Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 27ff316a by security tracker role at 2025-04-07T08:11:59+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,123 @@ +CVE-2025-3343 (A vulnerability was found in codeprojects Online Restaurant Management ...) + TODO: check +CVE-2025-3342 (A vulnerability has been found in codeprojects Online Restaurant Manag ...) + TODO: check +CVE-2025-3341 (A vulnerability, which was classified as critical, was found in codepr ...) + TODO: check +CVE-2025-3340 (A vulnerability, which was classified as critical, has been found in c ...) + TODO: check +CVE-2025-3339 (A vulnerability classified as critical was found in codeprojects Onlin ...) + TODO: check +CVE-2025-3338 (A vulnerability classified as critical has been found in codeprojects ...) + TODO: check +CVE-2025-3337 (A vulnerability was found in codeprojects Online Restaurant Management ...) + TODO: check +CVE-2025-3336 (A vulnerability was found in codeprojects Online Restaurant Management ...) + TODO: check +CVE-2025-3335 (A vulnerability was found in codeprojects Online Restaurant Management ...) + TODO: check +CVE-2025-3334 (A vulnerability was found in codeprojects Online Restaurant Management ...) + TODO: check +CVE-2025-3333 (A vulnerability has been found in codeprojects Online Restaurant Manag ...) + TODO: check +CVE-2025-3332 (A vulnerability, which was classified as critical, was found in codepr ...) + TODO: check +CVE-2025-3331 (A vulnerability, which was classified as critical, has been found in c ...) + TODO: check +CVE-2025-3330 (A vulnerability classified as critical was found in codeprojects Onlin ...) + TODO: check +CVE-2025-3329 (A vulnerability classified as problematic has been found in Consumer C ...) + TODO: check +CVE-2025-3328 (A vulnerability was found in Tenda AC1206 15.03.06.23. It has been cla ...) + TODO: check +CVE-2025-3327 (A vulnerability was found in iteaj iboot \u7269\u8054\u7f51\u7f51\u517 ...) + TODO: check +CVE-2025-3326 (A vulnerability has been found in iteaj iboot \u7269\u8054\u7f51\u7f51 ...) + TODO: check +CVE-2025-3325 (A vulnerability, which was classified as problematic, was found in ite ...) + TODO: check +CVE-2025-3324 (A vulnerability, which was classified as critical, has been found in g ...) + TODO: check +CVE-2025-3323 (A vulnerability classified as critical was found in godcheese/code-pro ...) + TODO: check +CVE-2025-31175 (Deserialization mismatch vulnerability in the DSoftBus module Impact: ...) + TODO: check +CVE-2025-31174 (Path traversal vulnerability in the DFS module Impact: Successful expl ...) + TODO: check +CVE-2025-31173 (Memory write permission bypass vulnerability in the kernel futex modul ...) + TODO: check +CVE-2025-31172 (Memory write permission bypass vulnerability in the kernel futex modul ...) + TODO: check +CVE-2025-31171 (File read permission bypass vulnerability in the kernel file system mo ...) + TODO: check +CVE-2025-31170 (Access control vulnerability in the security verification module Impac ...) + TODO: check +CVE-2025-27534 (in OpenHarmony v5.0.2 and prior versions allow a local attacker case D ...) + TODO: check +CVE-2025-25057 (in OpenHarmony v5.0.2 and prior versions allow a local attacker case D ...) + TODO: check +CVE-2025-24304 (in OpenHarmony v5.0.2 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2025-22851 (in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitr ...) + TODO: check +CVE-2025-22842 (in OpenHarmony v5.0.2 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2025-22452 (in OpenHarmony v5.0.2 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2025-20664 (In wlan AP driver, there is a possible information disclosure due to a ...) + TODO: check +CVE-2025-20663 (In wlan AP driver, there is a