Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d697fbdd by Moritz Muehlenhoff at 2025-04-01T10:42:44+02:00
auto-nfu: Add rule for Netgear

- - - - -
1ffeed4d by Moritz Muehlenhoff at 2025-04-01T11:00:19+02:00
NFUs

- - - - -


2 changed files:

- data/CVE/list
- data/packages/nfu.yaml


Changes:

=====================================
data/CVE/list
=====================================
@@ -485,7 +485,7 @@ CVE-2025-24095 (This issue was addressed with additional 
entitlement checks. Thi
 CVE-2025-22277 (Authentication Bypass Using an Alternate Path or Channel 
vulnerability ...)
        NOT-FOR-US: WordPress plugin or theme
 CVE-2025-21384 (An authenticated attacker can exploit an Server-Side Request 
Forgery ( ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2025-1986 (The Gutentor  WordPress plugin before 3.4.7 does not sanitize 
and esca ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-1665 (The Avada (Fusion) Builder plugin for WordPress is vulnerable 
to Store ...)
@@ -497,27 +497,27 @@ CVE-2025-1512 (The PowerPack Elementor Addons (Free 
Widgets, Extensions and Temp
 CVE-2025-1267 (The Groundhogg plugin for Wordpress is vulnerable to Stored 
Cross-Site ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-0418 (Valmet DNA user passwords in plain text.This practice poses a 
security ...)
-       TODO: check
+       NOT-FOR-US: Valmet DNA
 CVE-2025-0417 (Lack of protection against brute force attacks in Valmet DNA 
visualiza ...)
-       TODO: check
+       NOT-FOR-US: Valmet DNA
 CVE-2025-0416 (Local privilege escalation through insecure DCOM configuration 
in Valm ...)
-       TODO: check
+       NOT-FOR-US: Valmet DNA
 CVE-2024-54809 (Netgear Inc WNR854T 1.5.2 (North America) contains a 
stack-based buffe ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54808 (Netgear WNR854T 1.5.2 (North America) contains a stack-based 
buffer ov ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54807 (In Netgear WNR854T 1.5.2 (North America), the UPNP service is 
vulnerab ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54806 (Netgear WNR854T 1.5.2 (North America) is vulnerable to 
Arbitrary comma ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54805 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command 
Injecti ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54804 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command 
Injecti ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54803 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command 
Injecti ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54802 (In Netgear WNR854T 1.5.2 (North America), the UPNP service 
(/usr/sbin/ ...)
-       TODO: check
+       NOT-FOR-US: Netgear
 CVE-2024-54533 (A permissions issue was addressed with additional sandbox 
restrictions ...)
        NOT-FOR-US: Apple
 CVE-2024-40864 (The issue was addressed with improved handling of protocols. 
This issu ...)
@@ -552,7 +552,7 @@ CVE-2025-3048 (After completing a build with AWS Serverless 
Application Model Co
 CVE-2025-3047 (When running the AWS Serverless Application Model Command Line 
Interfa ...)
        NOT-FOR-US: Amazon
 CVE-2025-3027 (The vulnerability exists in the EJBCA service, version 8.0 
Enterprise. ...)
-       TODO: check
+       NOT-FOR-US: EJBCA
 CVE-2025-3026 (The vulnerability exists in the EJBCA service, version 8.0 
Enterprise. ...)
        NOT-FOR-US: EJBCA
 CVE-2025-3022 (Os command injection vulnerability in e-solutions e-management. 
This v ...)


=====================================
data/packages/nfu.yaml
=====================================
@@ -183,6 +183,8 @@
   description: '.*\b(?i:d-link)\b.*'
 - reason: ESAFENET
   description: '.*\bESAFENET\b.*'
+- reason: Netgear
+  description: '.*\b(?i:Netgear)\b.*'
 - reason: Linksys
   description: '.*\b(?i:Linksys)\b.*'
 - reason: OpenEMR



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ad936de243e2efe4aca2b4c9f4644b221f689c7c...1ffeed4d2fc65a839be303463c322917e2a15149

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ad936de243e2efe4aca2b4c9f4644b221f689c7c...1ffeed4d2fc65a839be303463c322917e2a15149
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to