[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Mar 17 20:13:16 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
65af07a0 by security tracker role at 2025-03-17T20:12:35+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,195 @@
+CVE-2025-30143 (Rule 3000216 (before version 2) in Akamai App & API Protector (with Ak ...)
+	TODO: check
+CVE-2025-2401 (Buffer overflow vulnerability in Immunity Debugger affecting version 1 ...)
+	TODO: check
+CVE-2025-2392 (A vulnerability, which was classified as critical, has been found in c ...)
+	TODO: check
+CVE-2025-2391 (A vulnerability classified as critical was found in code-projects Bloo ...)
+	TODO: check
+CVE-2025-2390 (A vulnerability classified as critical has been found in code-projects ...)
+	TODO: check
+CVE-2025-2389 (A vulnerability was found in code-projects Blood Bank Management Syste ...)
+	TODO: check
+CVE-2025-2388 (A vulnerability was found in Keytop \u8def\u5185\u505c\u8f66\u6536\u8d ...)
+	TODO: check
+CVE-2025-2387 (A vulnerability was found in SourceCodester Online Food Ordering Syste ...)
+	TODO: check
+CVE-2025-2386 (A vulnerability was found in PHPGurukul Local Services Search Engine M ...)
+	TODO: check
+CVE-2025-2385 (A vulnerability has been found in code-projects Modern Bag 1.0 and cla ...)
+	TODO: check
+CVE-2025-2384 (A vulnerability, which was classified as critical, was found in code-p ...)
+	TODO: check
+CVE-2025-2383 (A vulnerability, which was classified as critical, has been found in P ...)
+	TODO: check
+CVE-2025-2382 (A vulnerability classified as critical was found in PHPGurukul Online  ...)
+	TODO: check
+CVE-2025-2381 (A vulnerability classified as critical has been found in PHPGurukul Cu ...)
+	TODO: check
+CVE-2025-2380 (A vulnerability was found in PHPGurukul Apartment Visitors Management  ...)
+	TODO: check
+CVE-2025-2379 (A vulnerability was found in PHPGurukul Apartment Visitors Management  ...)
+	TODO: check
+CVE-2025-2378 (A vulnerability was found in PHPGurukul Medical Card Generation System ...)
+	TODO: check
+CVE-2025-2377 (A vulnerability was found in SourceCodester Vehicle Management System  ...)
+	TODO: check
+CVE-2025-2376 (A vulnerability has been found in viames Pair Framework up to 1.9.11 a ...)
+	TODO: check
+CVE-2025-2375 (A vulnerability, which was classified as problematic, was found in PHP ...)
+	TODO: check
+CVE-2025-2374 (A vulnerability, which was classified as critical, has been found in P ...)
+	TODO: check
+CVE-2025-2373 (A vulnerability classified as critical was found in PHPGurukul Human M ...)
+	TODO: check
+CVE-2025-2372 (A vulnerability classified as critical has been found in PHPGurukul Hu ...)
+	TODO: check
+CVE-2025-2371 (A vulnerability was found in PHPGurukul Human Metapneumovirus Testing  ...)
+	TODO: check
+CVE-2025-2370 (A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B2022 ...)
+	TODO: check
+CVE-2025-2369 (A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B2022 ...)
+	TODO: check
+CVE-2025-2241 (A flaw was found in Hive, a component of Multicluster Engine (MCE) and ...)
+	TODO: check
+CVE-2025-2202 (Broken access control vulnerability in the Innovaci\xf3n y Cualificaci ...)
+	TODO: check
+CVE-2025-2201 (Broken access control vulnerability in the IcProgress Innovaci\xf3n y  ...)
+	TODO: check
+CVE-2025-2200 (QL injection vulnerability in the IcProgreso Innovaci\xf3n y Cualifica ...)
+	TODO: check
+CVE-2025-2199 (SQL injection vulnerability in the Innovaci\xf3n y Cualificaci\xf3n lo ...)
+	TODO: check
+CVE-2025-29788 (The Syliud PayPal Plugin is the Sylius Core Team\u2019s plugin for the ...)
+	TODO: check
+CVE-2025-29787 (`zip` is a zip library for rust which supports reading and writing of  ...)
+	TODO: check
+CVE-2025-29786 (Expr is an expression language and expression evaluation for Go. Prior ...)