possible information disclosure due to a ...) + TODO: check +CVE-2025-20662 (In PlayReady TA, there is a possible out of bounds read due to a missi ...) + TODO: check +CVE-2025-20661 (In PlayReady TA, there is a possible out of bounds read due to a missi ...) + TODO: check +CVE-2025-20660 (In PlayReady TA, there is a possible out of bounds read due to a missi ...) + TODO: check +CVE-2025-20659 (In Modem, there is a possible system crash due to improper input valid ...) + TODO: check +CVE-2025-20658 (In DA, there is a possible permission bypass due to a logic error. Thi ...) + TODO: check +CVE-2025-20657 (In vdec, there is a possible permission bypass due to improper input v ...) + TODO: check +CVE-2025-20656 (In DA, there is a possible out of bounds write due to a missing bounds ...) + TODO: check +CVE-2025-20655 (In keymaster, there is a possible out of bounds read due to a missing ...) + TODO: check +CVE-2025-20654 (In wlan service, there is a possible out of bounds write due to an inc ...) + TODO: check +CVE-2025-20102 (in OpenHarmony v5.0.2 and prior versions allow a local attacker cause ...) + TODO: check +CVE-2024-58127 (Access control vulnerability in the security verification module Impac ...) + TODO: check +CVE-2024-58126 (Access control vulnerability in the security verification module Impac ...) + TODO: check +CVE-2024-58125 (Access control vulnerability in the security verification module Impac ...) + TODO: check +CVE-2024-58124 (Access control vulnerability in the security verification module Impac ...) + TODO: check +CVE-2024-58116 (Buffer overflow vulnerability in the SVG parsing module of the ArkUI f ...) + TODO: check +CVE-2024-58115 (Buffer overflow vulnerability in the SVG parsing module of the ArkUI f ...) + TODO: check +CVE-2024-58113 (Vulnerability of improper resource management in the memory management ...) + TODO: check +CVE-2024-58112 (Exception capture failure vulnerability in the SVG parsing module of t ...) + TODO: check +CVE-2024-58111 (Exception capture failure vulnerability in the SVG parsing module of t ...) + TODO: check +CVE-2024-58110 (Buffer overflow vulnerability in the codec module Impact: Successful e ...) + TODO: check +CVE-2024-58109 (Buffer overflow vulnerability in the codec module Impact: Successful e ...) + TODO: check +CVE-2024-58108 (Buffer overflow vulnerability in the codec module Impact: Successful e ...) + TODO: check +CVE-2024-58107 (Buffer overflow vulnerability in the codec module Impact: Successful e ...) + TODO: check +CVE-2024-58106 (Buffer overflow vulnerability in the codec module Impact: Successful e ...) + TODO: check +CVE-2024-11071 (Permissive Cross-domain Policy with Untrusted Domains vulnerability in ...) + TODO: check CVE-2025-3318 (A vulnerability classified as critical was found in Kenj_Frog \u80af\u ...) NOT-FOR-US: Kenj_Frog company-financial-management CVE-2025-3317 (A vulnerability classified as problematic has been found in fumiao ope ...) @@ -4716,7 +4836,7 @@ CVE-2025-30355 (Synapse is an open source Matrix homeserver implementation. A ma NOTE: https://github.com/element-hq/synapse/security/advisories/GHSA-v56r-hwv5-mxg6 NOTE: https://github.com/element-hq/synapse/commit/2277df2a1eb685f85040ef98fa21d41aa4cdd389 (v1.127.1) CVE-2025-31160 (atop through 2.11.0 allows local users to cause a denial of service (e ...) - {DSA-5892-1} + {DSA-5892-1 DLA-4117-1} - atop 2.11.1-1 NOTE: https://www.openwall.com/lists/oss-security/2025/03/26/2 NOTE: https://github.com/Atoptool/atop/issues/334 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/27ff316abd3774193bc1898dbd57d87471891b9c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/27ff316abd3774193bc1898dbd57d87471891b9c You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits