[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jun 9 09:18:32 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2439ab48 by Salvatore Bonaccorso at 2025-06-09T10:17:51+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,13 +1,13 @@
 CVE-2025-5894 (Smart Parking Management System from Honding Technology has a Missing  ...)
-	TODO: check
+	NOT-FOR-US: Honding Technology
 CVE-2025-5893 (Smart Parking Management System from Honding Technology has an Exposur ...)
-	TODO: check
+	NOT-FOR-US: Honding Technology
 CVE-2025-5867 (A vulnerability classified as critical was found in RT-Thread 5.1.0. T ...)
-	TODO: check
+	NOT-FOR-US: RT-Thread
 CVE-2025-5866 (A vulnerability classified as critical has been found in RT-Thread 5.1 ...)
-	TODO: check
+	NOT-FOR-US: RT-Thread
 CVE-2025-5865 (A vulnerability was found in RT-Thread 5.1.0. It has been rated as cri ...)
-	TODO: check
+	NOT-FOR-US: RT-Thread
 CVE-2025-5864 (A vulnerability was found in Tenda TDSEE App up to 1.7.12. It has been ...)
 	NOT-FOR-US: Tenda
 CVE-2025-5863 (A vulnerability was found in Tenda AC5 15.03.06.47. It has been classi ...)
@@ -49,35 +49,35 @@ CVE-2025-3582 (The Newsletter  WordPress plugin before 8.85 does not sanitise an
 CVE-2025-3581 (The Newsletter  WordPress plugin before 8.8.5 does not validate and es ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-3461 (The Quantenna Wi-Fi chips ship with an unauthenticated telnet interfac ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-3460 (The Quantenna Wi-Fi chipset ships with a local control script, set_tx_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-3459 (The Quantenna Wi-Fi chipset ships with a local control script, transmi ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-35010 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35009 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35008 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35007 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35006 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35005 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-35004 (Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2  ...)
-	TODO: check
+	NOT-FOR-US: Microhard
 CVE-2025-32459 (The Quantenna Wi-Fi chipset ships with a local control script, router_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-32458 (The Quantenna Wi-Fi chipset ships with a local control script, router_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-32457 (The Quantenna Wi-Fi chipset ships with a local control script, router_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-32456 (The Quantenna Wi-Fi chipset ships with a local control script, router_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-32455 (The Quantenna Wi-Fi chipset ships with a local control script, router_ ...)
-	TODO: check
+	NOT-FOR-US: ON Semiconductor
 CVE-2025-5847 (A vulnerability has been found in Tenda AC9 15.03.02.13 and classified ...)
 	NOT-FOR-US: Tenda
 CVE-2025-27563 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2439ab48dbedf44cb2ce6c3053fa7415b253fbb7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2439ab48dbedf44cb2ce6c3053fa7415b253fbb7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250609/83539210/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list