[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jan 27 20:57:48 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
919dcb8e by Salvatore Bonaccorso at 2025-01-27T21:57:20+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -127,9 +127,9 @@ CVE-2025-0730 (A vulnerability classified as problematic has been found in TP-Li
 CVE-2025-0729 (A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Re ...)
 	NOT-FOR-US: TP-Link
 CVE-2025-0696 (A NULL Pointer Dereferencevulnerability in Cesanta Frozen versions les ...)
-	TODO: check
+	NOT-FOR-US: Cesanta Frozen
 CVE-2025-0695 (An Allocation of Resources Without Limits orThrottling vulnerability i ...)
-	TODO: check
+	NOT-FOR-US: Cesanta Frozen
 CVE-2024-57595 (DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerabi ...)
 	NOT-FOR-US: DLINK
 CVE-2024-57590 (TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vul ...)
@@ -197,44 +197,44 @@ CVE-2024-54145 (Cacti is an open source performance and fault management framewo
 	NOTE: https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp
 	NOTE: Fixed by: https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0
 CVE-2024-48841 (Network access can be used to execute arbitrary code with elevated pri ...)
-	TODO: check
+	NOT-FOR-US: ABB
 CVE-2024-48420 (Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to ...)
-	TODO: check
+	NOT-FOR-US: Edimax
 CVE-2024-48419 (Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Com ...)
-	TODO: check
+	NOT-FOR-US: Edimax
 CVE-2024-48418 (In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request  ...)
-	TODO: check
+	NOT-FOR-US: Edimax
 CVE-2024-48417 (Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to ...)
-	TODO: check
+	NOT-FOR-US: Edimax
 CVE-2024-48416 (Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to ...)
-	TODO: check
+	NOT-FOR-US: Edimax
 CVE-2024-45598 (Cacti is an open source performance and fault management framework. Pr ...)
 	- cacti <unfixed>
 	NOTE: https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg
 	NOTE: Fixed by: https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0
 	NOTE: Fixed by: https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae
 CVE-2024-38325 (IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd C ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-38320 (IBM Storage Protect for Virtual Environments: Data Protection for VMwa ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-37527 (IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scri ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-27256 (IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS throu ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-26317 (In illumos illumos-gate 2024-02-15, an error occurs in the elliptic cu ...)
-	TODO: check
+	NOT-FOR-US: illumos illumos-gate
 CVE-2024-22316 (IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-12740 (Vision related software from NI used a third-party library for image p ...)
-	TODO: check
+	NOT-FOR-US: NI
 CVE-2024-12345 (A vulnerability classified as problematic was found in INW Krbyyyzo 25 ...)
-	TODO: check
+	NOT-FOR-US: INW Krbyyyzo
 CVE-2024-11348 (Eura7 CMSmanager in version 4.6 and belowis vulnerable to Reflected XS ...)
-	TODO: check
+	NOT-FOR-US: Eura7 CMSmanager
 CVE-2023-52292 (IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2023-47159 (IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2025-24390 (A vulnerability in OTRS Application Server and reverse proxy settings  ...)
 	NOT-FOR-US: OTRS
 	NOTE: Could possibly affect Znuny, we'll let their security team figure it out



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/919dcb8e438a6120ffab2cbdbf9bdaeafdd7039b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/919dcb8e438a6120ffab2cbdbf9bdaeafdd7039b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250127/46863dbb/attachment.htm>


More information about the debian-security-tracker-commits mailing list