[Git][security-tracker-team/security-tracker][master] automatic NOT-FOR-US entries update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jun 18 09:13:07 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
abe445b4 by security tracker role at 2025-06-18T08:12:59+00:00
automatic NOT-FOR-US entries update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3,9 +3,9 @@ CVE-2025-51381 (An authentication bypass vulnerability exists in KCM3100 Ver1.4.
CVE-2025-50202 (Lychee is a free photo-management tool. In versions starting from 6.6. ...)
TODO: check
CVE-2025-4955 (The tarteaucitron.io WordPress plugin before 1.9.5 uses query paramete ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2025-4413 (The Pixabay Images plugin for WordPress is vulnerable to arbitrary fil ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2025-49843 (conda-smithy is a tool for combining a conda recipe with configuration ...)
TODO: check
CVE-2025-49825 (Teleport provides connectivity, authentication, access controls and au ...)
@@ -15,29 +15,29 @@ CVE-2025-49824 (conda-smithy is a tool for combining a conda recipe with configu
CVE-2025-49593 (Portainer Community Edition is a lightweight service delivery platform ...)
TODO: check
CVE-2025-49385 (Trend Micro Security 17.8 (Consumer) is vulnerable to a link following ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49384 (Trend Micro Security 17.8 (Consumer) is vulnerable to a link following ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49218 (A post-auth SQL injection vulnerability in the Trend Micro Endpoint En ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49217 (An insecure deserialization operation in the Trend Micro Endpoint Encr ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49216 (An authentication bypass vulnerability in the Trend Micro Endpoint Enc ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49215 (A post-auth SQL injection vulnerability in the Trend Micro Endpoint En ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49214 (An insecure deserialization operation in the Trend Micro Endpoint Encr ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49213 (An insecure deserialization operation in the Trend Micro Endpoint Encr ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49212 (An insecure deserialization operation in the Trend Micro Endpoint Encr ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49211 (A SQL injection vulnerability in the Trend Micro Endpoint Encryption P ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-49149 (Dify is an open-source LLM app development platform. In version 1.2.0, ...)
TODO: check
CVE-2025-48443 (Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below i ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-41413 (Fuji Electric Smart Editoris vulnerable to an out-of-bounds write, whi ...)
TODO: check
CVE-2025-41388 (Fuji Electric Smart Editor is vulnerable to a stack-based buffer overf ...)
@@ -45,15 +45,15 @@ CVE-2025-41388 (Fuji Electric Smart Editor is vulnerable to a stack-based buffer
CVE-2025-32412 (Fuji Electric Smart Editoris vulnerable to an out-of-bounds read, whic ...)
TODO: check
CVE-2025-30642 (A link following vulnerability in Trend Micro Deep Security 20.0 agent ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-30641 (A link following vulnerability in the anti-malware solution portion of ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-30640 (A link following vulnerability in Trend Micro Deep Security 20.0 agent ...)
- TODO: check
+ NOT-FOR-US: Trend Micro
CVE-2025-23252 (The NVIDIA NVDebug tool contains a vulnerability that may allow an act ...)
TODO: check
CVE-2025-1562 (The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2025-48945
- pycares <unfixed>
NOTE: https://github.com/saghul/pycares/security/advisories/GHSA-5qpg-rh4j-qp35
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abe445b49746407aad56a6d255059c3c0b7ed171
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abe445b49746407aad56a6d255059c3c0b7ed171
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250618/e71a2ff6/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list