[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Aug 20 21:28:48 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f9438ba3 by Salvatore Bonaccorso at 2025-08-20T22:27:44+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5,37 +5,37 @@ CVE-2025-9245 (A vulnerability was detected in Linksys RE6250, RE6300, RE6350, R
 CVE-2025-9244 (A security vulnerability has been detected in Linksys RE6250, RE6300,  ...)
 	NOT-FOR-US: Linksys
 CVE-2025-9241 (A weakness has been identified in elunez eladmin up to 2.7. This affec ...)
-	TODO: check
+	NOT-FOR-US: elunez eladmin
 CVE-2025-9240 (A security flaw has been discovered in elunez eladmin up to 2.7. Affec ...)
-	TODO: check
+	NOT-FOR-US: elunez eladmin
 CVE-2025-9239 (A vulnerability was identified in elunez eladmin up to 2.7. Affected b ...)
-	TODO: check
+	NOT-FOR-US: elunez eladmin
 CVE-2025-9238 (A vulnerability was determined in Swatadru Exam-Seating-Arrangement up ...)
-	TODO: check
+	NOT-FOR-US: Swatadru Exam-Seating-Arrangement
 CVE-2025-9237 (A vulnerability was found in CodeAstro Ecommerce Website 1.0. This imp ...)
-	TODO: check
+	NOT-FOR-US: CodeAstro
 CVE-2025-9236 (A vulnerability has been found in Portabilis i-Diario up to 2.10. This ...)
 	NOT-FOR-US: Portabilis
 CVE-2025-9235 (A flaw has been found in Scada-LTS up to 2.7.8.1. The impacted element ...)
-	TODO: check
+	NOT-FOR-US: Scada-LTS
 CVE-2025-9234 (A vulnerability was detected in Scada-LTS up to 2.7.8.1. The affected  ...)
-	TODO: check
+	NOT-FOR-US: Scada-LTS
 CVE-2025-9233 (A security vulnerability has been detected in Scada-LTS up to 2.7.8.1. ...)
-	TODO: check
+	NOT-FOR-US: Scada-LTS
 CVE-2025-9229 (Information disclosure vulnerability in error handling in MiR software ...)
-	TODO: check
+	NOT-FOR-US: MiR software
 CVE-2025-9228 (MiR software versions prior to version 3.0.0 have insufficient authori ...)
-	TODO: check
+	NOT-FOR-US: MiR software
 CVE-2025-9173 (A weakness has been identified in Emlog Pro up to 2.5.18. This issue a ...)
-	TODO: check
+	NOT-FOR-US: Emlog Pro
 CVE-2025-9074 (A vulnerability was identified in Docker Desktop that allows local run ...)
 	NOT-FOR-US: Docker products not packaged in Debian
 CVE-2025-8612 (AOMEI Backupper Workstation Link Following Local Privilege Escalation  ...)
-	TODO: check
+	NOT-FOR-US: AOMEI Backupper Workstation
 CVE-2025-8611 (AOMEI Cyber Backup Missing Authentication for Critical Function Remote ...)
-	TODO: check
+	NOT-FOR-US: AOMEI Cyber Backup
 CVE-2025-8610 (AOMEI Cyber Backup Missing Authentication for Critical Function Remote ...)
-	TODO: check
+	NOT-FOR-US: AOMEI Cyber Backup
 CVE-2025-8453 (CWE-269: Improper Privilege Management vulnerability exists that could ...)
 	NOT-FOR-US: Schneider Electric
 CVE-2025-8449 (CWE-400: Uncontrolled Resource Consumption vulnerability exists that c ...)
@@ -49,13 +49,13 @@ CVE-2025-8309 (There is an improper privilege management vulnerability identifie
 CVE-2025-8102 (The Easy Digital Downloads plugin for WordPress is vulnerable to Cross ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-6183 (The StrongDM macOS client incorrectly processed JSON-formatted message ...)
-	TODO: check
+	NOT-FOR-US: StrongDM macOS client
 CVE-2025-6182 (The StrongDM Windows service incorrectly handled communication related ...)
-	TODO: check
+	NOT-FOR-US: StrongDM Windows service
 CVE-2025-6181 (The StrongDM Windows service incorrectly handled input validation. Aut ...)
-	TODO: check
+	NOT-FOR-US: StrongDM Windows service
 CVE-2025-6180 (The StrongDM Client insufficiently protected a pre-authentication toke ...)
-	TODO: check
+	NOT-FOR-US: StrongDM Client
 CVE-2025-5261 (Authorization Bypass Through User-Controlled Key vulnerability in Pik  ...)
 	TODO: check
 CVE-2025-5260 (Server-Side Request Forgery (SSRF) vulnerability in Pik Online Yaz\u01 ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f9438ba34f5b0d1ccd95e882251a0e4b56e3bb89

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f9438ba34f5b0d1ccd95e882251a0e4b56e3bb89
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250820/0143215b/attachment.htm>


More information about the debian-security-tracker-commits mailing list