[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Nov 24 20:35:43 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
5b2027ef by Salvatore Bonaccorso at 2025-11-24T21:35:13+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,7 +1,7 @@
CVE-2025-65998 (Apache Syncope can be configured to store the user password values in ...)
NOT-FOR-US: Apache software not packaged in Debian
CVE-2025-65503 (Use after free in endpoint destructors in Redboltz async_mqtt 10.2.5 a ...)
- TODO: check
+ NOT-FOR-US: Redboltz async_mqtt
CVE-2025-65502 (Null pointer dereference in add_ca_certs() in Cesanta Mongoose before ...)
TODO: check
CVE-2025-65501 (Null pointer dereference in coap_dtls_info_callback() in OISM libcoap ...)
@@ -50,61 +50,61 @@ CVE-2025-65493 (NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4
NOTE: https://github.com/obgm/libcoap/issues/1743
NOTE: https://github.com/obgm/libcoap/pull/1750
CVE-2025-64048 (YCCMS 3.4 contains a stored cross-site scripting (XSS) vulnerability i ...)
- TODO: check
+ NOT-FOR-US: YCCMS
CVE-2025-64047 (OpenRapid RapidCMS 1.3.1 is vulnerable to Cross Site Scripting (XSS) i ...)
- TODO: check
+ NOT-FOR-US: OpenRapid RapidCMS
CVE-2025-63958 (MILLENSYS Vision Tools Workspace 6.5.0.2585 exposes a sensitive config ...)
- TODO: check
+ NOT-FOR-US: MILLENSYS Vision Tools Workspace
CVE-2025-63953 (A Cross-Site Request Forgery (CSRF) in the /usapi?method=add-user comp ...)
- TODO: check
+ NOT-FOR-US: Magewell Pro Convert
CVE-2025-63952 (A Cross-Site Request Forgery (CSRF) in the /mwapi?method=add-user comp ...)
- TODO: check
+ NOT-FOR-US: Magewell Pro Convert
CVE-2025-63914 (An issue was discovered in Cinnamon kotaemon 0.11.0. The _may_extract_ ...)
- TODO: check
+ NOT-FOR-US: Cinnamon kotaemon
CVE-2025-63435 (Xtooltech Xtool AnyScan Android Application 4.40.40 is Missing Authent ...)
- TODO: check
+ NOT-FOR-US: Xtooltech Xtool AnyScan Android Application
CVE-2025-63434 (The update mechanism in Xtooltech Xtool AnyScan Android Application 4. ...)
- TODO: check
+ NOT-FOR-US: Xtooltech Xtool AnyScan Android Application
CVE-2025-63433 (Xtooltech Xtool AnyScan Android Application 4.40.40 and prior uses a h ...)
- TODO: check
+ NOT-FOR-US: Xtooltech Xtool AnyScan Android Application
CVE-2025-63432 (Xtooltech Xtool AnyScan Android Application 4.40.40 and prior is Missi ...)
- TODO: check
+ NOT-FOR-US: Xtooltech Xtool AnyScan Android Application
CVE-2025-60917 (A reflected cross-site scripting (XSS) vulnerability in the /overview/ ...)
- TODO: check
+ NOT-FOR-US: Austrian Archaeological Institute Openatlas
CVE-2025-60916 (A reflected cross-site scripting (XSS) vulnerability in the /overview/ ...)
- TODO: check
+ NOT-FOR-US: Austrian Archaeological Institute Openatlas
CVE-2025-60915 (An issue in the size query parameter (/views/file.py) of Austrian Arch ...)
- TODO: check
+ NOT-FOR-US: Austrian Archaeological Institute Openatlas
CVE-2025-60914 (Incorrect access control in Austrian Archaeological Institute Openatla ...)
- TODO: check
+ NOT-FOR-US: Austrian Archaeological Institute Openatlas
CVE-2025-60638 (An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attac ...)
- TODO: check
+ NOT-FOR-US: Free5GC
CVE-2025-60633 (An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attac ...)
- TODO: check
+ NOT-FOR-US: Free5GC
CVE-2025-60632 (An issue was discovered in Free5GC v4.0.0 and v4.0.1 allowing an attac ...)
- TODO: check
+ NOT-FOR-US: Free5GC
CVE-2025-56423 (An issue in Austrian Academy of Sciences (AW) Austrian Archaeological ...)
- TODO: check
+ NOT-FOR-US: Austrian Archaeological Institute Openatlas
CVE-2025-56401 (ZIRA Group WBRM 7.0 is vulnerable to SQL Injection in referenceLookups ...)
- TODO: check
+ NOT-FOR-US: ZIRA Group WBRM
CVE-2025-56400 (Cross-Site Request Forgery (CSRF) vulnerability in the OAuth implement ...)
- TODO: check
+ NOT-FOR-US: Tuya SDK
CVE-2025-52539 (A buffer overflow with Xilinx Run Time Environment may allow a local a ...)
TODO: check
CVE-2025-44018 (A firmware downgrade vulnerability exists in the OTA Update functional ...)
- TODO: check
+ NOT-FOR-US: GL-Inet GL-AXT1800
CVE-2025-41729 (An unauthenticated remote attacker can send a specially crafted Modbus ...)
- TODO: check
+ NOT-FOR-US: Janitza
CVE-2025-41087 (Cross-Site Scripting (XSS) vulnerability stored in tha Taclia web appl ...)
- TODO: check
+ NOT-FOR-US: Taclia web application
CVE-2025-41017 (Inadequate access control vulnerability in Davantis DDFUSION v6.177.7, ...)
- TODO: check
+ NOT-FOR-US: Davantis DDFUSION
CVE-2025-41016 (Inadequate access control vulnerability in Davantis DFUSION v6.177.7, ...)
- TODO: check
+ NOT-FOR-US: Davantis DDFUSION
CVE-2025-36112 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 thro ...)
NOT-FOR-US: IBM
CVE-2025-13609 (A vulnerability has been identified in keylime where an attacker can e ...)
- TODO: check
+ NOT-FOR-US: Keylime
CVE-2025-13598
REJECTED
CVE-2025-13594
@@ -126,11 +126,11 @@ CVE-2025-12970 (The extract_name function in Fluent Bit in_docker input plugin c
CVE-2025-12969 (Fluent Bit in_forward input plugin does not properly enforce the secur ...)
TODO: check
CVE-2025-12741 (A Looker user with Developer role could create a database connection u ...)
- TODO: check
+ NOT-FOR-US: Looker
CVE-2025-12740 (A Looker user with a Developer role could create a database connection ...)
- TODO: check
+ NOT-FOR-US: Looker
CVE-2025-12739 (An attacker with viewer permissions in Looker could craft a malicious ...)
- TODO: check
+ NOT-FOR-US: Looker
CVE-2025-12628 (The WP 2FA WordPress plugin does not generate backup codes with enough ...)
NOT-FOR-US: WordPress plugin
CVE-2025-11921 (iStats contains an insecure XPC service that allows local, unprivilege ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5b2027ef6551870a6ffcb62720a88c5245285b08
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5b2027ef6551870a6ffcb62720a88c5245285b08
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251124/e97d5352/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list