Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
42d4f897 by Salvatore Bonaccorso at 2025-03-12T09:13:16+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -27,13 +27,13 @@ CVE-2025-2209 (A vulnerability, which was classified as 
problematic, was found i
 CVE-2025-2208 (A vulnerability, which was classified as problematic, has been 
found i ...)
        TODO: check
 CVE-2025-2205 (The GDPR Cookie Compliance \u2013 Cookie Banner, Cookie 
Consent, Cooki ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-2078 (The BlogBuzzTime for WP plugin for WordPress is vulnerable to 
Stored C ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-2077 (The Simple Amazon Affiliate plugin for WordPress is vulnerable 
to Refl ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-2076 (The binlayerpress plugin for WordPress is vulnerable to Stored 
Cross-S ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-2023 (Ashlar-Vellum Cobalt LI File Parsing Integer Overflow Remote 
Code Exec ...)
        TODO: check
 CVE-2025-2022 (Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code 
Execut ...)
@@ -185,31 +185,31 @@ CVE-2025-28856 (Cross-Site Request Forgery (CSRF) 
vulnerability in dangrossman W
 CVE-2025-27792 (Opal is OBiBa\u2019s core database application for biobanks or 
epidemi ...)
        TODO: check
 CVE-2025-27181 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a Us ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2025-27180 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by an o ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2025-27173 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a He ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2025-27101 (Opal is OBiBa\u2019s core database application for biobanks or 
epidemi ...)
        TODO: check
 CVE-2025-24912 (hostapd fails to process crafted RADIUS packets properly. When 
hostapd ...)
        TODO: check
 CVE-2025-21170 (Substance3D - Modeler versions 1.15.0 and earlier are affected 
by a NU ...)
-       TODO: check
+       NOT-FOR-US: Adobe
 CVE-2025-1707 (The Review Schema plugin for WordPress is vulnerable to Local 
File Inc ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-1508 (The WP Crowdfunding plugin for WordPress is vulnerable to 
unauthorized ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-0900 (PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read 
Information Dis ...)
        TODO: check
 CVE-2024-58087 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
        TODO: check
 CVE-2024-13838 (The Uncanny Automator \u2013 Easy Automation, Integration, 
Webhooks &  ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-13498 (The NEX-Forms \u2013 Ultimate Form Builder \u2013 Contact 
forms and mu ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2024-12589 (The Finale Lite \u2013 Sales Countdown Timer & Discount for 
WooCommerc ...)
-       TODO: check
+       NOT-FOR-US: WordPress plugin
 CVE-2025-2207 (A vulnerability classified as problematic was found in 
aitangbao sprin ...)
        TODO: check
 CVE-2025-2206 (A vulnerability classified as problematic has been found in 
aitangbao  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42d4f897509e685010cab73f7d73cf5aa6df3c9c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42d4f897509e685010cab73f7d73cf5aa6df3c9c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to