[Git][security-tracker-team/security-tracker][master] 2 commits: auto-nfu: Add rule for Netgear
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Apr 1 10:00:48 BST 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d697fbdd by Moritz Muehlenhoff at 2025-04-01T10:42:44+02:00
auto-nfu: Add rule for Netgear
- - - - -
1ffeed4d by Moritz Muehlenhoff at 2025-04-01T11:00:19+02:00
NFUs
- - - - -
2 changed files:
- data/CVE/list
- data/packages/nfu.yaml
Changes:
=====================================
data/CVE/list
=====================================
@@ -485,7 +485,7 @@ CVE-2025-24095 (This issue was addressed with additional entitlement checks. Thi
CVE-2025-22277 (Authentication Bypass Using an Alternate Path or Channel vulnerability ...)
NOT-FOR-US: WordPress plugin or theme
CVE-2025-21384 (An authenticated attacker can exploit an Server-Side Request Forgery ( ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2025-1986 (The Gutentor WordPress plugin before 3.4.7 does not sanitize and esca ...)
NOT-FOR-US: WordPress plugin
CVE-2025-1665 (The Avada (Fusion) Builder plugin for WordPress is vulnerable to Store ...)
@@ -497,27 +497,27 @@ CVE-2025-1512 (The PowerPack Elementor Addons (Free Widgets, Extensions and Temp
CVE-2025-1267 (The Groundhogg plugin for Wordpress is vulnerable to Stored Cross-Site ...)
NOT-FOR-US: WordPress plugin
CVE-2025-0418 (Valmet DNA user passwords in plain text.This practice poses a security ...)
- TODO: check
+ NOT-FOR-US: Valmet DNA
CVE-2025-0417 (Lack of protection against brute force attacks in Valmet DNA visualiza ...)
- TODO: check
+ NOT-FOR-US: Valmet DNA
CVE-2025-0416 (Local privilege escalation through insecure DCOM configuration in Valm ...)
- TODO: check
+ NOT-FOR-US: Valmet DNA
CVE-2024-54809 (Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffe ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54808 (Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer ov ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54807 (In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerab ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54806 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary comma ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54805 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54804 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54803 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54802 (In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/ ...)
- TODO: check
+ NOT-FOR-US: Netgear
CVE-2024-54533 (A permissions issue was addressed with additional sandbox restrictions ...)
NOT-FOR-US: Apple
CVE-2024-40864 (The issue was addressed with improved handling of protocols. This issu ...)
@@ -552,7 +552,7 @@ CVE-2025-3048 (After completing a build with AWS Serverless Application Model Co
CVE-2025-3047 (When running the AWS Serverless Application Model Command Line Interfa ...)
NOT-FOR-US: Amazon
CVE-2025-3027 (The vulnerability exists in the EJBCA service, version 8.0 Enterprise. ...)
- TODO: check
+ NOT-FOR-US: EJBCA
CVE-2025-3026 (The vulnerability exists in the EJBCA service, version 8.0 Enterprise. ...)
NOT-FOR-US: EJBCA
CVE-2025-3022 (Os command injection vulnerability in e-solutions e-management. This v ...)
=====================================
data/packages/nfu.yaml
=====================================
@@ -183,6 +183,8 @@
description: '.*\b(?i:d-link)\b.*'
- reason: ESAFENET
description: '.*\bESAFENET\b.*'
+- reason: Netgear
+ description: '.*\b(?i:Netgear)\b.*'
- reason: Linksys
description: '.*\b(?i:Linksys)\b.*'
- reason: OpenEMR
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ad936de243e2efe4aca2b4c9f4644b221f689c7c...1ffeed4d2fc65a839be303463c322917e2a15149
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ad936de243e2efe4aca2b4c9f4644b221f689c7c...1ffeed4d2fc65a839be303463c322917e2a15149
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250401/6913ebc1/attachment.htm>
More information about the debian-security-tracker-commits
mailing list