[Git][security-tracker-team/security-tracker][master] Update Debian bug number reference for zabbix issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Nov 29 18:40:37 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f27d9534 by Salvatore Bonaccorso at 2024-11-29T19:40:05+01:00
Update Debian bug number reference for zabbix issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -279,28 +279,28 @@ CVE-2024-46055 (OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in
 CVE-2024-46054 (OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /uplo ...)
 	NOT-FOR-US: OpenVidReview
 CVE-2024-42333 (The researcher is showing that it is possible to leak a small amount o ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25629
 CVE-2024-42332 (The researcher is showing that due to the way the SNMP trap log is par ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25628
 CVE-2024-42331 (In the src/libs/zbxembed/browser.c file, the es_browser_ctor method re ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25627
 CVE-2024-42330 (The HttpRequest object allows to get the HTTP headers from the server' ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25626
 CVE-2024-42329 (The webdriver for the Browser object expects an error object to be ini ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: ttps://support.zabbix.com/browse/ZBX-25625
 CVE-2024-42328 (When the webdriver for the Browser object downloads data from a HTTP s ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25624
 CVE-2024-42327 (A non-admin user account on the Zabbix frontend with the default User  ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25623
 CVE-2024-42326 (There was discovered a use after free bug in browser.c in the es_brows ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25622
 CVE-2024-41126 (Contiki-NG is an open-source, cross-platform operating system for IoT  ...)
 	NOT-FOR-US: Contiki-NG
@@ -309,10 +309,10 @@ CVE-2024-41125 (Contiki-NG is an open-source, cross-platform operating system fo
 CVE-2024-37816 (Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack  ...)
 	NOT-FOR-US: Quectel
 CVE-2024-36468 (The reported vulnerability is a stack buffer overflow in the zbx_snmp_ ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25621
 CVE-2024-36464 (When exporting media types, the password is exported in the YAML in pl ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25630
 CVE-2024-31976 (EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker ...)
 	NOT-FOR-US: EnGenius EWS356-FIR
@@ -362,7 +362,7 @@ CVE-2024-50942 (qiwen-file v1.4.0 was discovered to contain a SQL injection vuln
 CVE-2024-43784 (lakeFS is an open-source tool that transforms object storage into a Gi ...)
 	NOT-FOR-US: lakeFS
 CVE-2024-36467 (An authenticated user with API access (e.g.: user with default User ro ...)
-	- zabbix <unfixed> (bug #1088688)
+	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25614
 CVE-2024-11820 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: code-projects Crud Operation System



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f27d9534335beeafc383b698c89e2d4775bbf0af

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f27d9534335beeafc383b698c89e2d4775bbf0af
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241129/fdfaaab1/attachment.htm>


More information about the debian-security-tracker-commits mailing list