Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
36b3c750 by security tracker role at 2025-08-01T20:12:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,116 @@
-CVE-2023-32256 [ksmbd: fix racy issue from smb2 close and logoff with 
multichannel]
+CVE-2025-8480 (Alpine iLX-507 Command Injection Remote Code Execution. This 
vulnerabi ...)
+       TODO: check
+CVE-2025-8477 (Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote 
Code E ...)
+       TODO: check
+CVE-2025-8476 (Alpine iLX-507 TIDAL Improper Certificate Validation 
Vulnerability. Th ...)
+       TODO: check
+CVE-2025-8475 (Alpine iLX-507 AVRCP Stack-based Buffer Overflow Remote Code 
Execution ...)
+       TODO: check
+CVE-2025-8474 (Alpine iLX-507 CarPlay Stack-based Buffer Overflow Code 
Execution Vuln ...)
+       TODO: check
+CVE-2025-8473 (Alpine iLX-507 UPDM_wstpCBCUpdStart Command Injection 
Vulnerability. T ...)
+       TODO: check
+CVE-2025-8472 (Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote 
Code E ...)
+       TODO: check
+CVE-2025-8443 (A vulnerability was found in code-projects Online Medicine 
Guide 1.0 a ...)
+       TODO: check
+CVE-2025-8442 (A vulnerability has been found in code-projects Online Medicine 
Guide  ...)
+       TODO: check
+CVE-2025-6398 (A null pointer dereference vulnerability exists in the 
IOMap64.sys dri ...)
+       TODO: check
+CVE-2025-6228 (The Sina Extension for Elementor (Header Builder, Footer 
Builter, Them ...)
+       TODO: check
+CVE-2025-6037 (Vault and Vault Enterprise (\u201cVault\u201d) TLS certificate 
auth me ...)
+       TODO: check
+CVE-2025-6015 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) login MFA 
rate l ...)
+       TODO: check
+CVE-2025-6014 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) TOTP 
Secrets Eng ...)
+       TODO: check
+CVE-2025-6011 (A timing side channel in Vault and Vault Enterprise\u2019s 
(\u201cVaul ...)
+       TODO: check
+CVE-2025-6004 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) user 
lockout fea ...)
+       TODO: check
+CVE-2025-6000 (A privileged Vault operator within the root namespace with 
write permi ...)
+       TODO: check
+CVE-2025-5999 (A privileged Vault operator with write permissions to the root 
namespa ...)
+       TODO: check
+CVE-2025-54595 (Pearcleaner is a free, source-available and fair-code licensed 
mac app ...)
+       TODO: check
+CVE-2025-54593 (FreshRSS is a free, self-hostable RSS aggregator. In versions 
1.26.1 a ...)
+       TODO: check
+CVE-2025-54590 (webfinger.js is a TypeScript-based WebFinger client that runs 
in both  ...)
+       TODO: check
+CVE-2025-54574 (Squid is a caching proxy for the Web. In versions 6.3 and 
below, Squid ...)
+       TODO: check
+CVE-2025-54564 (uploadsm in ChargePoint Home Flex 5.5.4.13 does not validate a 
user-co ...)
+       TODO: check
+CVE-2025-53012 (MaterialX is an open standard for the exchange of rich 
material and lo ...)
+       TODO: check
+CVE-2025-53011 (MaterialX is an open standard for the exchange of rich 
material and lo ...)
+       TODO: check
+CVE-2025-53010 (MaterialX is an open standard for the exchange of rich 
material and lo ...)
+       TODO: check
+CVE-2025-53009 (MaterialX is an open standard for the exchange of rich 
material and lo ...)
+       TODO: check
+CVE-2025-52390 (Saurus CMS Community Edition since commit d886e5b0 
(2010-04-23) is vul ...)
+       TODO: check
+CVE-2025-52361 (Insecure permissions in the script /etc/init.d/lighttpd in 
AK-Nord USB ...)
+       TODO: check
+CVE-2025-52327 (SQL Injection vulnerability in Restaurant Order System 1.0 
allows a lo ...)
+       TODO: check
+CVE-2025-51504 (Microweber CMS 2.0 is vulnerable to Cross Site Scripting 
(XSS)in the / ...)
+       TODO: check
+CVE-2025-51502 (Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via 
the lay ...)
