Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
97372d4c by security tracker role at 2025-07-11T20:12:44+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,126 @@
-CVE-2025-48924
+CVE-2025-7503 (An OEM IP camera manufactured by Shenzhen Liandian 
Communication Techn ...)
+       TODO: check
+CVE-2025-7456 (A vulnerability, which was classified as critical, has been 
found in C ...)
+       TODO: check
+CVE-2025-7455 (A vulnerability classified as critical was found in Campcodes 
Online M ...)
+       TODO: check
+CVE-2025-7454 (A vulnerability classified as critical has been found in 
Campcodes Onl ...)
+       TODO: check
+CVE-2025-7453 (A vulnerability was found in saltbo zpan up to 
1.6.5/1.7.0-beta2. It h ...)
+       TODO: check
+CVE-2025-7452 (A vulnerability was found in kone-net go-chat up to 
f9e58d0afa9bbdb31f ...)
+       TODO: check
+CVE-2025-7450 (A vulnerability was found in letseeqiji gorobbs up to 1.0.8. It 
has be ...)
+       TODO: check
+CVE-2025-7029 (A vulnerability in the Software SMI handler (SwSmiInputValue 
0xB2) all ...)
+       TODO: check
+CVE-2025-7028 (A vulnerability in the Software SMI handler (SwSmiInputValue 
0x20) all ...)
+       TODO: check
+CVE-2025-7027 (A vulnerability in the Software SMI handler (SwSmiInputValue 
0xB2) all ...)
+       TODO: check
+CVE-2025-7026 (A vulnerability in the Software SMI handler (SwSmiInputValue 
0xB2) all ...)
+       TODO: check
+CVE-2025-6851 (The Broken Link Notifier plugin for WordPress is vulnerable to 
Server- ...)
+       TODO: check
+CVE-2025-6838 (The Broken Link Notifier plugin for WordPress is vulnerable to 
CSV Inj ...)
+       TODO: check
+CVE-2025-6788 (CWE-668: Exposure of Resource to Wrong Sphere vulnerability 
exists tha ...)
+       TODO: check
+CVE-2025-6549 (An Incorrect Authorization vulnerability in the web server of 
Juniper  ...)
+       TODO: check
+CVE-2025-6438 (CWE-611: Improper Restriction of XML External Entity Reference 
vulnera ...)
+       TODO: check
+CVE-2025-53642 (haxcms-nodejs and haxcms-php are backends for HAXcms. The 
logout funct ...)
+       TODO: check
+CVE-2025-53641 (Postiz is an AI social media scheduling tool. From 1.45.1 to 
1.62.3, t ...)
+       TODO: check
+CVE-2025-52994 (gif_outputAsJpeg in phpThumb through 1.7.23 allows 
phpthumb.gif.php OS ...)
+       TODO: check
+CVE-2025-52989 (An Improper Neutralization of Delimiters vulnerability in the 
UI of Ju ...)
+       TODO: check
+CVE-2025-52988 (An Improper Neutralization of Special Elements used in an OS 
Command ( ...)
+       TODO: check
+CVE-2025-52986 (A Missing Release of Memory after Effective Lifetime 
vulnerability in  ...)
+       TODO: check
+CVE-2025-52985 (A Use of Incorrect Operator  vulnerability in the Routing 
Engine firew ...)
+       TODO: check
+CVE-2025-52984 (A NULL Pointer Dereference vulnerability in the routing 
protocol daemo ...)
+       TODO: check
+CVE-2025-52983 (A UI Discrepancy for Security Feature  vulnerability in the UI 
of Juni ...)
+       TODO: check
+CVE-2025-52982 (An Improper Resource Shutdown or Release vulnerability in the 
SIP ALG  ...)
+       TODO: check
+CVE-2025-52981 (An Improper Check for Unusual or Exceptional Conditions 
vulnerability  ...)
+       TODO: check
+CVE-2025-52980 (A Use of Incorrect Byte Ordering   vulnerability   in the 
Routing Prot ...)
+       TODO: check
+CVE-2025-52964 (A Reachable Assertion vulnerability in the Routing Protocol 
Daemon (rp ...)
+       TODO: check
+CVE-2025-52963 (An Improper Access Control vulnerability in the User Interface 
(UI) of ...)
+       TODO: check
+CVE-2025-52958 (A Reachable Assertion vulnerability in the routing protocol 
daemon (rp ...)
+       TODO: check
+CVE-2025-52955 (An Incorrect Calculation of Buffer Size vulnerability in the 
routing p ...)
+       TODO: check
+CVE-2025-52954 (A Missing Authorization vulnerability in the internal virtual 
routing  ...)
+       TODO: check
+CVE-2025-52953 (An Expected Behavior Violationvulnerability in the routing 
protocol da ...)
+       TODO: check
+CVE-2025-52952 (An Out-of-bounds Write vulnerability in the connectivity fault 
managem ...)
+       TODO: check
+CVE-2025-52951 (A Protection Mechanism Failure vulnerability in kernel filter 
processi ...)
