[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Mar 29 08:17:31 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0ab924cd by Salvatore Bonaccorso at 2025-03-29T09:17:04+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -15,23 +15,23 @@ CVE-2025-31368
 CVE-2025-31367
 	REJECTED
 CVE-2025-2927 (A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been c ...)
-	TODO: check
+	NOT-FOR-US: ESAFENET
 CVE-2025-2840 (The DAP to Autoresponders Email Syncing plugin for WordPress is vulner ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-2803 (The So-Called Air Quotes plugin for WordPress is vulnerable to arbitra ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-2782 (The WatchGuard Terminal Services Agent on Windows does not properly co ...)
 	TODO: check
 CVE-2025-2781 (The WatchGuard Mobile VPN with SSL Client on Windows does not properly ...)
 	TODO: check
 CVE-2025-2266 (The Checkout Mestres do WP for WooCommerce plugin for WordPress is vul ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-2249 (The SoJ SoundSlides plugin for WordPress is vulnerable to arbitrary fi ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-2006 (The Inline Image Upload for BBPress plugin for WordPress is vulnerable ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-28256 (An issue in TOTOLINK A3100R V4.1.2cu.5247_B20211129 allows a remote at ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2025-28254 (Cross Site Scripting vulnerability in Leantime v3.2.1 and before allow ...)
 	TODO: check
 CVE-2025-28097 (OneNav 1.1.0 is vulnerable to Cross Site Scripting (XSS) in custom hea ...)
@@ -53,11 +53,11 @@ CVE-2025-28089 (maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Fo
 CVE-2025-28087 (Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection v ...)
 	TODO: check
 CVE-2025-25579 (TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injecti ...)
-	TODO: check
+	NOT-FOR-US: TOTOLINK
 CVE-2025-22953 (A SQL injection vulnerability exists in the Epicor HCM 2021 1.9, speci ...)
 	TODO: check
 CVE-2024-7577 (IBM InfoSphere Information Server 11.7 could disclose sensitive user c ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-6875 (A vulnerability was found in the Infinispan component in Red Hat Data  ...)
 	TODO: check
 CVE-2024-58130 (In app/Controller/Component/RestResponseComponent.php in MISP before 2 ...)
@@ -71,9 +71,9 @@ CVE-2024-57083 (A prototype pollution in the component Module.mergeObjects (redo
 CVE-2024-56975 (InvoicePlane (all versions tested as of December 2024) v.1.6.11 and be ...)
 	TODO: check
 CVE-2024-51477 (IBM InfoSphere Information Server 11.7   could allow an authenticated  ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-43186 (IBM InfoSphere Information Server 11.7 could allow an authenticated us ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2024-38988 (alizeait unflatto <= 1.0.2 was discovered to contain a prototype pollu ...)
 	TODO: check
 CVE-2024-38985 (janryWang products depath v1.0.6 and cool-path v1.1.2 were discovered  ...)
@@ -83,9 +83,9 @@ CVE-2024-24292 (A Prototype Pollution issue in Aliconnect /sdk v.0.0.6 allows an
 CVE-2024-23338
 	REJECTED
 CVE-2024-13557 (The Shortcodes by United Themes plugin for WordPress is vulnerable to  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2024-11180 (The ElementsKit Elementor addons plugin for WordPress is vulnerable to ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2025-31474 (Cross-Site Request Forgery (CSRF) vulnerability in matthewprice1178 WP ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-31473 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ab924cd06f1384e7f1bea78845fcff952d68aca

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ab924cd06f1384e7f1bea78845fcff952d68aca
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250329/6bd00ef5/attachment.htm>


More information about the debian-security-tracker-commits mailing list