Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b3e5c7a9 by security tracker role at 2025-06-05T20:12:41+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,105 @@
+CVE-2025-5745 (The strncmp implementation optimized for the Power10 processor 
in the  ...)
+       TODO: check
+CVE-2025-5702 (The strcmp implementation optimized for the Power10 processor 
in the G ...)
+       TODO: check
+CVE-2025-5701 (The HyperComments plugin for WordPress is vulnerable to 
unauthorized m ...)
+       TODO: check
+CVE-2025-5693 (A vulnerability was found in PHPGurukul Human Metapneumovirus 
Testing  ...)
+       TODO: check
+CVE-2025-5685 (A vulnerability, which was classified as critical, was found in 
Tenda  ...)
+       TODO: check
+CVE-2025-5680 (A vulnerability classified as critical was found in Shenzhen 
Dashi Ton ...)
+       TODO: check
+CVE-2025-5679 (A vulnerability classified as critical has been found in 
Shenzhen Dash ...)
+       TODO: check
+CVE-2025-5677 (A vulnerability was found in Campcodes Online Recruitment 
Management S ...)
+       TODO: check
+CVE-2025-5676 (A vulnerability was found in Campcodes Online Recruitment 
Management S ...)
+       TODO: check
+CVE-2025-5675 (A vulnerability was found in Campcodes Online Teacher Record 
Managemen ...)
+       TODO: check
+CVE-2025-5674 (A vulnerability was found in code-projects Patient Record 
Management S ...)
+       TODO: check
+CVE-2025-5672 (A vulnerability has been found in TOTOLINK N302R Plus up to 
3.4.0-B202 ...)
+       TODO: check
+CVE-2025-5671 (A vulnerability, which was classified as critical, was found in 
TOTOLI ...)
+       TODO: check
+CVE-2025-5670 (A vulnerability, which was classified as critical, has been 
found in P ...)
+       TODO: check
+CVE-2025-5669 (A vulnerability classified as critical was found in PHPGurukul 
Medical ...)
+       TODO: check
+CVE-2025-5668 (A vulnerability classified as critical has been found in 
PHPGurukul Me ...)
+       TODO: check
+CVE-2025-5667 (A vulnerability was found in FreeFloat FTP Server 1.0. It has 
been rat ...)
+       TODO: check
+CVE-2025-5666 (A vulnerability was found in FreeFloat FTP Server 1.0. It has 
been dec ...)
+       TODO: check
+CVE-2025-5665 (A vulnerability was found in FreeFloat FTP Server 1.0. It has 
been cla ...)
+       TODO: check
+CVE-2025-5664 (A vulnerability was found in FreeFloat FTP Server 1.0 and 
classified a ...)
+       TODO: check
+CVE-2025-5663 (A vulnerability has been found in PHPGurukul Auto Taxi Stand 
Managemen ...)
+       TODO: check
+CVE-2025-5661 (A vulnerability, which was classified as problematic, was found 
in cod ...)
+       TODO: check
+CVE-2025-5660 (A vulnerability, which was classified as critical, has been 
found in P ...)
+       TODO: check
+CVE-2025-5659 (A vulnerability classified as critical was found in PHPGurukul 
Complai ...)
+       TODO: check
+CVE-2025-5658 (A vulnerability classified as critical has been found in 
PHPGurukul Co ...)
+       TODO: check
+CVE-2025-5657 (A vulnerability was found in PHPGurukul Complaint Management 
System 2. ...)
+       TODO: check
+CVE-2025-5656 (A vulnerability was found in PHPGurukul Complaint Management 
System 2. ...)
+       TODO: check
+CVE-2025-5655 (A vulnerability was found in PHPGurukul Complaint Management 
System 2. ...)
+       TODO: check
+CVE-2025-5654 (A vulnerability was found in PHPGurukul Complaint Management 
System 2. ...)
+       TODO: check
+CVE-2025-5653 (A vulnerability has been found in PHPGurukul Complaint 
Management Syst ...)
+       TODO: check
+CVE-2025-5652 (A vulnerability, which was classified as critical, was found in 
PHPGur ...)
+       TODO: check
+CVE-2025-5651 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2025-5650 (A vulnerability classified as critical was found in 
1000projects Onlin ...)
+       TODO: check
+CVE-2025-5649 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
+       TODO: check
+CVE-2025-5648 (A vulnerability was found in Radare2 5.9.9. It has been 
classified as  ...)
+       TODO: check
+CVE-2025-5647 (A vulnerability was found in Radare2 5.9.9 and classified as 
problemat ...)
+       TODO: check
+CVE-2025-5382 (Improper access control in users MFA feature in Devolutions 
Server 202 ...)
+       TODO: check
+CVE-2025-5341 (The Forminator Forms \u2013 Contact Form, Payment Form & Custom 
Form B ...)
+       TODO: check
+CVE-2025-4568 (Improper neutralization of input provided by an unauthorized 
user into ...)
+       TODO: check
+CVE-2025-49009 (Para is a multitenant backend server/framework for object 
persistence  ...)
+       TODO: check
+CVE-2025-48493 (The Yii 2 Redis extension provides the redis key-value store 
support f ...)
+       TODO: check
+CVE-2025-47827 (In IGEL OS before 11, Secure Boot can be bypassed because the 
igel-fla ...)
+       TODO: check
+CVE-2025-46258 (Missing Authorization vulnerability in BdThemes Element Pack 
Pro allow ...)
+       TODO: check
+CVE-2025-46257 (Cross-Site Request Forgery (CSRF) vulnerability in BdThemes 
Element Pa ...)
+       TODO: check
+CVE-2025-43026 (A potential security vulnerability has been identified in the 
HP Suppo ...)
+       TODO: check
+CVE-2025-3768 (Improper access control in Tor network blocking feature in 
Devolutions ...)
+       TODO: check
+CVE-2025-30084 (A stored XSS vulnerability in RSMail! component 1.19.20 - 
1.22.26 for  ...)
+       TODO: check
+CVE-2025-27754 (A stored XSS vulnerability in RSBlog! component 1.11.6 - 
1.14.4 for Jo ...)
+       TODO: check
+CVE-2025-27753 (A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 
for Joo ...)
+       TODO: check
+CVE-2025-27445 (A path traversal vulnerability in RSFirewall component 2.9.7 - 
3.1.5 f ...)
+       TODO: check
+CVE-2025-0691 (Improper access control in permissions component in Devolutions 
Server ...)
+       TODO: check
 CVE-2025-22874
        - golang-1.24 <unfixed>
        - golang-1.23 <unfixed>
@@ -22,7 +124,8 @@ CVE-2025-4673
        NOTE: https://github.com/golang/go/issues/73816
        NOTE: Fixed by: 
https://github.com/golang/go/commit/85897ca220a149333a88b1e4d63f3b751f1141f5 
(go1.24.4)
        NOTE: Fixed by: 
https://github.com/golang/go/commit/b897e97c36cb62629a458bc681723ca733404e32 
(go1.23.10)
-CVE-2011-10007
+CVE-2011-10007 (File::Find::Rule through 0.34 for Perl is vulnerable to 
Arbitrary Code ...)
+       {DSA-5936-1 DLA-4209-1}
        - libfile-find-rule-perl 0.34-4 (bug #1107311)
        NOTE: https://lists.security.metacpan.org/cve-announce/msg/30183067/
        NOTE: https://rt.cpan.org/Public/Bug/Display.html?id=64504



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b3e5c7a9b0f94fbf6b3ba98ab3c1a25d11dd973c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b3e5c7a9b0f94fbf6b3ba98ab3c1a25d11dd973c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to