Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ccd6833a by security tracker role at 2025-09-12T20:14:34+00:00
automatic NOT-FOR-US entries update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3,7 +3,7 @@ CVE-2025-9556 (Langchaingo supports the use of jinja2 syntax 
when parsing prompt
 CVE-2025-8699 (Some "Stored Value" Unattended Payment Solutions of KioSoft use 
vulner ...)
        TODO: check
 CVE-2025-7448 (Wi-SUN unexpected 4- Way Handshake packet receptions may lead 
to predi ...)
-       TODO: check
+       NOT-FOR-US: Silicon Labs
 CVE-2025-6638 (A Regular Expression Denial of Service (ReDoS) vulnerability 
was disco ...)
        TODO: check
 CVE-2025-59139 (Hono is a Web application framework that provides support for 
any Java ...)
@@ -15,7 +15,7 @@ CVE-2025-59054 (dstack is a software development kit (SDK) to 
simplify the deplo
 CVE-2025-58434 (Flowise is a drag & drop user interface to build a customized 
large la ...)
        TODO: check
 CVE-2025-57579 (An issue in TOTOLINK Wi-Fi 6 Router Series Device 
X2000R-Gh-V2.0.0 all ...)
-       TODO: check
+       NOT-FOR-US: TOTOLINK
 CVE-2025-57578 (An issue in H3C Magic M Device M2V100R006 allows a remote 
attacker to  ...)
        TODO: check
 CVE-2025-57577 (An issue in H3C Device R365V300R004 allows a remote attacker 
to execut ...)
@@ -27,17 +27,17 @@ CVE-2025-55996 (Viber Desktop 25.6.0 is vulnerable to HTML 
Injection via the tex
 CVE-2025-55835 (File Upload vulnerability in SueamCMS v.0.1.2 allows a remote 
attacker ...)
        TODO: check
 CVE-2025-52074 (PHPGURUKUL Online Shopping Portal 2.1 is vulnerable to Cross 
Site Scri ...)
-       TODO: check
+       NOT-FOR-US: PHPGurukul
 CVE-2025-4235 (An information exposure vulnerability in the Palo Alto Networks 
User-I ...)
-       TODO: check
+       NOT-FOR-US: Palo Alto Networks
 CVE-2025-4234 (A problem with the Palo Alto Networks Cortex XDR Microsoft 365 
Defende ...)
-       TODO: check
+       NOT-FOR-US: Palo Alto Networks
 CVE-2025-43796 (Liferay Portal 7.4.0 through 7.4.3.101, and Liferay DXP 
2023.Q3.0 thro ...)
-       TODO: check
+       NOT-FOR-US: Liferay
 CVE-2025-43795 (Open redirect vulnerability in the System Settings in Liferay 
Portal 7 ...)
-       TODO: check
+       NOT-FOR-US: Liferay
 CVE-2025-43787 (A Stored cross-site scripting vulnerability in the Liferay 
Portal  7.4 ...)
-       TODO: check
+       NOT-FOR-US: Liferay
 CVE-2025-27240 (A Zabbix adminitrator can inject arbitrary SQL during the 
autoremoval  ...)
        TODO: check
 CVE-2025-27238 (Due to a bug in Zabbix API, the hostprototype.get method lists 
all hos ...)
@@ -51,15 +51,15 @@ CVE-2025-10365 (The Evertz SDVN 3080ipx-10G is a High 
Bandwidth Ethernet Switchi
 CVE-2025-10364 (The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet 
Switching Fab ...)
        TODO: check
 CVE-2025-10325 (A vulnerability was identified in Wavlink WL-WN578W2 221110. 
This impa ...)
-       TODO: check
+       NOT-FOR-US: Wavlink
 CVE-2025-10324 (A vulnerability was determined in Wavlink WL-WN578W2 221110. 
This affe ...)
-       TODO: check
+       NOT-FOR-US: Wavlink
 CVE-2025-10323 (A vulnerability was found in Wavlink WL-WN578W2 221110. The 
impacted e ...)
-       TODO: check
+       NOT-FOR-US: Wavlink
 CVE-2025-10322 (A vulnerability has been found in Wavlink WL-WN578W2 221110. 
The affec ...)
-       TODO: check
+       NOT-FOR-US: Wavlink
 CVE-2025-10321 (A flaw has been found in Wavlink WL-WN578W2 221110. Impacted 
is an unk ...)
-       TODO: check
+       NOT-FOR-US: Wavlink
 CVE-2025-10320 (A vulnerability was detected in iteachyou Dreamer CMS up to 
4.1.3.2. T ...)
        TODO: check
 CVE-2025-10319 (A security flaw has been discovered in JeecgBoot up to 3.8.2. 
Affected ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ccd6833ab34d0c2a68d4ab97e0882926a4fece9a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ccd6833ab34d0c2a68d4ab97e0882926a4fece9a
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to