+       TODO: check
+CVE-2025-52950 (AMissing Authorization vulnerability in Juniper Networks 
Security Dire ...)
+       TODO: check
+CVE-2025-52949 (An Improper Handling of Length Parameter Inconsistency 
vulnerability i ...)
+       TODO: check
+CVE-2025-52948 (An Improper Handling of Exceptional Conditions vulnerability 
in Berkel ...)
+       TODO: check
+CVE-2025-52947 (An Improper Handling of Exceptional Conditions vulnerability 
in route  ...)
+       TODO: check
+CVE-2025-52946 (A Use After Free vulnerability in the routing protocol daemon 
(rpd) of ...)
+       TODO: check
+CVE-2025-52089 (A hidden remote support feature protected by a static secret 
in TOTOLI ...)
+       TODO: check
+CVE-2025-51591 (A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 
allows attac ...)
+       TODO: check
+CVE-2025-50125 (CWE-918: Server-Side Request Forgery (SSRF) vulnerability 
exists that  ...)
+       TODO: check
+CVE-2025-50124 (CWE-269: Improper Privilege Management vulnerability exists 
that could ...)
+       TODO: check
+CVE-2025-50123 (CWE-94: Improper Control of Generation of Code ('Code 
Injection') vuln ...)
+       TODO: check
+CVE-2025-50122 (CWE-331: Insufficient Entropy vulnerability exists that could 
cause ro ...)
+       TODO: check
+CVE-2025-50121 (CWE-78: Improper Neutralization of Special Elements used in an 
OS Comm ...)
+       TODO: check
+CVE-2025-47964 (Microsoft Edge (Chromium-based) Spoofing Vulnerability)
+       TODO: check
+CVE-2025-47963 (No cwe for this issue in Microsoft Edge (Chromium-based) 
allows an una ...)
+       TODO: check
+CVE-2025-47182 (Improper input validation in Microsoft Edge (Chromium-based) 
allows an ...)
+       TODO: check
+CVE-2025-45582 (GNU Tar through 1.35 allows file overwrite via directory 
traversal in  ...)
+       TODO: check
+CVE-2025-43856 (immich is a high performance self-hosted photo and video 
management so ...)
+       TODO: check
+CVE-2025-3933 (A Regular Expression Denial of Service (ReDoS) vulnerability 
was disco ...)
+       TODO: check
+CVE-2025-3631 (An IBM MQ 9.3 and 9.4 Client connecting to an MQ Queue Manager 
can cau ...)
+       TODO: check
+CVE-2025-30661 (An Incorrect Permission Assignment for Critical Resource 
vulnerability ...)
+       TODO: check
+CVE-2025-30403 (A heap-buffer-overflow vulnerability is possible in mvfst via 
a specia ...)
+       TODO: check
+CVE-2025-30402 (A heap-buffer-overflow vulnerability in the loading of 
ExecuTorch meth ...)
+       TODO: check
+CVE-2024-47065 (Meshtastic is an open source mesh networking solution. Prior 
to 2.5.1, ...)
+       TODO: check
+CVE-2023-38329 (An issue was discovered in eGroupWare 17.1.20190111. A 
cross-site scri ...)
+       TODO: check
+CVE-2023-38327 (An issue was discovered in eGroupWare 17.1.20190111. A User 
Enumeratio ...)
+       TODO: check
+CVE-2025-48924 (Uncontrolled Recursion vulnerability in Apache Commons Lang.  
This iss ...)
        - libcommons-lang3-java <unfixed> (bug #1109125)
        - libcommons-lang-java <unfixed> (bug #1109126)
        NOTE: https://www.openwall.com/lists/oss-security/2025/07/11/1
@@ -128,9 +250,9 @@ CVE-2025-24798 (Meshtastic is an open source mesh 
networking solution. From 1.2.
        NOT-FOR-US: Meshtastic
 CVE-2025-1727 (The protocol used for remote linking over RF for End-of-Train 
and  Hea ...)
        NOT-FOR-US: End-of-Train and Head-of-Train remote linking protocol
-CVE-2025-53862
+CVE-2025-53862 (A flaw was found in Ansible. Three API endpoints are 
accessible and re ...)
        NOT-FOR-US: Ansible Automation Platform
-CVE-2025-53861
+CVE-2025-53861 (A flaw was found in Ansible. Sensitive cookies without 
security flags  ...)
        NOT-FOR-US: Ansible Automation Platform
 CVE-2025-7425 (A flaw was found in libxslt where the attribute type, atype, 
flags are ...)
        - libxslt <unfixed> (bug #1109122)
@@ -717962,8 +718084,8 @@ CVE-2013-3309
        RESERVED
 CVE-2013-3308
        RESERVED
-CVE-2013-3307
-       RESERVED
+CVE-2013-3307 (Linksys E1000 devices through 2.1.02, E1200 devices before 
2.0.05, and ...)
+       TODO: check
 CVE-2013-3306
        RESERVED
 CVE-2013-3305



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/97372d4ccd22af69405d55769bc1eb09785a3cae

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/97372d4ccd22af69405d55769bc1eb09785a3cae
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to