[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Mar 11 21:38:50 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e713bce8 by Salvatore Bonaccorso at 2025-03-11T22:38:27+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -301,7 +301,7 @@ CVE-2025-22367 (The authenticated time setting capability of the firmware for Me
CVE-2025-22366 (The authenticated firmware update capability of the firmware for Menne ...)
NOT-FOR-US: Mennekes
CVE-2025-22213 (Inadequate checks in the Media Manager allowed users with "edit" privi ...)
- TODO: check
+ NOT-FOR-US: Joomla
CVE-2025-21247 (Improper resolution of path equivalence in Windows MapUrlToZone allows ...)
NOT-FOR-US: Microsoft
CVE-2025-21199 (Improper privilege management in Azure Agent Installer allows an autho ...)
@@ -319,7 +319,7 @@ CVE-2025-0150 (Incorrect behavior order in some Zoom Workplace Apps for iOS befo
CVE-2025-0149 (Insufficient verification of data authenticity in some Zoom Workplace ...)
NOT-FOR-US: Zoom
CVE-2024-9157 (** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability ...)
- TODO: check
+ NOT-FOR-US: Synaptics
CVE-2024-56338 (IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 a ...)
NOT-FOR-US: IBM
CVE-2024-56336 (A vulnerability has been identified in SINAMICS S200 (All versions wit ...)
@@ -329,23 +329,23 @@ CVE-2024-56182 (A vulnerability has been identified in SIMATIC Field PG M5 (All
CVE-2024-56181 (A vulnerability has been identified in SIMATIC Field PG M5 (All versio ...)
NOT-FOR-US: Siemens
CVE-2024-55597 (A improper limitation of a pathname to a restricted directory ('path t ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-55592 (An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 al ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-55590 (Multiple improper neutralization of special elements used in an OS com ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-54085 (AMI\u2019s SPx contains a vulnerability in the BMC where an Attacker m ...)
TODO: check
CVE-2024-54084 (APTIOV contains a vulnerability in BIOS where an attacker may cause a ...)
TODO: check
CVE-2024-54026 (An improper neutralization of special elements used in an sql command ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-54018 (Multipleimproper neutralization of special elements used in an OS Comm ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-52961 (An improper neutralization of special elements used in an OS Command v ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-52960 (A client-side enforcement of server-side security vulnerability [CWE-6 ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-52285 (A vulnerability has been identified in SiPass integrated AC5102 (ACC-G ...)
NOT-FOR-US: Siemens
CVE-2024-51322 (Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 al ...)
@@ -357,27 +357,27 @@ CVE-2024-51320 (Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity
CVE-2024-51319 (A local file include vulnerability in the /servlet/Report of Zucchetti ...)
TODO: check
CVE-2024-46663 (A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-45328 (An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4 ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-45324 (A use of externally-controlled format string vulnerability [CWE-134] i ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-33501 (Two improper neutralization of special elements used in an SQL Command ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-32123 (Multiple improper neutralization of special elements used in an os com ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2024-28607 (The ip-utils package through 2.4.0 for Node.js might allow SSRF becaus ...)
TODO: check
CVE-2024-12546 (EDK2 contains a vulnerability in BIOS where a user may cause an Intege ...)
TODO: check
CVE-2023-48790 (A cross site request forgery vulnerability [CWE-352] in Fortinet Forti ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-42784 (An improper handling of syntactically invalid structure in Fortinet Fo ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-40723 (An exposure of sensitive information to an unauthorized actor in Forti ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2023-37933 (An improper neutralization of input during web page generation ('Cross ...)
- TODO: check
+ NOT-FOR-US: Fortinet
CVE-2025-2190 (The mobile application (com.transsnet.store) has a man-in-the-middle a ...)
NOT-FOR-US: com.transsnet.store
CVE-2025-2177 (A vulnerability classified as critical was found in libzvbi up to 0.2. ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e713bce8dfd81c45308bef65a4e75279e5e83604
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e713bce8dfd81c45308bef65a4e75279e5e83604
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250311/0613e8a5/attachment.htm>
More information about the debian-security-tracker-commits
mailing list