Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
59603aca by Moritz Muehlenhoff at 2025-01-02T09:23:41+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,15 +1,15 @@
 CVE-2025-22214 (Landray EIS 2001 through 2006 allows 
Message/fi_message_receiver.aspx? ...)
-       TODO: check
+       NOT-FOR-US: WordPress pluginEIS
 CVE-2024-56830 (The Net::EasyTCP package 0.15 through 0.26 for Perl uses 
Perl's builti ...)
        TODO: check
 CVE-2024-56829 (Huang Yaoshi Pharmaceutical Management Software through 16.0 
allows ar ...)
-       TODO: check
+       NOT-FOR-US: Huang Yaoshi Pharmaceutical Management Software
 CVE-2024-12595 (The AHAthat Plugin WordPress plugin through 1.6 does not 
escape the $_ ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-11357 (The goodlayers-core WordPress plugin before 2.0.10 does not 
sanitise a ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-11184 (The wp-enable-svg WordPress plugin through 0.7 does not 
sanitize SVG f ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2002-20002 (The Net::EasyTCP package before 0.15 for Perl always uses 
Perl's built ...)
        - libnet-easytcp-perl <not-affected> (Fixed before initial upload to 
Debian)
        NOTE: https://github.com/briandfoy/cpan-security-advisory/issues/184



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/59603acad32e8ee1030c06fa6caee470ed03cfcb

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/59603acad32e8ee1030c06fa6caee470ed03cfcb
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to