Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
22e21b35 by Moritz Muehlenhoff at 2025-03-12T09:53:09+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -35,29 +35,29 @@ CVE-2025-2077 (The Simple Amazon Affiliate plugin for 
WordPress is vulnerable to
 CVE-2025-2076 (The binlayerpress plugin for WordPress is vulnerable to Stored 
Cross-S ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-2023 (Ashlar-Vellum Cobalt LI File Parsing Integer Overflow Remote 
Code Exec ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2022 (Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code 
Execut ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2021 (Ashlar-Vellum Cobalt XE File Parsing Integer Overflow Remote 
Code Exec ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2020 (Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write 
Remote Code  ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2019 (Ashlar-Vellum Cobalt VC6 File Parsing Heap-based Buffer 
Overflow Remot ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2018 (Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code 
Execut ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2017 (Ashlar-Vellum Cobalt CO File Parsing Buffer Overflow Remote 
Code Execu ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2016 (Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote 
Code Execu ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2015 (Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code 
Execut ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2014 (Ashlar-Vellum Cobalt VS File Parsing Use of Uninitialized 
Variable Rem ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2013 (Ashlar-Vellum Cobalt CO File Parsing Use-After-Free Remote Code 
Execut ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-2012 (Ashlar-Vellum Cobalt VS File Parsing Out-Of-Bounds Read Remote 
Code Ex ...)
-       TODO: check
+       NOT-FOR-US: Ashlar-Vellum Cobalt
 CVE-2025-28943 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-28941 (Cross-Site Request Forgery (CSRF) vulnerability in ohtan Spam 
Byebye a ...)
@@ -183,7 +183,7 @@ CVE-2025-28857 (Cross-Site Request Forgery (CSRF) 
vulnerability in rankchecker R
 CVE-2025-28856 (Cross-Site Request Forgery (CSRF) vulnerability in dangrossman 
W3Count ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-27792 (Opal is OBiBa\u2019s core database application for biobanks or 
epidemi ...)
-       TODO: check
+       NOT-FOR-US: Opal
 CVE-2025-27181 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a Us ...)
        NOT-FOR-US: Adobe
 CVE-2025-27180 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by an o ...)
@@ -191,7 +191,7 @@ CVE-2025-27180 (Substance3D - Modeler versions 1.15.0 and 
earlier are affected b
 CVE-2025-27173 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a He ...)
        NOT-FOR-US: Adobe
 CVE-2025-27101 (Opal is OBiBa\u2019s core database application for biobanks or 
epidemi ...)
-       TODO: check
+       NOT-FOR-US: Opal
 CVE-2025-24912 (hostapd fails to process crafted RADIUS packets properly. When 
hostapd ...)
        TODO: check
 CVE-2025-21170 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a NU ...)
@@ -201,7 +201,7 @@ CVE-2025-1707 (The Review Schema plugin for WordPress is 
vulnerable to Local Fil
 CVE-2025-1508 (The WP Crowdfunding plugin for WordPress is vulnerable to 
unauthorized ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-0900 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read 
Information Dis ...)
-       TODO: check
+       NOT-FOR-US: PDF-XChange Editor
 CVE-2024-58087 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
        - linux 6.12.6-1
        [bookworm] - linux 6.1.123-1
@@ -214,9 +214,9 @@ CVE-2024-13498 (The NEX-Forms \u2013 Ultimate Form Builder 
\u2013 Contact forms
 CVE-2024-12589 (The Finale Lite \u2013 Sales Countdown Timer & Discount for 
WooCommerc ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-2207 (A vulnerability classified as problematic was found in 
aitangbao sprin ...)
-       TODO: check
+       NOT-FOR-US: aitangbao springboot-manager
 CVE-2025-2206 (A vulnerability classified as problematic has been found in 
aitangbao  ...)
-       TODO: check
+       NOT-FOR-US: aitangbao springboot-manager
 CVE-2025-2196 (A vulnerability was found in MRCMS 3.1.2. It has been declared 
as prob ...)
        NOT-FOR-US: MRCMS
 CVE-2025-2195 (A vulnerability was found in MRCMS 3.1.2. It has been 
classified as pr ...)
@@ -226,7 +226,7 @@ CVE-2025-2194 (A vulnerability was found in MRCMS 3.1.2 and 
classified as proble
 CVE-2025-2193 (A vulnerability has been found in MRCMS 3.1.2 and classified as 
critic ...)
        NOT-FOR-US: MRCMS
 CVE-2025-2192 (A vulnerability, which was classified as problematic, was found 
in Sto ...)
-       TODO: check
+       NOT-FOR-US: Stoque Zeev.it
 CVE-2025-2191 (A vulnerability, which was classified as problematic, has been 
found i ...)
        NOT-FOR-US: Claro
 CVE-2025-2189 (This vulnerability exists in the Tinxy smart devices due to 
storage of ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/22e21b35b7d14ddf7129519e0d289c3119ce37b1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/22e21b35b7d14ddf7129519e0d289c3119ce37b1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to