[Git][security-tracker-team/security-tracker][master] 2 commits: Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Feb 20 08:49:08 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a1ea4658 by Salvatore Bonaccorso at 2025-02-20T09:48:51+01:00
Process some NFUs
- - - - -
cc113431 by Salvatore Bonaccorso at 2025-02-20T09:48:51+01:00
Add CVE-2025-1492/wireshark
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,43 +1,45 @@
CVE-2025-27218 (Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 bef ...)
- TODO: check
+ NOT-FOR-US: Sitecore
CVE-2025-27092 (GHOSTS is an open source user simulation framework for cyber experimen ...)
- TODO: check
+ NOT-FOR-US: GHOSTS
CVE-2025-27090 (Sliver is an open source cross-platform adversary emulation/red team f ...)
- TODO: check
+ NOT-FOR-US: BishopFox Sliver
CVE-2025-26856 (Improper neutralization of special elements used in an OS command ('OS ...)
- TODO: check
+ NOT-FOR-US: UD-LT2 firmware
CVE-2025-25947 (An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmenta ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25946 (An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory lea ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25945 (An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive i ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25944 (Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local att ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25943 (Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local att ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25942 (An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive i ...)
- TODO: check
+ NOT-FOR-US: Bento4
CVE-2025-25196 (OpenFGA is a high-performance and flexible authorization/permission en ...)
- TODO: check
+ NOT-FOR-US: OpenFGA
CVE-2025-24989 (An improper access control vulnerability in Power Pages allows an unau ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2025-24947 (A hash collision vulnerability (in the hash table used to manage conne ...)
- TODO: check
+ NOT-FOR-US: LSQUIC (aka LiteSpeed QUIC)
CVE-2025-24946 (The hash table used to manage connections in picoquic before b80fd3f u ...)
- TODO: check
+ NOT-FOR-US: picoquic
CVE-2025-23020 (An issue was discovered in Kwik before 0.10.1. A hash collision vulner ...)
- TODO: check
+ NOT-FOR-US: Kwik
CVE-2025-21355 (Missing Authentication for Critical Function in Microsoft Bing allows ...)
- TODO: check
+ NOT-FOR-US: Microsoft
CVE-2025-1492 (Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 ...)
- TODO: check
+ - wireshark <unfixed>
+ NOTE: https://www.wireshark.org/security/wnpa-sec-2025-01.html
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/20373
CVE-2025-1293 (Hermes versions up to 0.4.0 improperly validated the JWT provided when ...)
TODO: check
CVE-2025-1223 (An attacker can gain application privileges in order to perform limite ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2025-1222 (An attacker can gain application privileges in order to perform limite ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2025-0112 (A problem with a detection mechanism in the Palo Alto Networks Cortex ...)
TODO: check
CVE-2024-6697 (The product does not handle or incorrectly handles when it has insuffi ...)
@@ -71,7 +73,7 @@ CVE-2024-13445 (The Elementor Website Builder \u2013 More Than Just a Page Build
CVE-2024-13155 (The Unlimited Elements For Elementor plugin for WordPress is vulnerabl ...)
NOT-FOR-US: WordPress plugin
CVE-2024-12284 (Authenticated privilege escalation inNetScaler Console and NetScaler A ...)
- TODO: check
+ NOT-FOR-US: Citrix
CVE-2024-10339
REJECTED
CVE-2023-51305 (PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stor ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5e050daab797649794a8dee922d43a34e64f38a8...cc113431da7a810f67be87731ce6d784f420ace8
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5e050daab797649794a8dee922d43a34e64f38a8...cc113431da7a810f67be87731ce6d784f420ace8
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250220/8b9168fc/attachment.htm>
More information about the debian-security-tracker-commits
mailing list