+       TODO: check
+CVE-2025-51501 (Reflected Cross-Site Scripting (XSS) in the id parameter of 
the live_e ...)
+       TODO: check
+CVE-2025-50870 (Institute-of-Current-Students 1.0 is vulnerable to Incorrect 
Access Co ...)
+       TODO: check
+CVE-2025-50869 (A stored Cross-Site Scripting (XSS) vulnerability exists in 
the qureyd ...)
+       TODO: check
+CVE-2025-50868 (A SQL Injection vulnerability exists in the 
takeassessment2.php file o ...)
+       TODO: check
+CVE-2025-50472 (The modelscope/ms-swift library thru 2.6.1 is vulnerable to 
arbitrary  ...)
+       TODO: check
+CVE-2025-50460 (A remote code execution (RCE) vulnerability exists in the 
ms-swift pro ...)
+       TODO: check
+CVE-2025-4684 (The BlockSpare: Gutenberg Blocks & Patterns for Blogs, 
Magazines, Busi ...)
+       TODO: check
+CVE-2025-49832 (Asterisk is an open source private branch exchange and 
telephony toolk ...)
+       TODO: check
+CVE-2025-48074 (OpenEXR provides the specification and reference 
implementation of the ...)
+       TODO: check
+CVE-2025-46018 (CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a 
vulnera ...)
+       TODO: check
+CVE-2025-45778 (A stored cross-site scripting (XSS) vulnerability in The 
Language Slot ...)
+       TODO: check
+CVE-2025-45767 (jose v6.0.10 was discovered to contain weak encryption.)
+       TODO: check
+CVE-2025-45150 (Insecure permissions in LangChain-ChatGLM-Webui commit ef829 
allows at ...)
+       TODO: check
+CVE-2025-44139 (Emlog Pro V2.5.7 is vulnerable to Unrestricted Upload of File 
with Dan ...)
+       TODO: check
+CVE-2025-41376 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41375 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41374 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41373 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41372 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41371 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-41370 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
+       TODO: check
+CVE-2025-33118 (IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 12 is vulnerable 
to stor ...)
+       TODO: check
+CVE-2025-2824 (IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 
9.0.0.1 ...)
+       TODO: check
+CVE-2023-44976 (Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local 
users to ter ...)
+       TODO: check
+CVE-2023-32256 (A flaw was found in the Linux kernel's ksmbd component. A race 
conditi ...)
        - linux 6.3.7-1
        [bookworm] - linux 6.1.37-1
        NOTE: 
https://git.kernel.org/linus/abcc506a9a71976a8b4c9bf3ee6efd13229c1e19 (6.4-rc1)
@@ -19966,7 +20078,7 @@ CVE-2025-41379 (The Intellian C700 web panel allows you 
to add firewall rules. E
        NOT-FOR-US: Intellian C700 web panel
 CVE-2025-41378 (The SSID field is not parsed correctly and can be used to 
inject comma ...)
        NOT-FOR-US: Intellian
-CVE-2025-41377 (Cryptographic vulnerability in Iridium Certus 700. This 
vulnerability  ...)
+CVE-2025-41377 (A SQL injection vulnerability has been found in Gandia Integra 
Total o ...)
        NOT-FOR-US: Intellian
 CVE-2025-3895 (Token used for resetting passwords in MegaBIP softwareare 
generated us ...)
        NOT-FOR-US: MegaBIP
@@ -466532,8 +466644,8 @@ CVE-2019-19146
        RESERVED
 CVE-2019-19145 (Quantum SuperLoader 3 V94.0 005E.0h devices allow attackers to 
access  ...)
        TODO: check
-CVE-2019-19144
-       RESERVED
+CVE-2019-19144 (XML External Entity Injection vulnerability in Quantum DXi6702 
2.3.0.3 ...)
+       TODO: check
 CVE-2019-19143 (TP-LINK TL-WR849N 0.9.1 4.16 devices do not require 
authentication to  ...)
        NOT-FOR-US: TP-Link
 CVE-2019-19142 (Intelbras WRN240 devices do not require authentication to 
replace the  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/36b3c7500c110ddbccf25f0265e5dcb75fb7c431

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/36b3c7500c110ddbccf25f0265e5dcb75fb7c431
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to