[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Dec 8 20:28:23 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
384cb6d2 by Salvatore Bonaccorso at 2025-12-08T21:28:12+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,5 +1,5 @@
CVE-2025-66461 (FULLBACK Manager Pro provided by GS Yuasa International Ltd. registers ...)
- TODO: check
+ NOT-FOR-US: FULLBACK Manager Pro
CVE-2025-66334 (Denial of service (DoS) vulnerability in the office service. Impact: S ...)
NOT-FOR-US: Huawei
CVE-2025-66333 (Denial of service (DoS) vulnerability in the office service. Impact: S ...)
@@ -27,23 +27,23 @@ CVE-2025-66323 (Vulnerability of improper criterion security check in the card m
CVE-2025-66322 (Multi-thread race condition vulnerability in the camera framework modu ...)
NOT-FOR-US: Huawei
CVE-2025-65849 (A cryptanalytic break in Altcha Proof-of-Work obfuscation mode version ...)
- TODO: check
+ NOT-FOR-US: Altcha
CVE-2025-65804 (Tenda AX3 v16.03.12.11 contains a stack overflow in formSetIptv via th ...)
NOT-FOR-US: Tenda
CVE-2025-65799 (A lack of file name validation or verification in the Attachment servi ...)
- TODO: check
+ NOT-FOR-US: usememos memos
CVE-2025-65798 (Incorrect access control in usememos memos v0.25.2 allows attackers wi ...)
- TODO: check
+ NOT-FOR-US: usememos memos
CVE-2025-65797 (Incorrect access control in the Identity Provider service of usememos ...)
- TODO: check
+ NOT-FOR-US: usememos memos
CVE-2025-65796 (Incorrect access control in usememos memos v0.25.2 allows attackers wi ...)
- TODO: check
+ NOT-FOR-US: usememos memos
CVE-2025-65795 (Incorrect access control in the /api/v1/user endpoint of usememos memo ...)
- TODO: check
+ NOT-FOR-US: usememos memos
CVE-2025-65548 (NUT-14 allows cashu tokens to be created with a preimage hash. However ...)
TODO: check
CVE-2025-65363 (Authenticated append-style command-injection Ruijie APs (AP_RGOS 11.1. ...)
- TODO: check
+ NOT-FOR-US: Ruijie
CVE-2025-65271 (Client-side template injection (CSTI) in Azuriom CMS admin dashboard a ...)
TODO: check
CVE-2025-65231 (Barix Instreamer v04.06 and earlier is vulnerable to Cross Site Script ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/384cb6d26f9bae34555561a6317939e6532cc5f9
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/384cb6d26f9bae34555561a6317939e6532cc5f9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251208/d5546b23/attachment.htm>
More information about the debian-security-tracker-commits
mailing list