Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
831e87be by Salvatore Bonaccorso at 2025-01-28T21:27:41+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,49 +1,49 @@
 CVE-2025-24800 (Hyperbridge is a hyper-scalable coprocessor for verifiable, 
cross-chai ...)
-       TODO: check
+       NOT-FOR-US: Hyperbridge
 CVE-2025-24480 (A Remote Code Execution Vulnerability exists in the product 
and versio ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation
 CVE-2025-24479 (A Local Code Execution Vulnerability exists in the product and 
version ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation
 CVE-2025-24478 (A denial-of-service vulnerability exists in the affected 
products. The ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation
 CVE-2025-23385 (In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 
2024.1.7, Rider  ...)
-       TODO: check
+       NOT-FOR-US: JetBrains ReSharper
 CVE-2025-23213 (Tandoor Recipes is an application for managing recipes, 
planning meals ...)
-       TODO: check
+       NOT-FOR-US: Tandoor Recipes
 CVE-2025-23212 (Tandoor Recipes is an application for managing recipes, 
planning meals ...)
-       TODO: check
+       NOT-FOR-US: Tandoor Recipes
 CVE-2025-23211 (Tandoor Recipes is an application for managing recipes, 
planning meals ...)
-       TODO: check
+       NOT-FOR-US: Tandoor Recipes
 CVE-2025-23057 (A vulnerability in the web management interface of HPE Aruba 
Networkin ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2025-23056 (A vulnerability in the web management interface of HPE Aruba 
Networkin ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2025-23055 (A vulnerability in the web management interface of HPE Aruba 
Networkin ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2025-23054 (A vulnerability in the web-based management interface of HPE 
Aruba Net ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2025-23053 (A privilege escalation vulnerability exists in the web-based 
managemen ...)
-       TODO: check
+       NOT-FOR-US: HPE
 CVE-2025-23045 (Computer Vision Annotation Tool (CVAT) is an interactive video 
and ima ...)
-       TODO: check
+       NOT-FOR-US: Computer Vision Annotation Tool (CVAT)
 CVE-2025-22217 (Avi Load Balancer contains an unauthenticated blind SQL 
Injection vuln ...)
-       TODO: check
+       NOT-FOR-US: Avi Load Balancer
 CVE-2025-0784 (A vulnerability has been found in Intelbras InControl up to 
2.21.58 an ...)
-       TODO: check
+       NOT-FOR-US: Intelbras InControl
 CVE-2025-0783 (A vulnerability, which was classified as problematic, was found 
in pan ...)
-       TODO: check
+       NOT-FOR-US: pankajindevops scale
 CVE-2025-0659 (A path traversal vulnerability exists in the Rockwell 
Automation DataE ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation
 CVE-2025-0631 (A Credential Exposure Vulnerability exists in the 
above-mentioned prod ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation
 CVE-2025-0432 (EWON Flexy 202 transmits user credentials in clear text with no 
encryp ...)
-       TODO: check
+       NOT-FOR-US: EWON Flexy
 CVE-2025-0290 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
        TODO: check
 CVE-2025-0065 (Improper Neutralization of Argument Delimiters in the 
TeamViewer_servi ...)
-       TODO: check
+       NOT-FOR-US: TeamViewer
 CVE-2024-8401 (CWE-79: Improper Neutralization of Input During Web Page 
Generation (\ ...)
-       TODO: check
+       NOT-FOR-US: Schneider Electric
 CVE-2024-7881 (An unprivileged context can trigger a data memory-dependent 
prefetch e ...)
        TODO: check
 CVE-2024-6351 (A malformed packet can cause a buffer overflow in the NWK/APS 
layer of ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/831e87bef7d353da7132b4e0941fdcd18fa18592

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/831e87bef7d353da7132b4e0941fdcd18fa18592
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to