Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
af1ceb1a by security tracker role at 2025-08-06T20:12:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,125 @@
+CVE-2025-8667 (A vulnerability, which was classified as critical, was found in 
Skywor ...)
+       TODO: check
+CVE-2025-8665 (A vulnerability, which was classified as critical, has been 
found in a ...)
+       TODO: check
+CVE-2025-8620 (The GiveWP \u2013 Donation Plugin and Fundraising Platform 
plugin for  ...)
+       TODO: check
+CVE-2025-8616 (A weakness identified in OpenText Advanced Authentication where 
aMalic ...)
+       TODO: check
+CVE-2025-8419 (A vulnerability was found in Keycloak-services. Special 
characters use ...)
+       TODO: check
+CVE-2025-8130
+       REJECTED
+CVE-2025-7771 (ThrottleStop.sys, a legitimate driver, exposes two IOCTL 
interfaces th ...)
+       TODO: check
+CVE-2025-7202 (A Cross-Site Request Forgery (CSRF) in Elgato's Key Lights and 
related ...)
+       TODO: check
+CVE-2025-6013 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) ldap auth 
method ...)
+       TODO: check
+CVE-2025-5197 (A Regular Expression Denial of Service (ReDoS) vulnerability 
exists in ...)
+       TODO: check
+CVE-2025-53786 (On April 18th 2025, Microsoft announced Exchange Server 
Security Chang ...)
+       TODO: check
+CVE-2025-51624 (Cross-site scripting (XSS) vulnerability in Zone Bitaqati thru 
3.4.0.)
+       TODO: check
+CVE-2025-51532 (Incorrect access control in Sage DPW v2024.12.003 allows 
unauthorized  ...)
+       TODO: check
+CVE-2025-51531 (A reflected cross-site scripting (XSS) vulnerability in Sage 
DPW v2024 ...)
+       TODO: check
+CVE-2025-51308 (In Gatling Enterprise versions below 1.25.0, a low-privileged 
user tha ...)
+       TODO: check
+CVE-2025-51306 (In Gatling Enterprise versions below 1.25.0, a user 
logging-out can st ...)
+       TODO: check
+CVE-2025-51040 (Electrolink FM/DAB/TV Transmitter Web Management System 
Unauthorized a ...)
+       TODO: check
+CVE-2025-50286 (A Remote Code Execution (RCE) vulnerability in Grav CMS 
v1.7.48 allows ...)
+       TODO: check
+CVE-2025-50234 (MCCMS v2.7.0 has an SSRF vulnerability located in the index() 
method o ...)
+       TODO: check
+CVE-2025-50233 (A vulnerability in QCMS version 6.0.5 allows authenticated 
users to re ...)
+       TODO: check
+CVE-2025-48394 (An attacker with authenticated and privileged access could 
modify the  ...)
+       TODO: check
+CVE-2025-48393 (The server identity check mechanism for firmware upgrade 
performed via ...)
+       TODO: check
+CVE-2025-46391 (CWE-284: Improper Access Control)
+       TODO: check
+CVE-2025-46390 (CWE-204: Observable Response Discrepancy)
+       TODO: check
+CVE-2025-46389 (CWE-620: Unverified Password Change)
+       TODO: check
+CVE-2025-46388 (CWE-200 Exposure of Sensitive Information to an Unauthorized 
Actor)
+       TODO: check
+CVE-2025-46387 (CWE-639 Authorization Bypass Through User-Controlled Key)
+       TODO: check
+CVE-2025-46386 (CWE-639 Authorization Bypass Through User-Controlled Key)
+       TODO: check
+CVE-2025-45766 (poco v1.14.1-release was discovered to contain weak 
encryption.)
+       TODO: check
+CVE-2025-45764 (jsrsasign v11.1.0 was discovered to contain weak encryption.)
+       TODO: check
+CVE-2025-3354 (IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 
is vulne ...)
+       TODO: check
+CVE-2025-3320 (IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 
is vulne ...)
+       TODO: check
+CVE-2025-38747 (Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, 
contain a  ...)
+       TODO: check
+CVE-2025-38746 (Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, 
contains a ...)
+       TODO: check
+CVE-2025-36020 (IBM Guardium Data Protection could allow a remote attacker to 
obtain s ...)
