[Git][security-tracker-team/security-tracker][master] automatic NOT-FOR-US entries update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 11 09:13:27 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d72431e6 by security tracker role at 2025-08-11T08:13:10+00:00
automatic NOT-FOR-US entries update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7,67 +7,67 @@ CVE-2025-8835 (A vulnerability was found in JasPer up to 4.2.5. Affected by this
 CVE-2025-8834 (A vulnerability has been found in JCG Link-net LW-N915R 17s.20.001.908 ...)
 	TODO: check
 CVE-2025-8833 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8832 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8831 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8830 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8829 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8828 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8827 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8826 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8825 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8824 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8823 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8822 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8821 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8820 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8819 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8818 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8817 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
-	TODO: check
+	NOT-FOR-US: Linksys
 CVE-2025-8747 (A safe mode bypass vulnerability in the `Model.load_model` method in K ...)
 	TODO: check
 CVE-2025-8661 (A stored Cross-Site Scripting vulnerability (XSS) occurs when the serv ...)
-	TODO: check
+	NOT-FOR-US: Symantec
 CVE-2025-8660 (Privilege escalation occurs when a user gets access to more resources  ...)
-	TODO: check
+	NOT-FOR-US: Symantec
 CVE-2025-7965 (The CBX Restaurant Booking WordPress plugin through 1.2.1 does not hav ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-27577 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-27562 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-27536 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause  ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-27128 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-26690 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-25278 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-25212 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-24925 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-24844 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-24298 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
-	TODO: check
+	NOT-FOR-US: OpenHarmony
 CVE-2025-8816 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
 	NOT-FOR-US: Linksys
 CVE-2025-8815 (A vulnerability was found in \u732b\u5b81i Morning up to bc782730c74ff ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d72431e68d90db8b83167814590bba058162a851

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d72431e68d90db8b83167814590bba058162a851
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250811/044aab9b/attachment.htm>


More information about the debian-security-tracker-commits mailing list