Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
75a208b9 by Salvatore Bonaccorso at 2025-08-03T13:07:25+02:00
Update status for CVE-2015-10141

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2784,11 +2784,13 @@ CVE-2017-20198 (The Marathon UI in DC/OS < 1.9.0 allows 
unauthenticated users to
 CVE-2016-15045 (A local privilege escalation vulnerability exists in 
lastore-daemon, t ...)
        TODO: check
 CVE-2015-10141 (An unauthenticated OS command injection vulnerability exists 
within Xd ...)
-       - xdebug <unfixed>
+       - xdebug <unfixed> (unimportant)
        NOTE: 
https://kirtixs.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers/
        NOTE: 
https://web.archive.org/web/20231226215418/https://paper.seebug.org/397/
        NOTE: https://www.exploit-db.com/exploits/44568
-       TODO: check, unlcear if fixed in later versions than 2.5.5 upstream, 
clarifying with maintainer
+       NOTE: https://phpc.social/@derickr/114964060410165778
+       NOTE: Only an issue if xdebug is remotely in untrusted networks exposed 
withouth
+       NOTE: taking documented restricting options.
 CVE-2010-10012 (A path traversal vulnerability exists in httpdasm version 
0.92, a ligh ...)
        NOT-FOR-US: httpdasm
 CVE-2025-54090 (A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond 
expr .. ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75a208b97586c1f69d49ccd16b59a7cbedf19325

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75a208b97586c1f69d49ccd16b59a7cbedf19325
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to