Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f4486b39 by Moritz Muehlenhoff at 2025-08-27T12:07:00+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -55,7 +55,7 @@ CVE-2025-35112 (Agiloft Release 28 contains an XML External 
Entities vulnerabili
 CVE-2025-26417 (In checkWhetherCallingAppHasAccess of DownloadProvider.java, 
there is  ...)
        NOT-FOR-US: Android
 CVE-2025-22413 (In multiple functions of hyp-main.c, there is a possible 
privilege esc ...)
-       TODO: check
+       NOT-FOR-US: Android-specific Linux patch
 CVE-2025-22412 (In multiple functions of sdp_server.cc, there is a possible 
use after  ...)
        NOT-FOR-US: Android
 CVE-2025-22411 (In process_service_attr_rsp of sdp_discovery.cc, there is a 
possible u ...)
@@ -107,7 +107,7 @@ CVE-2024-47192 (An issue was discovered in Mahara 23.04.8 
and 24.04.4. The use o
 CVE-2024-35203 (Mahara before 22.10.6, 23.04.6, and 24.04.1 allows cross-site 
scriptin ...)
        - mahara <removed>
 CVE-2021-4459 (An authorized remote attacker can access files and directories 
outside ...)
-       TODO: check
+       NOT-FOR-US: SMA Boy
 CVE-2025-9491 (Microsoft Windows LNK File UI Misrepresentation Remote Code 
Execution  ...)
        NOT-FOR-US: Microsoft
 CVE-2025-9483 (A flaw has been found in Linksys RE6250, RE6300, RE6350, 
RE6500, RE700 ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4486b3965179d32df7b36553bf1199028f327a9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4486b3965179d32df7b36553bf1199028f327a9
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to