Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7e73986f by security tracker role at 2025-05-26T20:12:46+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,72 @@
-CVE-2025-37992 [net_sched: Flush gso_skb list too during ->change()]
+CVE-2025-5203 (A vulnerability was found in Open Asset Import Library Assimp 
5.4.3. I ...)
+       TODO: check
+CVE-2025-5202 (A vulnerability was found in Open Asset Import Library Assimp 
5.4.3. I ...)
+       TODO: check
+CVE-2025-5201 (A vulnerability was found in Open Asset Import Library Assimp 
5.4.3. I ...)
+       TODO: check
+CVE-2025-5200 (A vulnerability was found in Open Asset Import Library Assimp 
5.4.3 an ...)
+       TODO: check
+CVE-2025-5196 (A vulnerability has been found in Wing FTP Server up to 7.4.3 
and clas ...)
+       TODO: check
+CVE-2025-5186 (A vulnerability was found in thinkgem JeeSite up to 5.11.1. It 
has bee ...)
+       TODO: check
+CVE-2025-5185 (A vulnerability was found in Summer Pearl Group Vacation Rental 
Manage ...)
+       TODO: check
+CVE-2025-5184 (A vulnerability was found in Summer Pearl Group Vacation Rental 
Manage ...)
+       TODO: check
+CVE-2025-5183 (A vulnerability was found in Summer Pearl Group Vacation Rental 
Manage ...)
+       TODO: check
+CVE-2025-5182 (A vulnerability has been found in Summer Pearl Group Vacation 
Rental M ...)
+       TODO: check
+CVE-2025-5181 (A vulnerability, which was classified as problematic, was found 
in Sum ...)
+       TODO: check
+CVE-2025-5180 (A vulnerability, which was classified as critical, has been 
found in W ...)
+       TODO: check
+CVE-2025-5179 (A vulnerability classified as problematic was found in Realce 
Tecnolog ...)
+       TODO: check
+CVE-2025-5178 (A vulnerability classified as critical has been found in Realce 
Tecnol ...)
+       TODO: check
+CVE-2025-5177 (A vulnerability was found in Realce Tecnologia Queue Ticket 
Kiosk up t ...)
+       TODO: check
+CVE-2025-5176 (A vulnerability was found in Realce Tecnologia Queue Ticket 
Kiosk up t ...)
+       TODO: check
+CVE-2025-4057 (A flaw was found in ActiveMQ Artemis. The password generated by 
active ...)
+       TODO: check
+CVE-2025-4053 (The datastored inBe-Tech Mifare Classic cardis stored in 
cleartext.An  ...)
+       TODO: check
+CVE-2025-41655 (An unauthenticated remote attacker can access a URL which 
causes the d ...)
+       TODO: check
+CVE-2025-41654 (An unauthenticated remote attacker can access information 
about runnin ...)
+       TODO: check
+CVE-2025-40672 (A Privilege Escalation vulnerability has been found in 
ProactivaNet v3 ...)
+       TODO: check
+CVE-2025-40671 (SQL injection vulnerability in AES Multimedia's Gestnet v1.07. 
This vu ...)
+       TODO: check
+CVE-2025-40667 (Missing authorization vulnerability in TCMAN's GIM v11. This 
allows an ...)
+       TODO: check
+CVE-2025-40666 (Time-based blind SQL injection vulnerabilities in TCMAN's GIM 
v11. The ...)
+       TODO: check
+CVE-2025-40665 (Time-based blind SQL injection vulnerabilities in TCMAN's GIM 
v11. The ...)
+       TODO: check
+CVE-2025-40664 (Missing authentication vulnerability in TCMAN GIM v11. This 
allows an  ...)
+       TODO: check
+CVE-2025-40663 (Stored Cross-Site Scripting (XSS) vulnerability in i2A-Cronos 
version  ...)
+       TODO: check
+CVE-2025-40653 (User enumeration vulnerability in M3M Printer Server Web. This 
issue o ...)
+       TODO: check
+CVE-2025-40652 (Stored Cross-Site Scripting (XSS) vulnerability in the 
CoverManager bo ...)
