE-2020-8007 (The pwrstudio web application of EV Charger (in the server in Circontr ...)
+	TODO: check
 CVE-2020-8006 (The server in Circontrol Raption through 5.11.2 has a pre-authenticati ...)
 	NOT-FOR-US: Circontrol Raption
 CVE-2020-8005



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/44d32c398c76ed80e7e279b4c213f65d7a55df26

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/44d32c398c76ed80e7e279b4c213f65d7a55df26
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241108/36670ce1/attachment.htm>


More information about the debian-security-tracker-commits mailing list