[Git][security-tracker-team/security-tracker][master] automatic NOT-FOR-US entries update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Aug 11 09:13:27 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d72431e6 by security tracker role at 2025-08-11T08:13:10+00:00
automatic NOT-FOR-US entries update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -7,67 +7,67 @@ CVE-2025-8835 (A vulnerability was found in JasPer up to 4.2.5. Affected by this
CVE-2025-8834 (A vulnerability has been found in JCG Link-net LW-N915R 17s.20.001.908 ...)
TODO: check
CVE-2025-8833 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8832 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8831 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8830 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8829 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8828 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8827 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8826 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8825 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8824 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8823 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8822 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8821 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8820 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8819 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8818 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8817 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
- TODO: check
+ NOT-FOR-US: Linksys
CVE-2025-8747 (A safe mode bypass vulnerability in the `Model.load_model` method in K ...)
TODO: check
CVE-2025-8661 (A stored Cross-Site Scripting vulnerability (XSS) occurs when the serv ...)
- TODO: check
+ NOT-FOR-US: Symantec
CVE-2025-8660 (Privilege escalation occurs when a user gets access to more resources ...)
- TODO: check
+ NOT-FOR-US: Symantec
CVE-2025-7965 (The CBX Restaurant Booking WordPress plugin through 1.2.1 does not hav ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2025-27577 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-27562 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-27536 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-27128 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-26690 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-25278 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-25212 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-24925 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-24844 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-24298 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
- TODO: check
+ NOT-FOR-US: OpenHarmony
CVE-2025-8816 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
NOT-FOR-US: Linksys
CVE-2025-8815 (A vulnerability was found in \u732b\u5b81i Morning up to bc782730c74ff ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d72431e68d90db8b83167814590bba058162a851
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d72431e68d90db8b83167814590bba058162a851
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250811/044aab9b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list