+       TODO: check
+CVE-2025-40650 (Insecure Direct Object Reference (IDOR) vulnerability in 
Clickedu. Thi ...)
+       TODO: check
+CVE-2025-39498 (Insertion of Sensitive Information Into Sent Data 
vulnerability in Spo ...)
+       TODO: check
+CVE-2025-23394 (A UNIX Symbolic Link (Symlink) Following vulnerability in 
openSUSE Tum ...)
+       TODO: check
+CVE-2025-23392 (A Improper Neutralization of Script-Related HTML Tags in a Web 
Page (B ...)
+       TODO: check
+CVE-2025-1985 (Due to improper neutralization of input during web page 
generation (XS ...)
+       TODO: check
+CVE-2025-37992 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        [bookworm] - linux 6.1.140-1
        NOTE: 
https://git.kernel.org/linus/2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8 (6.15-rc7)
@@ -66,7 +134,7 @@ CVE-2025-41441 (Mailform Pro CGI prior to 4.3.4 generates 
error messages contain
        NOT-FOR-US: Mailform Pro CGI
 CVE-2025-2146 (Buffer overflow in WebService Authentication processing of 
Small Offic ...)
        NOT-FOR-US: Canon
-CVE-2025-35003
+CVE-2025-35003 (Improper Restriction of Operations within the Bounds of a 
Memory Buffe ...)
        NOT-FOR-US: Apache NuttX RTOS
 CVE-2025-5155 (A vulnerability has been found in qianfox FoxCMS 1.2.5 and 
classified  ...)
        NOT-FOR-US: FoxCMS
@@ -4678,29 +4746,29 @@ CVE-2024-28956 (Exposure of Sensitive Information in 
Shared Microarchitectural S
        NOTE: 
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512
-CVE-2025-46805
+CVE-2025-46805 (Screen version 5.0.0 and older version 4 releases have  a 
TOCTOU race  ...)
        - screen 4.9.1-3 (unimportant)
        NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=161f85b98b7e1d5e4893aeed20f4cdb5e3dfaaa4
        NOTE: https://www.openwall.com/lists/oss-security/2025/05/12/1
        NOTE: screen in Debian not installed setuid or setgid
-CVE-2025-46804
+CVE-2025-46804 (A minor information leak when running Screen with setuid-root 
privileg ...)
        - screen 4.9.1-3 (unimportant)
        NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=e0eef5aac453fa98a2664416a56c50ad1d00cb30
        NOTE: https://www.openwall.com/lists/oss-security/2025/05/12/1
        NOTE: screen in Debian not installed setuid or setgid
-CVE-2025-46803
+CVE-2025-46803 (The default mode of pseudo terminals (PTYs) allocated by 
Screen was ch ...)
        - screen <not-affected> (Vulnerable code only introduced in Scren v5 
branch)
        NOTE: Introduced with: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=78a961188f7da528c7cefcc63e07f35f04e69a93
 (v.5.0.0)
        NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=d5d7bf43f3842e8b62d5f34eb4b031de7c8098c1
        NOTE: https://www.openwall.com/lists/oss-security/2025/05/12/1
-CVE-2025-46802
+CVE-2025-46802 (For a short time they PTY is set to mode 666, allowing any 
user on the ...)
        - screen 4.9.1-3 (unimportant; bug #1105191)
        NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=049b26b22e197ba3be9c46e5c193032e01a4724a
        NOTE: https://www.openwall.com/lists/oss-security/2025/05/12/1
        NOTE: Has potential to break some reattach use cases, but the specific 
use case
        NOTE: was broken already before.
        NOTE: screen in Debian not installed setuid or setgid
-CVE-2025-23395
+CVE-2025-23395 (Screen 5.0.0 when it runs with setuid-root privileges does not 
drop pr ...)
        - screen <not-affected> (Vulnerable code only introduced in Scren v5 
branch)
        NOTE: Introduced with: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=441bca708bd197ae15d031ccfd2b42077eeebedc
 (v.5.0.0)
        NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/screen.git/commit/?id=e894caeffccdb62f9c644989a936dc7ec83cc747



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e73986f574665fa4b9d9355b86fa856c331ab4d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e73986f574665fa4b9d9355b86fa856c331ab4d
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to