[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Nov 26 21:34:47 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2c75b8d3 by Salvatore Bonaccorso at 2025-11-26T22:34:26+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -25,7 +25,7 @@ CVE-2025-65669 (An issue was discovered in classroomio 0.1.13. Student accounts
 CVE-2025-65278 (An issue was discovered in file users.json in GroceryMart commit 21934 ...)
 	NOT-FOR-US: GroceryMart
 CVE-2025-65276 (An unauthenticated administrative access vulnerability exists in the o ...)
-	TODO: check
+	NOT-FOR-US: HashTech
 CVE-2025-65239 (Incorrect access control in the /aux1/ocussd/trace endpoint of OpenCod ...)
 	NOT-FOR-US: OpenCode Systems USSD Gateway OC
 CVE-2025-65238 (Incorrect access control in the getSubUsersByProvider function of Open ...)
@@ -51,25 +51,25 @@ CVE-2025-63938 (Tinyproxy through 1.11.2 contains an integer overflow vulnerabil
 CVE-2025-62728 (SQL injection vulnerability in Hive Metastore Server (HMS) when proces ...)
 	TODO: check
 CVE-2025-62354 (Improper neutralization of special elements used in an OS command ('co ...)
-	TODO: check
+	NOT-FOR-US: Cursor
 CVE-2025-59390 (Apache Druid\u2019s Kerberos authenticator uses a weak fallback secret ...)
 	TODO: check
 CVE-2025-56396 (An issue was discovered in Ruoyi 4.8.1 allowing attackers to gain esca ...)
-	TODO: check
+	NOT-FOR-US: Ruoyi
 CVE-2025-55471 (Incorrect access control in the getUserFormData function of youlai-boo ...)
-	TODO: check
+	NOT-FOR-US: youlai-boot
 CVE-2025-55469 (Incorrect access control in youlai-boot v2.21.1 allows attackers to es ...)
-	TODO: check
+	NOT-FOR-US: youlai-boot
 CVE-2025-50433 (An issue was discovered in imonnit.com (2025-04-24) allowing malicious ...)
-	TODO: check
+	NOT-FOR-US: imonnit.com
 CVE-2025-50402 (FAST FAC1200R F400_FAC1200R_Q is vulnerable to Buffer Overflow in the  ...)
-	TODO: check
+	NOT-FOR-US: FAST FAC1200R F400_FAC1200R_Q
 CVE-2025-50399 (FAST FAC1200R F400_FAC1200R_Q is vulnerable to Buffer Overflow in the  ...)
-	TODO: check
+	NOT-FOR-US: FAST FAC1200R F400_FAC1200R_Q
 CVE-2025-46175 (Ruoyi v4.8.0 is vulnerable to Incorrect Access Control. There is a mis ...)
-	TODO: check
+	NOT-FOR-US: Ruoyi
 CVE-2025-46174 (Ruoyi v4.8.0 vulnerable to Incorrect Access Control. There is a missin ...)
-	TODO: check
+	NOT-FOR-US: Ruoyi
 CVE-2025-45311 (Insecure permissions in fail2ban-client v0.11.2 allows attackers with  ...)
 	TODO: check
 CVE-2025-3747
@@ -77,7 +77,7 @@ CVE-2025-3747
 CVE-2025-2486 (The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI S ...)
 	TODO: check
 CVE-2025-26155 (NCP Secure Enterprise Client 13.18 and NCP Secure Entry Windows Client ...)
-	TODO: check
+	NOT-FOR-US: NCP
 CVE-2025-20373 (In Splunk Add-on for Palo Alto Networks versions below 2.0.2, the add- ...)
 	NOT-FOR-US: Cisco
 CVE-2025-13674 (BPv7 dissector crash in Wireshark 4.6.0 allows denial of service)
@@ -87,13 +87,13 @@ CVE-2025-13611 (GitLab has remediated an issue in GitLab CE/EE affecting all ver
 CVE-2025-13601 (A heap-based buffer overflow problem was found in glib through an inco ...)
 	TODO: check
 CVE-2025-13084 (The users endpoint in the groov View API returns a list of all users a ...)
-	TODO: check
+	NOT-FOR-US: groov View API
 CVE-2025-12653 (GitLab has remediated an issue in GitLab CE/EE affecting all versions  ...)
 	- gitlab <not-affected> (Vulnerable code not present)
 CVE-2025-12571 (GitLab has remediated an issue in GitLab CE/EE affecting all versions  ...)
 	- gitlab <unfixed>
 CVE-2025-11461 (Multiple SQL Injections in Frappe CRM Dashboard Controller due to unsa ...)
-	TODO: check
+	NOT-FOR-US: Frappe CRM
 CVE-2021-4472 (The mistral-dashboard plugin for openstack has a local file inclusion  ...)
 	TODO: check
 CVE-2025-9558 (There is a potential OOB Write vulnerability in the gen_prov_start fun ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2c75b8d3eed585240d3b17a2d865b238a19f5865

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2c75b8d3eed585240d3b17a2d865b238a19f5865
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251126/cc1a8749/attachment.htm>


More information about the debian-security-tracker-commits mailing list