Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
3ad528ec by security tracker role at 2025-05-10T20:12:05+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,4 +1,92 @@
-CVE-2023-53145 [Bluetooth: btsdio: fix use after free bug in btsdio_remove due
to race condition]
+CVE-2025-4514 (A vulnerability, which was classified as critical, has been
found in Z ...)
+ TODO: check
+CVE-2025-4513 (A vulnerability classified as problematic was found in Catalyst
User K ...)
+ TODO: check
+CVE-2025-4512 (A vulnerability classified as problematic has been found in
Inetum IOD ...)
+ TODO: check
+CVE-2025-4511 (A vulnerability was found in vector4wang spring-boot-quick up
to 20250 ...)
+ TODO: check
+CVE-2025-4510 (A vulnerability was found in Changjietong UFIDA CRM 1.0. It has
been d ...)
+ TODO: check
+CVE-2025-4509 (A vulnerability, which was classified as critical, has been
found in P ...)
+ TODO: check
+CVE-2025-4508 (A vulnerability classified as critical was found in PHPGurukul
e-Diary ...)
+ TODO: check
+CVE-2025-4507 (A vulnerability classified as critical has been found in
Campcodes Onl ...)
+ TODO: check
+CVE-2025-4506 (A vulnerability was found in Campcodes Online Food Ordering
System 1.0 ...)
+ TODO: check
+CVE-2025-4505 (A vulnerability was found in PHPGurukul Apartment Visitors
Management ...)
+ TODO: check
+CVE-2025-4504 (A vulnerability was found in SourceCodester Online College
Library Sys ...)
+ TODO: check
+CVE-2025-4503 (A vulnerability was found in Campcodes Sales and Inventory
System 1.0 ...)
+ TODO: check
+CVE-2025-4502 (A vulnerability has been found in Campcodes Sales and Inventory
System ...)
+ TODO: check
+CVE-2025-4501 (A vulnerability, which was classified as critical, was found in
code-p ...)
+ TODO: check
+CVE-2025-4500 (A vulnerability, which was classified as critical, has been
found in c ...)
+ TODO: check
+CVE-2025-4499 (A vulnerability classified as critical was found in
code-projects Simp ...)
+ TODO: check
+CVE-2025-4498 (A vulnerability classified as critical has been found in
code-projects ...)
+ TODO: check
+CVE-2025-4497 (A vulnerability was found in code-projects Simple Banking
System up to ...)
+ TODO: check
+CVE-2025-4496 (A vulnerability was found in TOTOLINK T10, A3100R, A950RG,
A800R, N600 ...)
+ TODO: check
+CVE-2025-4495 (A vulnerability has been found in JAdmin-JAVA JAdmin 1.0 and
classifie ...)
+ TODO: check
+CVE-2025-4494 (A vulnerability, which was classified as critical, was found in
JAdmin ...)
+ TODO: check
+CVE-2025-4492 (A vulnerability, which was classified as critical, has been
found in C ...)
+ TODO: check
+CVE-2025-4491 (A vulnerability classified as critical was found in Campcodes
Online F ...)
+ TODO: check
+CVE-2025-4490 (A vulnerability classified as critical has been found in
Campcodes Onl ...)
+ TODO: check
+CVE-2025-4489 (A vulnerability was found in Campcodes Online Food Ordering
System 1.0 ...)
+ TODO: check
+CVE-2025-4447 (In Eclipse OpenJ9 versions up to 0.51, when used with OpenJDK
version ...)
+ TODO: check
+CVE-2025-47770
+ REJECTED
+CVE-2025-47769
+ REJECTED
+CVE-2025-47768
+ REJECTED
+CVE-2025-47767
+ REJECTED
+CVE-2025-47766
+ REJECTED
+CVE-2025-47765
+ REJECTED
+CVE-2025-47764
+ REJECTED
+CVE-2025-47763
+ REJECTED
+CVE-2025-47762
+ REJECTED
+CVE-2025-47424 (Retool (self-hosted) before 3.196.0 allows Host header
injection. When ...)
+ TODO: check
+CVE-2025-47269 (code-server runs VS Code on any machine anywhere through
browser acces ...)
+ TODO: check
+CVE-2025-3878 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for
WordPr ...)
+ TODO: check
+CVE-2025-3876 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for
WordPr ...)
+ TODO: check
+CVE-2025-3794 (The WPForms \u2013 Easy Form Builder for WordPress \u2013
Contact Form ...)
+ TODO: check
+CVE-2025-2944 (The Jeg Elementor Kit plugin for WordPress is vulnerable to
Stored Cro ...)
+ TODO: check
+CVE-2025-2158 (The WordPress Review Plugin: The Ultimate Solution for Building
a Revi ...)
+ TODO: check
+CVE-2025-1752 (A Denial of Service (DoS) vulnerability has been identified in
the Kno ...)
+ TODO: check
+CVE-2025-1137 (IBM Storage Scale 5.2.2.0 and 5.2.2.1, under certain
configurations, c ...)
+ TODO: check
+CVE-2023-53145 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.197-1
@@ -165,7 +253,7 @@ CVE-2025-3462 ("This issue is limited to motherboards and
does not affect laptop
NOT-FOR-US: ASUS
CVE-2025-3455 (The 1 Click WordPress Migration Plugin \u2013 100% FREE for a
limited ...)
NOT-FOR-US: WordPress plugin
-CVE-2025-37889 (In the Linux kernel, the following vulnerability has been
resolved: P ...)
+CVE-2025-37889 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
- linux 6.12.20-1
[bookworm] - linux 6.1.133-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -127810,7 +127898,7 @@ CVE-2024-27097 (A user endpoint didn't perform
filtering on an incoming paramete
NOT-FOR-US: CKAN
CVE-2024-25653 (Broken Access Control in the Report functionality of Delinea
PAM Secre ...)
NOT-FOR-US: Delinea PAM Secret Server
-CVE-2024-25652 (In Delinea PAM Secret Server 11.4, it is possible for a user
(with acc ...)
+CVE-2024-25652 (In Delinea PAM Secret Server 11.4, it is possible for a user
assigned ...)
NOT-FOR-US: Delinea PAM Secret Server
CVE-2024-25651 (User enumeration can occur in the Authentication REST API in
Delinea P ...)
NOT-FOR-US: Delinea PAM Secret Server
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ad528ecf6fd55d71198a1c01f243754b7ae5bb0
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ad528ecf6fd55d71198a1c01f243754b7ae5bb0
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits