[Git][security-tracker-team/security-tracker][master] 3 commits: auto-nfu: Add Liferay
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Mar 19 21:48:53 GMT 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
23e7eba4 by Moritz Muehlenhoff at 2025-03-19T22:36:13+01:00
auto-nfu: Add Liferay
Total CVEs from Liferay: 67
Total CVEs from Liferay with packages assigned: 0
- - - - -
4432fab1 by Moritz Muehlenhoff at 2025-03-19T22:43:31+01:00
auto-nfu: Add Absolute Software
Total CVEs from Absolute: 15
Total CVEs from Absolute with packages assigned: 0
- - - - -
b506df1e by Moritz Muehlenhoff at 2025-03-19T22:48:26+01:00
NFUs
- - - - -
2 changed files:
- data/CVE/list
- data/packages/nfu.yaml
Changes:
=====================================
data/CVE/list
=====================================
@@ -7,13 +7,13 @@ CVE-2025-30196 (Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for li
CVE-2025-30154 (reviewdog/action-setup is a GitHub action that installs reviewdog. rev ...)
NOT-FOR-US: reviewdog/action-setup GitHub action
CVE-2025-30153 (kin-openapi is a Go project for handling OpenAPI files. Prior to 0.131 ...)
- TODO: check
+ NOT-FOR-US: kin-openapi
CVE-2025-30152 (The Syliud PayPal Plugin is the Sylius Core Team\u2019s plugin for the ...)
- TODO: check
+ NOT-FOR-US: Syliud PayPal plugin
CVE-2025-30144 (fast-jwt provides fast JSON Web Token (JWT) implementation. Prior to 5 ...)
TODO: check
CVE-2025-2536 (Cross-site scripting (XSS) vulnerability on Liferay Portal 7.4.3.82 th ...)
- TODO: check
+ NOT-FOR-US: Liferay
CVE-2025-2512 (The File Away plugin for WordPress is vulnerable to arbitrary file upl ...)
NOT-FOR-US: WordPress plugin
CVE-2025-2511 (The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQ ...)
@@ -33,23 +33,23 @@ CVE-2025-29783 (vLLM is a high-throughput and memory-efficient inference and ser
CVE-2025-29770 (vLLM is a high-throughput and memory-efficient inference and serving e ...)
NOT-FOR-US: vLLM
CVE-2025-29405 (An arbitrary file upload vulnerability in the component /admin/templat ...)
- TODO: check
+ NOT-FOR-US: emlog pro
CVE-2025-29401 (An arbitrary file upload vulnerability in the component /views/plugin. ...)
- TODO: check
+ NOT-FOR-US: emlog pro
CVE-2025-29137 (Tenda AC7 V1.0 V15.03.06.44 found a buffer overflow caused by the time ...)
NOT-FOR-US: Tenda
CVE-2025-29118 (Tenda AC8 V16.03.34.06 was discovered to contain a stack overflow via ...)
NOT-FOR-US: Tenda
CVE-2025-27705 (There is a cross-site scripting vulnerability in the Secure Access adm ...)
- TODO: check
+ NOT-FOR-US: Absolute Software
CVE-2025-27704 (There is a cross-site scripting vulnerability in the Secure Access adm ...)
- TODO: check
+ NOT-FOR-US: Absolute Software
CVE-2025-27415 (Nuxt is an open-source web development framework for Vue.js. Prior to ...)
- TODO: check
+ NOT-FOR-US: Nuxt
CVE-2025-26486 (Use of a Broken or Risky Cryptographic Algorithm, Use of Password Hash ...)
- TODO: check
+ NOT-FOR-US: Beta80 Life 1st Identity Manager
CVE-2025-26485 (The Exposure of Sensitive Information to an Unauthorized Actor vulner ...)
- TODO: check
+ NOT-FOR-US: Beta80 Life 1st Identity Manager
CVE-2025-26475 (Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26 ...)
NOT-FOR-US: Dell / EMC
CVE-2025-23382 (Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.26 ...)
=====================================
data/packages/nfu.yaml
=====================================
@@ -1,6 +1,8 @@
# Simple CNA based rules
- reason: 1E
cna: 1E
+- reason: Absolute Software
+ cna: Absolute
- reason: AMI
cna: AMI
- reason: Apple
@@ -47,6 +49,8 @@
cna: Joomla
- reason: Juniper
cna: juniper
+- reason: Liferay
+ cna: Liferay
- reason: MediaTek
cna: MediaTek
- reason: Palo Alto Networks
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9780d3c75642e7a9e06a0a17e6a26dcfd592d0f8...b506df1ea3c03386e48a4bd464d06564cbb5f4fe
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9780d3c75642e7a9e06a0a17e6a26dcfd592d0f8...b506df1ea3c03386e48a4bd464d06564cbb5f4fe
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250319/68e8263f/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list