Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9253cf3a by Salvatore Bonaccorso at 2025-05-28T22:19:33+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5,75 +5,75 @@ CVE-2025-5298 (A vulnerability, which was classified as 
critical, was found in C
 CVE-2025-5297 (A vulnerability, which was classified as critical, has been 
found in S ...)
        NOT-FOR-US: SourceCodester
 CVE-2025-5295 (A vulnerability classified as critical was found in FreeFloat 
FTP Serv ...)
-       TODO: check
+       NOT-FOR-US: FreeFloat FTP Server
 CVE-2025-5287 (The Likes and Dislikes Plugin plugin for WordPress is 
vulnerable to SQ ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-5277 (aws-mcp-server MCP server is vulnerable to command injection. 
An attac ...)
-       TODO: check
+       NOT-FOR-US: aws-mcp-server MCP server
 CVE-2025-5257 (SummaryThis advisory addresses a security vulnerability in 
Mautic wher ...)
-       TODO: check
+       NOT-FOR-US: Mautic
 CVE-2025-5256 (SummaryThis advisory addresses an Open Redirection 
vulnerability in Ma ...)
-       TODO: check
+       NOT-FOR-US: Mautic
 CVE-2025-4963 (The WP Extended plugin for WordPress is vulnerable to Stored 
Cross-Sit ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-4493 (Improper privilege assignment in PAM JIT privilege sets in 
Devolutions ...)
        NOT-FOR-US: Devolutions
 CVE-2025-4134 (Lack of file validation in do_update_vps in Avast Business 
Antivirus f ...)
-       TODO: check
+       NOT-FOR-US: Avast Business Antivirus for Linux
 CVE-2025-48931 (The TeleMessage service through 2025-05-05 relies on MD5 for 
password  ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48930 (The TeleMessage service through 2025-05-05 stores certain 
cleartext in ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48929 (The TeleMessage service through 2025-05-05 implements 
authentication t ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48928 (The TeleMessage service through 2025-05-05 is based on a JSP 
applicati ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48927 (The TeleMessage service through 2025-05-05 configures Spring 
Boot Actu ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48926 (The admin panel in the TeleMessage service through 2025-05-05 
allows a ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48925 (The TeleMessage service through 2025-05-05 relies on the 
client side ( ...)
-       TODO: check
+       NOT-FOR-US: TeleMessage service
 CVE-2025-48749 (Netwrix Directory Manager (formerly Imanami GroupID) v11.0.0.0 
and bef ...)
-       TODO: check
+       NOT-FOR-US: Netwrix Directory Manager (formerly Imanami GroupID)
 CVE-2025-48747 (Netwrix Directory Manager (formerly Imanami GroupID) before 
and includ ...)
-       TODO: check
+       NOT-FOR-US: Netwrix Directory Manager (formerly Imanami GroupID)
 CVE-2025-48746 (Netwrix Directory Manager (formerly Imanami GroupID) 
v.11.0.0.0 and be ...)
-       TODO: check
+       NOT-FOR-US: Netwrix Directory Manager (formerly Imanami GroupID)
 CVE-2025-47748 (Netwrix Directory Manager v.11.0.0.0 and before & after 
v.11.1.25134.0 ...)
-       TODO: check
+       NOT-FOR-US: Netwrix Directory Manager
 CVE-2025-45997 (Sourcecodester Web-based Pharmacy Product Management System 
v.1.0 has  ...)
        NOT-FOR-US: SourceCodester
 CVE-2025-45343 (An issue in Tenda W18E v.2.0 v.16.01.0.11 allows an attacker 
to execut ...)
        NOT-FOR-US: Tenda
 CVE-2025-40673 (A Missing Authorization vulnerability has been found in 
DinoRANK. This ...)
-       TODO: check
+       NOT-FOR-US: DinoRANK
 CVE-2025-40651 (Reflected Cross-Site Scripting (XSS) vulnerability in Real 
Easy Store. ...)
-       TODO: check
+       NOT-FOR-US: Real Easy Store
 CVE-2025-3864 (Hackney fails to properly release HTTP connections to the pool 
after h ...)
-       TODO: check
+       NOT-FOR-US: Hackney
 CVE-2025-3357 (IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 
19could all ...)
        NOT-FOR-US: IBM
 CVE-2025-36572 (Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of 
Hard-coded C ...)
        NOT-FOR-US: Dell / EMC
 CVE-2025-1753 (LLama-Index CLI version v0.12.20 contains an OS command 
injection vuln ...)
-       TODO: check
+       NOT-FOR-US: LLama-Index CLI
 CVE-2025-1461 (Improper neutralization of the value of the 'eventMoreText' 
property o ...)
-       TODO: check
+       NOT-FOR-US: Vuetify
 CVE-2024-57338 (An arbitrary file upload vulnerability in M2Soft CROWNIX 
Report & ERS  ...)
-       TODO: check
+       NOT-FOR-US: M2Soft CROWNIX Report & ERS
 CVE-2024-57337 (An arbitrary file upload vulnerability in the opcode 500 
functionality ...)
-       TODO: check
+       NOT-FOR-US: M2Soft CROWNIX Report & ERS
 CVE-2024-57336 (Incorrect access control in M2Soft CROWNIX Report & ERS 
affected v7.x  ...)
-       TODO: check
+       NOT-FOR-US: M2Soft CROWNIX Report & ERS
 CVE-2024-51453 (IBM Sterling Secure Proxy 6.2.0.0 through 6.2.0.1 could allow 
a remote ...)
        NOT-FOR-US: IBM
 CVE-2024-47057 (SummaryThis advisory addresses a security vulnerability in 
Mautic rela ...)
-       TODO: check
+       NOT-FOR-US: Mautic
 CVE-2024-47056 (SummaryThis advisory addresses a security vulnerability in 
Mautic wher ...)
-       TODO: check
+       NOT-FOR-US: Mautic
 CVE-2024-47055 (SummaryThis advisory addresses a security vulnerability in 
Mautic rela ...)
-       TODO: check
+       NOT-FOR-US: Mautic
 CVE-2024-38341 (IBM Sterling Secure Proxy 6.0.0.0 through 6.0.3.1, 6.1.0.0 
through 6.1 ...)
        NOT-FOR-US: IBM
 CVE-2025-48734 (Improper Access Control vulnerability in Apache Commons.    A 
special  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9253cf3a6228aac1d23805e9bd160f51264a8dfb

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9253cf3a6228aac1d23805e9bd160f51264a8dfb
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to