+	TODO: check
+CVE-2025-29431 (Code-projects Online Class and Exam Scheduling System V1.0 is vulnerab ...)
+	TODO: check
+CVE-2025-29430 (Code-projects Online Class and Exam Scheduling System V1.0 is vulnerab ...)
+	TODO: check
+CVE-2025-29429 (Code-projects Online Class and Exam Scheduling System V1.0 is vulnerab ...)
+	TODO: check
+CVE-2025-29427 (Code-projects Online Class and Exam Scheduling System V1.0 is vulnerab ...)
+	TODO: check
+CVE-2025-29425 (Code-projects Online Class and Exam Scheduling System 1.0 is vulnerabl ...)
+	TODO: check
+CVE-2025-27512 (Zincati is an auto-update agent for Fedora CoreOS hosts. Zincati ships ...)
+	TODO: check
+CVE-2025-27102 (Agate is central authentication server software for OBiBa epidemiology ...)
+	TODO: check
+CVE-2025-26393 (SolarWinds Service Desk is affected by a broken access control vulnera ...)
+	TODO: check
+CVE-2025-26127 (A stored cross-site scripting (XSS) vulnerability in the Send for Appr ...)
+	TODO: check
+CVE-2025-26125 (An exposed ioctl in the IMFForceDelete driver of IObit Malware Fighter ...)
+	TODO: check
+CVE-2025-26042 (Uptime Kuma >== 1.23.0 has a ReDoS vulnerability, specifically when an ...)
+	TODO: check
+CVE-2025-25914 (SQL injection vulnerability in Online Exam Mastering System v.1.0 allo ...)
+	TODO: check
+CVE-2025-25685 (An issue was discovered in GL-INet Beryl AX GL-MT3000 v4.7.0. Attacker ...)
+	TODO: check
+CVE-2025-25684 (A lack of validation in the path parameter (/download) of GL-INet Bery ...)
+	TODO: check
+CVE-2025-25650 (An issue in the storage of NFC card data in Dorset DG 201 Digital Lock ...)
+	TODO: check
+CVE-2025-25621 (Unifiedtransform 2.0 is vulnerable to Incorrect Access Control, which  ...)
+	TODO: check
+CVE-2025-25618 (Incorrect Access Control in Unifiedtransform 2.0 leads to Privilege Es ...)
+	TODO: check
+CVE-2025-25612 (FS Inc S3150-8T2F prior to version S3150-8T2F_2.2.0D_135103 is vulnera ...)
+	TODO: check
+CVE-2025-24185 (An out-of-bounds write issue was addressed with improved input validat ...)
+	TODO: check
+CVE-2025-22474 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2025-22473 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2025-22472 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2025-1774 (Incorrect string encodingvulnerability in NASK - PIB BotSense allows i ...)
+	TODO: check
+CVE-2025-1398 (Mattermost Desktop App versions <=5.10.0 explicitly declared unnecessa ...)
+	TODO: check
+CVE-2025-0833 (A stored Cross-site Scripting (XSS) vulnerability affecting Route Mana ...)
+	TODO: check
+CVE-2025-0832 (A stored Cross-site Scripting (XSS) vulnerability affecting Project Ga ...)
+	TODO: check
+CVE-2025-0830 (A stored Cross-site Scripting (XSS) vulnerability affecting Meeting Ma ...)
+	TODO: check
+CVE-2025-0829 (A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup  ...)
+	TODO: check
+CVE-2025-0828 (A stored Cross-site Scripting (XSS) vulnerability affecting Engineerin ...)
+	TODO: check
+CVE-2025-0827 (A stored Cross-site Scripting (XSS) vulnerability affecting 3DPlay in  ...)
+	TODO: check
+CVE-2025-0826 (A stored Cross-site Scripting (XSS) vulnerability affecting 3D Navigat ...)
+	TODO: check
+CVE-2025-0601 (A stored Cross-site Scripting (XSS) vulnerability affecting Issue Mana ...)
+	TODO: check
+CVE-2025-0600 (A stored Cross-site Scripting (XSS) vulnerability affecting Product Ex ...)
+	TODO: check
+CVE-2025-0599 (A stored Cross-site Scripting (XSS) vulnerability affecting Document M ...)
+	TODO: check
+CVE-2025-0598 (A stored Cross-site Scripting (XSS) vulnerability affecting Relations  ...)
+	TODO: check
+CVE-2025-0596 (A stored Cross-site Scripting (XSS) vulnerability affecting Bookmark E ...)
