Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
62074748 by security tracker role at 2025-07-31T08:11:55+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,107 @@
+CVE-2025-8373 (A vulnerability was found in code-projects Vehicle Management 
1.0. It  ...)
+       TODO: check
+CVE-2025-8372 (A vulnerability was found in code-projects Exam Form Submission 
1.0 an ...)
+       TODO: check
+CVE-2025-8371 (A vulnerability has been found in code-projects Exam Form 
Submission 1 ...)
+       TODO: check
+CVE-2025-8370 (A vulnerability, which was classified as problematic, was found 
in Por ...)
+       TODO: check
+CVE-2025-8369 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2025-8368 (A vulnerability classified as problematic was found in 
Portabilis i-Ed ...)
+       TODO: check
+CVE-2025-8367 (A vulnerability classified as problematic has been found in 
Portabilis ...)
+       TODO: check
+CVE-2025-8366 (A vulnerability was found in Portabilis i-Educar 2.9. It has 
been rate ...)
+       TODO: check
+CVE-2025-8365 (A vulnerability was found in Portabilis i-Educar 2.10. It has 
been dec ...)
+       TODO: check
+CVE-2025-8348 (A vulnerability has been found in Kehua Charging Pile Cloud 
Platform 1 ...)
+       TODO: check
+CVE-2025-8347 (A vulnerability, which was classified as critical, was found in 
Kehua  ...)
+       TODO: check
+CVE-2025-8346 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2025-8345 (A vulnerability classified as critical was found in Shanghai 
Lingdang  ...)
+       TODO: check
+CVE-2025-8344 (A vulnerability classified as critical has been found in 
openviglet sh ...)
+       TODO: check
+CVE-2025-8343 (A vulnerability was found in openviglet shio up to 0.3.8. It 
has been  ...)
+       TODO: check
+CVE-2025-8340 (A vulnerability was found in code-projects Intern Membership 
Managemen ...)
+       TODO: check
+CVE-2025-8339 (A vulnerability was found in code-projects Intern Membership 
Managemen ...)
+       TODO: check
+CVE-2025-8338 (A vulnerability was found in projectworlds Online Admission 
System 1.0 ...)
+       TODO: check
+CVE-2025-8337 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2025-8336 (A vulnerability classified as critical was found in Campcodes 
Online R ...)
+       TODO: check
+CVE-2025-8335 (A vulnerability classified as problematic has been found in 
code-proje ...)
+       TODO: check
+CVE-2025-8334 (A vulnerability was found in Campcodes Online Recruitment 
Management S ...)
+       TODO: check
+CVE-2025-8333 (A vulnerability was found in code-projects Online Farm System 
1.0. It  ...)
+       TODO: check
+CVE-2025-8332 (A vulnerability was found in code-projects Online Farm System 
1.0. It  ...)
+       TODO: check
+CVE-2025-7847 (The AI Engine plugin for WordPress is vulnerable to arbitrary 
file upl ...)
+       TODO: check
+CVE-2025-7356
+       REJECTED
+CVE-2025-7205 (The GiveWP \u2013 Donation Plugin and Fundraising Platform 
plugin for  ...)
+       TODO: check
+CVE-2025-5720 (The Customer Reviews for WooCommerce plugin for WordPress is 
vulnerabl ...)
+       TODO: check
+CVE-2025-54829
+       REJECTED
+CVE-2025-54828
+       REJECTED
+CVE-2025-54827
+       REJECTED
+CVE-2025-54826
+       REJECTED
+CVE-2025-54825
+       REJECTED
+CVE-2025-54824
+       REJECTED
+CVE-2025-54823
+       REJECTED
+CVE-2025-54757 (Multiple versions of PowerCMS allow unrestricted upload of 
dangerous f ...)
+       TODO: check
+CVE-2025-54752 (Multiple versions of PowerCMS improperly neutralize formula 
elements i ...)
+       TODO: check
+CVE-2025-54586 (GitProxy is an application that stands between developers and 
a Git re ...)
+       TODO: check
+CVE-2025-54585 (GitProxy is an application that stands between developers and 
a Git re ...)
+       TODO: check
+CVE-2025-54085 (CVE-2025-54085 is a vulnerability in the management console of 
Absolut ...)
+       TODO: check
+CVE-2025-53558 (ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a 
common cred ...)
+       TODO: check
+CVE-2025-49084 (CVE-2025-49084 is a vulnerability in the management console of 
Absolut ...)
+       TODO: check
+CVE-2025-49083 (CVE-2025-49083 is a vulnerability in the management console of 
Absolut ...)
+       TODO: check
+CVE-2025-49082 (CVE-2025-49082 is a vulnerability in the management console of 
Absolut ...)
+       TODO: check
+CVE-2025-46359 (A path traversal issue exists in backup and restore feature of 
multipl ...)
+       TODO: check
+CVE-2025-41396 (A path traversal issue exists in file uploading feature of 
multiple ve ...)
+       TODO: check
+CVE-2025-41391 (Stored cross-site scripting vulnerability exists in multiple 
versions  ...)
+       TODO: check
+CVE-2025-36563 (Reflected cross-site scripting vulnerability exists in 
multiple versio ...)
+       TODO: check
+CVE-2025-36040 (IBM Aspera Faspex 5.0.0 through 5.0.12.1 could allow an 
authenticated  ...)
+       TODO: check
+CVE-2025-36039 (IBM Aspera Faspex 5.0.0 through 5.0.12.1 could allow an 
authenticated  ...)
+       TODO: check
+CVE-2024-11478
+       REJECTED
+CVE-2023-41674
+       REJECTED
 CVE-2025-8353 (UI synchronization issue in the Just-in-Time (JIT) access 
request appr ...)
        NOT-FOR-US: Devolutions
 CVE-2025-8331 (A vulnerability was found in code-projects Online Farm System 
1.0 and  ...)
@@ -18530,7 +18634,7 @@ CVE-2025-37993 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/dcaeeb8ae84c5506ebc574732838264f3887738c (6.15-rc6)
 CVE-2025-4598 (A vulnerability was found in systemd-coredump. This flaw allows 
an att ...)
-       {DSA-5931-1}
+       {DSA-5931-1 DLA-4259-1}
        - systemd 257.6-1 (bug #1106785)
        NOTE: 
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
        NOTE: For a comprehensive fix a kernel change is required (to hand a 
pidfd to the usermode



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62074748a6cbfd6a3eba8769194f17e82be9bce5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62074748a6cbfd6a3eba8769194f17e82be9bce5
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to