srv/web/ipfire/cgi-bin/netovpnsrv.cgi
srv/web/ipfire/cgi-bin/ovpnmain.cgi
srv/web/ipfire/cgi-bin/pakfire.cgi
+srv/web/ipfire/cgi-bin/vulnerabilities.cgi
srv/web/ipfire/cgi-bin/wireguard.cgi
usr/sbin/setup
var/ipfire/backup/bin/backup.pl
my %VULNERABILITIES = (
"gather_data_sampling" => "$Lang::tr{'downfall gather data sampling'} (CVE-2022-40982)",
+ "indirect_target_selection" => "$Lang::tr{'indirect target selection'} (CVE-2024-28956)",
"itlb_multihit" => "$Lang::tr{'itlb multihit'} (CVE-2018-12207)",
"l1tf" => "$Lang::tr{'foreshadow'} (CVE-2018-3620)",
"mds" => "$Lang::tr{'fallout zombieload ridl'} (CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091)",
'incoming overhead in bytes per second' => 'Eingehender Overhead',
'incoming traffic in bytes per second' => 'Eingehender Verkehr',
'incorrect password' => 'Fehlerhaftes Passwort',
+'indirect target selection' => 'Indirect target selection',
'info' => 'Info',
'info messages' => 'Info',
'init string' => 'Initialisierung:',
'incoming overhead in bytes per second' => 'Incoming Overhead',
'incoming traffic in bytes per second' => 'Incoming Traffic',
'incorrect password' => 'Incorrect password',
+'indirect target selection' => 'Indirect target selection',
'info' => 'Info',
'init string' => 'Init:',
'inodes' => 'Index-Nodes',