+	TODO: check
+CVE-2025-0595 (A stored Cross-site Scripting (XSS) vulnerability affecting 3DDashboar ...)
+	TODO: check
+CVE-2025-0495 (Buildx is a Docker CLI plugin that extends build capabilities using Bu ...)
+	TODO: check
+CVE-2024-9055 (The DPA countermeasures on Silicon Labs' Series 2 devices are not rese ...)
+	TODO: check
+CVE-2024-8510 (N-central is vulnerable to a path traversal that allows unintended acc ...)
+	TODO: check
+CVE-2024-54565 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-54559 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2024-54525 (A logic issue was addressed with improved file handling. This issue is ...)
+	TODO: check
+CVE-2024-54027 (A Use of Hard-coded Cryptographic Key vulnerability [CWE-321] in Forti ...)
+	TODO: check
+CVE-2024-49561 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-49559 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-48831 (Dell SmartFabric OS10 Software, version(s) 10.5.6.x, contain(s) a Use  ...)
+	TODO: check
+CVE-2024-48830 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-48828 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-48017 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-48015 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-48013 (Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6. ...)
+	TODO: check
+CVE-2024-44866 (A buffer overflow in the GuitarPro1::read function of MuseScore Studio ...)
+	TODO: check
+CVE-2024-44276 (This issue was addressed by using HTTPS when sending information over  ...)
+	TODO: check
+CVE-2024-12992 (Improper Neutralization of Special Elements used in a Command vulnerab ...)
+	TODO: check
+CVE-2024-12971 (Improper Neutralization of Special Elements used in a Command vulnerab ...)
+	TODO: check
+CVE-2023-52321
+	REJECTED
+CVE-2023-52320
+	REJECTED
+CVE-2023-52319
+	REJECTED
+CVE-2023-52318
+	REJECTED
+CVE-2023-52317
+	REJECTED
+CVE-2023-52316
+	REJECTED
 CVE-2025-30089 (gurk (aka gurk-rs) through 0.6.3 mishandles ANSI escape sequences.)
 	NOT-FOR-US: Rust crate gurk
 CVE-2025-2396 (The U-Office Force from e-Excellence has an Arbitrary File Upload vuln ...)
@@ -1138,6 +1330,7 @@ CVE-2025-27393 (A vulnerability has been identified in SCALANCE LPE9403 (6GK5998
 CVE-2025-27392 (A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00 ...)
 	NOT-FOR-US: Siemens
 CVE-2025-27363 (An out of bounds write exists in FreeType versions 2.13.0 and below (n ...)
+	{DSA-5880-1}
 	- freetype 2.13.1+dfsg-1
 	NOTE: https://www.facebook.com/security/advisories/cve-2025-27363
 	NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1322
@@ -29635,6 +29828,7 @@ CVE-2024-55655 (sigstore-python is a Python tool for generating and verifying Si
 CVE-2024-55653 (PwnDoc is a penetration test report generator. In versions up to and i ...)
 	NOT-FOR-US: PwnDoc
 CVE-2024-54133 (Action Pack is a framework for handling and responding to web requests ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1089755)
 	NOTE: https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
 	NOTE: https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49 (v8.0.0.1)
@@ -46816,6 +47010,7 @@ CVE-2024-48758 (dingfanzu CMS V1.0 was discovered to contain a Cross-Site Reques
 CVE-2024-48180 (ClassCMS <=4.8 is vulnerable to file inclusion in the nowView method i ...)
 	NOT-FOR-US: ClassCMS
 CVE-2024-47889 (Action Mailer is a framework for designing email service layers. Start ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1085376)
 	NOTE: https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6
 	NOTE: https://github.com/rails/rails/commit/be898cc996986decfe238341d96b2a6573b8fd2e (v7.2.1.1)
@@ -46823,6 +47018,7 @@ CVE-2024-47889 (Action Mailer is a framework for designing email service layers.
