[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri May 30 09:24:40 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
078515b3 by Salvatore Bonaccorso at 2025-05-30T10:24:24+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -77,9 +77,9 @@ CVE-2025-48068 (Next.js is a React framework for building full-stack web applica
CVE-2025-47952 (Traefik (pronounced traffic) is an HTTP reverse proxy and load balance ...)
- traefik <itp> (bug #983289)
CVE-2025-47697 (Client-side enforcement of server-side security issue exists in wivia ...)
- TODO: check
+ NOT-FOR-US: wivia
CVE-2025-46352 (The CS5000 Fire Panel is vulnerable due to a hard-coded password that ...)
- TODO: check
+ NOT-FOR-US: CS5000 Fire Panel
CVE-2025-44906 (jhead v3.08 was discovered to contain a heap-use-after-free via the Pr ...)
TODO: check
CVE-2025-44905 (hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the ...)
@@ -87,17 +87,17 @@ CVE-2025-44905 (hdf5 v1.14.6 was discovered to contain a heap buffer overflow vi
CVE-2025-44904 (hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the ...)
TODO: check
CVE-2025-44619 (Tinxy WiFi Lock Controller v1 RF was discovered to be configured to tr ...)
- TODO: check
+ NOT-FOR-US: Tinxy
CVE-2025-44614 (Tinxy WiFi Lock Controller v1 RF was discovered to store users' sensit ...)
- TODO: check
+ NOT-FOR-US: Tinxy
CVE-2025-44612 (Tinxy WiFi Lock Controller v1 RF was discovered to transmit sensitive ...)
- TODO: check
+ NOT-FOR-US: Tinxy
CVE-2025-41438 (The CS5000 Fire Panel is vulnerable due to a default account that exis ...)
- TODO: check
+ NOT-FOR-US: CS5000 Fire Panel
CVE-2025-41406 (Cross-site scripting vulnerability exists in wivia 5 all versions. If ...)
- TODO: check
+ NOT-FOR-US: wivia
CVE-2025-41385 (An OS Command Injection issue exists in wivia 5 all versions. If this ...)
- TODO: check
+ NOT-FOR-US: wivia
CVE-2025-41235 (Spring Cloud Gateway Server forwards the X-Forwarded-Forand Forwardedh ...)
TODO: check
CVE-2025-31264 (An authentication issue was addressed with improved state management. ...)
@@ -117,7 +117,7 @@ CVE-2025-31189 (A file quarantine bypass was addressed with additional checks. T
CVE-2025-30466 (This issue was addressed through improved state management. This issue ...)
NOT-FOR-US: Apple
CVE-2025-1907 (Instantel Micromate lacks authentication on a configuration port which ...)
- TODO: check
+ NOT-FOR-US: Instantel Micromate
CVE-2020-36846 (A buffer overflow, as described in CVE-2020-8927, exists in the embedd ...)
- libio-compress-brotli-perl <not-affected> (Debian package uses the system library from the initial packaging)
NOTE: https://lists.security.metacpan.org/cve-announce/msg/30005245/
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/078515b3ca7a957b3331c1bf381bbe7e60ba1c49
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/078515b3ca7a957b3331c1bf381bbe7e60ba1c49
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250530/de68ef49/attachment.htm>
More information about the debian-security-tracker-commits
mailing list