+       TODO: check
+CVE-2025-30127 (An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 
devices. Onc ...)
+       TODO: check
+CVE-2025-2028 (Lack of TLS validation when downloading a CSV file including 
mapping f ...)
+       TODO: check
+CVE-2025-23335 (NVIDIA Triton Inference Server for Windows and Linux and the 
Tensor RT ...)
+       TODO: check
+CVE-2025-23334 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23333 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23331 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23327 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23326 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23325 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23324 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23323 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23322 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23321 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23320 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23319 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23318 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-23317 (NVIDIA Triton Inference Server contains a vulnerability in the 
HTTP se ...)
+       TODO: check
+CVE-2025-23311 (NVIDIA Triton Inference Server contains a vulnerability where 
an attac ...)
+       TODO: check
+CVE-2025-23310 (NVIDIA Triton Inference Server for Windows and Linux contains 
a vulner ...)
+       TODO: check
+CVE-2025-22470 (CL4/6NX Plus and CL4/6NX-J Plus (Japan model) with the 
firmware versio ...)
+       TODO: check
+CVE-2025-22469 (OS command injection vulnerability exists in CL4/6NX Plus and 
CL4/6NX- ...)
+       TODO: check
+CVE-2025-20332 (A vulnerability in the web-based management interface of Cisco 
ISE cou ...)
+       TODO: check
+CVE-2025-20331 (A vulnerability in the web-based management interface of Cisco 
ISE and ...)
+       TODO: check
+CVE-2025-20215 (A vulnerability in the meeting-join functionality of Cisco 
Webex Meeti ...)
+       TODO: check
+CVE-2024-8244 (The filepath.Walk and filepath.WalkDir functions are documented 
as not ...)
+       TODO: check
+CVE-2024-52885 (The Mobile Access Portal's File Share application is 
vulnerable to a d ...)
+       TODO: check
 CVE-2025-8656 (Kenwood DMX958XR Protection Mechanism Failure Software 
Downgrade Vulne ...)
        NOT-FOR-US: Kenwood
 CVE-2025-8655 (Kenwood DMX958XR libSystemLib Command injection Remote Code 
Execution  ...)
@@ -352,7 +474,7 @@ CVE-2012-10024 (XBMC version 11, including builds up to the 
2012-11-04 nightly r
        - xbmc <removed>
 CVE-2012-10023 (A stack-based buffer overflow vulnerability exists in 
FreeFloat FTP Se ...)
        NOT-FOR-US: FreeFloat FTP Server
-CVE-2025-8556
+CVE-2025-8556 (A flaw was found in CIRCL's implementation of the FourQ 
elliptic curve ...)
        - golang-github-cloudflare-circl 1.6.1-1
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2371624
        NOTE: 
https://github.com/cloudflare/circl/security/advisories/GHSA-2x5j-vhc8-9cwm
@@ -455,27 +577,35 @@ CVE-2012-10034 (ClanSphere 2011.3 is vulnerable to a 
local file inclusion (LFI)
 CVE-2012-10031 (BlazeVideo HDTV Player Pro v6.6.0.3 is vulnerable to a 
stack-based buf ...)
        NOT-FOR-US: BlazeVideo HDTV Player Pro
 CVE-2025-8583
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8582
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8581
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8580
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8579
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8578
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8577
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8576
+       {DSA-5971-1}
        - chromium 139.0.7258.66-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-8551 (A vulnerability was found in atjiu pybbs up to 6.0.0. It has 
been rate ...)
@@ -65218,7 +65348,7 @@ CVE-2024-55591 (AnAuthentication Bypass Using an 
Alternate Path or Channel vulne
        NOT-FOR-US: FortiGuard
 CVE-2024-55000 (Sourcecodester House Rental Management system v1.0 is 
vulnerable to Cr ...)
        NOT-FOR-US: Sourcecodester House Rental Management system
-CVE-2024-54021 (An improper neutralization of crlf sequences in http headers 
('http re ...)
+CVE-2024-54021 (An Improper Neutralization of CRLF Sequences in HTTP Headers 
('http re ...)
        NOT-FOR-US: FortiGuard
 CVE-2024-53996
        REJECTED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/af1ceb1a7333316fb2b86cd6d0a5362cae1278d8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/af1ceb1a7333316fb2b86cd6d0a5362cae1278d8
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to