 	NOTE: https://github.com/rails/rails/commit/0e5694f4d32544532d2301a9b4084eacb6986e94 (v7.0.8.5)
 	NOTE: https://github.com/rails/rails/commit/985f1923fa62806ff676e41de67c3b4552131ab9 (v6.1.7.9)
 CVE-2024-47888 (Action Text brings rich text content and editing to Rails. Starting in ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1085376)
 	NOTE: https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw
 	NOTE: https://github.com/rails/rails/commit/ba286c0a310b7f19cf5cac2a7a4c9def5cf9882e (v7.2.1.1)
@@ -46830,6 +47026,7 @@ CVE-2024-47888 (Action Text brings rich text content and editing to Rails. Start
 	NOTE: https://github.com/rails/rails/commit/727b0946c3cab04b825c039435eac963d4e91822 (v7.0.8.5)
 	NOTE: https://github.com/rails/rails/commit/4f4312b21a6448336de7c7ab0c4d94b378def468 (v6.1.7.9)
 CVE-2024-47887 (Action Pack is a framework for handling and responding to web requests ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1085376)
 	NOTE: https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4
 	NOTE: https://github.com/rails/rails/commit/f4dc83d8926509d0958ec21fcdbc2e7df3d32ce2 (v7.2.1.1)
@@ -46993,6 +47190,7 @@ CVE-2024-45072 (IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an
 CVE-2024-45071 (IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored c ...)
 	NOT-FOR-US: IBM
 CVE-2024-41128 (Action Pack is a framework for handling and responding to web requests ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1085376)
 	NOTE: https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj
 	NOTE: https://github.com/rails/rails/commit/27121e80f6dbb260f5a9f0452cd8411cb681f075 (v7.2.1.1)
@@ -79407,6 +79605,7 @@ CVE-2024-2368 (The Mollie Forms plugin for WordPress is vulnerable to Cross-Site
 CVE-2024-2087 (The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to St ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-28103 (Action Pack is a framework for handling and responding to web requests ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1072705)
 	[bullseye] - rails <not-affected> (Vulnerable code introduced later)
 	[buster] - rails <not-affected> (Vulnerable code introduced later)
@@ -113464,6 +113663,7 @@ CVE-2021-46908 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2021-46907
 	REJECTED
 CVE-2024-26144 (Rails is a web-application framework. Starting with version 5.2.0, the ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1065119)
 	[bullseye] - rails <no-dsa> (Minor issue)
 	NOTE: https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
@@ -145955,6 +146155,7 @@ CVE-2023-40317
 CVE-2023-40316
 	- moodle <removed>
 CVE-2023-38037 (ActiveSupport::EncryptedFile writes contents that will be encrypted to ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1051057)
 	[bullseye] - rails <no-dsa> (Minor issue)
 	NOTE: https://github.com/advisories/GHSA-cr5q-6q9f-rq6q
@@ -169779,6 +169980,7 @@ CVE-2023-28364 (An Open Redirect vulnerability exists prior to version 1.52.117,
 CVE-2023-28363
 	RESERVED
 CVE-2023-28362 (The redirect_to method in Rails allows provided values to contain char ...)
+	{DSA-5881-1}
 	- rails 2:7.2.2.1+dfsg-1 (bug #1051058)
 	[bullseye] - rails <no-dsa> (Minor issue)
 	NOTE: https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132
@@ -309735,8 +309937,8 @@ CVE-2021-32586 (An improper input validation vulnerability in the web server CGI
 	NOT-FOR-US: FortiGuard
 CVE-2021-32585 (An improper neutralization of input during web page generation vulnera ...)
 	NOT-FOR-US: FortiWAN
-CVE-2021-32584
-	RESERVED
+CVE-2021-32584 (An improper access control (CWE-284) vulnerability in FortiWLC version ...)
+	TODO: check
 CVE-2021-32583
 	RESERVED
 CVE-2021-32582 (An issue was discovered in ConnectWise Automate before 2021.5. A blind ...)
@@ -326753,8 +326955,8 @@ CVE-2021-26089 (An improper symlink following in FortiClient for Mac 6.4.3 and b
 	NOT-FOR-US: FortiClient
 CVE-2021-26088 (An improper authentication vulnerability in FSSO Collector version 5.0 ...)
 	NOT-FOR-US: Fortinet
-CVE-2021-26087
-	RESERVED
+CVE-2021-26087 (An improper neutralization of input during web page generation in Fort ...)
+	TODO: check
 CVE-2021-26086 (Affected versions of Atlassian Jira Server and Data Center allow remot ...)
 	NOT-FOR-US: Atlassian
 CVE-2021-26085 (Affected versions of Atlassian Confluence Server allow remote attacker ...)
