Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e863f60e by security tracker role at 2025-08-21T08:12:50+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,96 @@
-CVE-2025-54988
+CVE-2025-9288 (Improper Input Validation vulnerability in sha.js allows Input 
Data Ma ...)
+       TODO: check
+CVE-2025-9287 (Improper Input Validation vulnerability in cipher-base allows 
Input Da ...)
+       TODO: check
+CVE-2025-9264 (A vulnerability was found in Xuxueli xxl-job up to 3.1.1. 
Affected by  ...)
+       TODO: check
+CVE-2025-9263 (A vulnerability has been found in Xuxueli xxl-job up to 3.1.1. 
Affecte ...)
+       TODO: check
+CVE-2025-9262 (A flaw has been found in wong2 mcp-cli 1.13.0. Affected is the 
functio ...)
+       TODO: check
+CVE-2025-9253 (A security vulnerability has been detected in Linksys RE6250, 
RE6300,  ...)
+       TODO: check
+CVE-2025-9252 (A weakness has been identified in Linksys RE6250, RE6300, 
RE6350, RE65 ...)
+       TODO: check
+CVE-2025-9251 (A security flaw has been discovered in Linksys RE6250, RE6300, 
RE6350, ...)
+       TODO: check
+CVE-2025-9250 (A vulnerability was identified in Linksys RE6250, RE6300, 
RE6350, RE65 ...)
+       TODO: check
+CVE-2025-9249 (A vulnerability was determined in Linksys RE6250, RE6300, 
RE6350, RE65 ...)
+       TODO: check
+CVE-2025-9248 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, 
RE6500, R ...)
+       TODO: check
+CVE-2025-9247 (A vulnerability has been found in Linksys RE6250, RE6300, 
RE6350, RE65 ...)
+       TODO: check
+CVE-2025-8895 (The WP Webhooks plugin for WordPress is vulnerable to arbitrary 
file c ...)
+       TODO: check
+CVE-2025-8607 (The SlingBlocks \u2013 Gutenberg Blocks by FunnelKit (Formerly 
WooFunn ...)
+       TODO: check
+CVE-2025-8592 (The Inspiro theme for WordPress is vulnerable to Cross-Site 
Request Fo ...)
+       TODO: check
+CVE-2025-8023 (Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x 
<= 9.11 ...)
+       TODO: check
+CVE-2025-7390 (A malicious client can bypass the client certificate trust 
check of an ...)
+       TODO: check
+CVE-2025-7221 (The GiveWP \u2013 Donation Plugin and Fundraising Platform 
plugin for  ...)
+       TODO: check
+CVE-2025-57832
+       REJECTED
+CVE-2025-57831
+       REJECTED
+CVE-2025-57830
+       REJECTED
+CVE-2025-57829
+       REJECTED
+CVE-2025-57828
+       REJECTED
+CVE-2025-57827
+       REJECTED
+CVE-2025-57826
+       REJECTED
+CVE-2025-57825
+       REJECTED
+CVE-2025-57824
+       REJECTED
+CVE-2025-57749 (n8n is a workflow automation platform. Before 1.106.0, a 
symlink trave ...)
+       TODO: check
+CVE-2025-53971 (Mattermost versions 10.5.x <= 10.5.8, 9.11.x <= 9.11.17 fail 
to proper ...)
+       TODO: check
+CVE-2025-53505 (Group-Office versions prior to 6.8.119 and prior to 25.0.20 
provided b ...)
+       TODO: check
+CVE-2025-53504 (Group-Office versions prior to 6.8.119 and prior to 25.0.20 
provided b ...)
+       TODO: check
+CVE-2025-49810 (Mattermost versions 10.5.x <= 10.5.8 fail to validate access 
controls  ...)
+       TODO: check
+CVE-2025-49222 (Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x 
<= 9.11 ...)
+       TODO: check
+CVE-2025-48978 (An Improper Input Validation in EdgeMAX EdgeSwitch (Version 
1.11.0 and ...)
+       TODO: check
+CVE-2025-48355 (Exposure of Sensitive System Information to an Unauthorized 
Control Sp ...)
+       TODO: check
+CVE-2025-47870 (Mattermost versions 10.8.x <= 10.8.3, 10.5.x <= 10.5.8, 9.11.x 
<= 9.11 ...)
+       TODO: check
+CVE-2025-47700 (Mattermost Server versions 10.5.x <= 10.5.9 utilizing the 
Agents plugi ...)
+       TODO: check
+CVE-2025-43300 (An out-of-bounds write issue was addressed with improved 
bounds checki ...)
+       TODO: check
+CVE-2025-36530 (Mattermost versions 10.9.x <= 10.9.1, 10.8.x <= 10.8.3, 10.5.x 
<= 10.5 ...)
+       TODO: check
+CVE-2025-27217 (A Server-Side Request Forgery (SSRF) in the UISP Application 
may allow ...)
+       TODO: check
+CVE-2025-27216 (Multiple Incorrect Permission Assignment for Critical Resource 
in UISP ...)
+       TODO: check
+CVE-2025-27215 (An Improper Access Control could allow a malicious actor 
authenticated ...)
+       TODO: check
+CVE-2025-27214 (A Missing Authentication for Critical Function vulnerability 
in the Un ...)
+       TODO: check
+CVE-2025-27213 (An Improper Access Control could allow a malicious actor 
authenticated ...)
+       TODO: check
+CVE-2025-24285 (Multiple Improper Input Validation vulnerabilities in UniFi 
Connect EV ...)
+       TODO: check
+CVE-2024-57155 (Incorrect access control in radar v1.0.8 allows attackers to 
bypass au ...)
+       TODO: check
+CVE-2025-54988 (Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache 
Tika 1. ...)
        - tika <unfixed>
        NOTE: https://www.openwall.com/lists/oss-security/2025/08/20/3
        NOTE: 
https://github.com/apache/tika/commit/bfee6d5569fe9197c4ea947a96e212825184ca33
@@ -617,6 +709,7 @@ CVE-2025-9179 (An attacker was able to perform memory 
corruption in the GMP proc
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-64/#CVE-2025-9179
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/#CVE-2025-9179
 CVE-2025-9132 (Out of bounds write in V8 in Google Chrome prior to 
139.0.7258.138 all ...)
+       {DSA-5981-1}
        - chromium 139.0.7258.138-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-9165 (A flaw has been found in LibTIFF 4.7.0. This affects the 
function _TIF ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e863f60e7f103391cd6ccea4140e9ace2e78527f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e863f60e7f103391cd6ccea4140e9ace2e78527f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to