@@ -336206,8 +336408,8 @@ CVE-2021-22128 (An improper access control vulnerability in FortiProxy SSL VPN p
 	NOT-FOR-US: FortiProxy SSL VPN portal
 CVE-2021-22127 (An improper input validation vulnerability in FortiClient for Linux 6. ...)
 	NOT-FOR-US: FortiClient
-CVE-2021-22126
-	RESERVED
+CVE-2021-22126 (A use of hard-coded password vulnerability in FortiWLC version 8.5.2 a ...)
+	TODO: check
 CVE-2021-22125 (An instance of improper neutralization of special elements in the snif ...)
 	NOT-FOR-US: FortiSandbox
 CVE-2021-22124 (An uncontrolled resource consumption (denial of service) vulnerability ...)
@@ -347815,8 +348017,8 @@ CVE-2020-29012 (An insufficient session expiration vulnerability in FortiSandbox
 	NOT-FOR-US: FortiGuard
 CVE-2020-29011 (Instances of SQL Injection vulnerabilities in the checksum search and  ...)
 	NOT-FOR-US: FortiSandbox
-CVE-2020-29010
-	RESERVED
+CVE-2020-29010 (An exposure of sensitive information to an unauthorized actor vulnerab ...)
+	TODO: check
 CVE-2020-29009
 	RESERVED
 CVE-2020-29008
@@ -400510,8 +400712,8 @@ CVE-2020-9297 (Netflix Titus, all versions prior to version v0.1.1-rc.274, uses
 	NOT-FOR-US: Netflix Titus
 CVE-2020-9296 (Netflix Titus uses Java Bean Validation (JSR 380) custom constraint va ...)
 	NOT-FOR-US: Netflix Conductor
-CVE-2020-9295
-	RESERVED
+CVE-2020-9295 (FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 r ...)
+	TODO: check
 CVE-2020-9294 (An improper authentication vulnerability in FortiMail 5.4.10, 6.0.7, 6 ...)
 	NOT-FOR-US: FortiMail Fortiguard
 CVE-2020-9293
@@ -429127,8 +429329,8 @@ CVE-2019-17661 (A CSV injection in the codepress-admin-columns (aka Admin Column
 	NOT-FOR-US: WordPress plugin
 CVE-2019-17660 (A cross-site scripting (XSS) vulnerability in admin/translate/translat ...)
 	- limesurvey <itp> (bug #472802)
-CVE-2019-17659
-	RESERVED
+CVE-2019-17659 (A use of hard-coded cryptographic key vulnerability in FortiSIEM versi ...)
+	TODO: check
 CVE-2019-17658 (An unquoted service path vulnerability in the FortiClient FortiTray co ...)
 	NOT-FOR-US: Fortiguard
 CVE-2019-17657 (An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSw ...)
@@ -434867,8 +435069,8 @@ CVE-2019-15708 (A system command injection vulnerability in the FortiAP-S/W2 6.2
 	NOT-FOR-US: Fortiguard
 CVE-2019-15707 (An improper access control vulnerability in FortiMail admin webUI 6.2. ...)
 	NOT-FOR-US: FortiMail admin webUI
-CVE-2019-15706
-	RESERVED
+CVE-2019-15706 (An improper neutralization of input during web page generation in the  ...)
+	TODO: check
 CVE-2019-15705 (An Improper Input Validation vulnerability in the SSL VPN portal of Fo ...)
 	NOT-FOR-US: Fortinet FortiOS
 CVE-2019-15704 (A clear text storage of sensitive information vulnerability in FortiCl ...)
@@ -463016,8 +463218,8 @@ CVE-2019-6699 (An improper neutralization of input vulnerability in Fortinet For
 	NOT-FOR-US: Fortiguard
 CVE-2019-6698 (Use of Hard-coded Credentials vulnerability in FortiRecorder all versi ...)
 	NOT-FOR-US: Fortinet
-CVE-2019-6697
-	RESERVED
+CVE-2019-6697 (An Improper Neutralization of Input vulnerability affecting FortiGate  ...)
+	TODO: check
 CVE-2019-6696 (An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6. ...)
 	NOT-FOR-US: Fortiguard
 CVE-2019-6695 (Lack of root file system integrity checking in Fortinet FortiManager V ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/65af07a02df964ae0458acc947f3620ab5499234

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/65af07a02df964ae0458acc947f3620ab5499234
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250317/de867522/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list