Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
13037ca8 by security tracker role at 2025-12-11T08:13:45+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,213 @@
+CVE-2025-9436 (The Widgets for Google Reviews plugin for WordPress is 
vulnerable to S ...)
+       TODO: check
+CVE-2025-8405 (GitLab has remediated a security issue in GitLab CE/EE 
affecting all v ...)
+       TODO: check
+CVE-2025-67738 (squid/cachemgr.cgi in Webmin before 2.600 does not properly 
quote argu ...)
+       TODO: check
+CVE-2025-67720 (Pyrofork is a modern, asynchronous MTProto API framework. 
Versions 2.3 ...)
+       TODO: check
+CVE-2025-67719 (Ibexa is a composable end-to-end DXP (Digital Experience 
Platform). Ve ...)
+       TODO: check
+CVE-2025-67718 (Form.io is a combined Form and API platform for Serverless 
application ...)
+       TODO: check
+CVE-2025-67717 (ZITADEL is an open-source identity infrastructure tool. 
Versions 2.44. ...)
+       TODO: check
+CVE-2025-67716 (The Auth0 Next.js SDK is a library for implementing user 
authenticatio ...)
+       TODO: check
+CVE-2025-67713 (Miniflux 2 is an open source feed reader. Versions 2.2.14 and 
below tr ...)
+       TODO: check
+CVE-2025-67694
+       REJECTED
+CVE-2025-67693
+       REJECTED
+CVE-2025-67692
+       REJECTED
+CVE-2025-67691
+       REJECTED
+CVE-2025-67690
+       REJECTED
+CVE-2025-67689
+       REJECTED
+CVE-2025-67688
+       REJECTED
+CVE-2025-67687
+       REJECTED
+CVE-2025-67686
+       REJECTED
+CVE-2025-67648 (Shopware is an open commerce platform. Versions 6.4.6.0 
through 6.6.10 ...)
+       TODO: check
+CVE-2025-67646 (TableProgressTracking is a MediaWiki extension to track 
progress again ...)
+       TODO: check
+CVE-2025-67644 (LangGraph SQLite Checkpoint is an implementation of LangGraph 
Checkpoi ...)
+       TODO: check
+CVE-2025-67514
+       REJECTED
+CVE-2025-67513 (FreePBX Endpoint Manager is a module for managing telephony 
endpoints  ...)
+       TODO: check
+CVE-2025-67512
+       REJECTED
+CVE-2025-67511 (Cybersecurity AI (CAI) is an open-source framework for 
building and de ...)
+       TODO: check
+CVE-2025-67510 (Neuron is a PHP framework for creating and orchestrating AI 
Agents. In ...)
+       TODO: check
+CVE-2025-67509 (Neuron is a PHP framework for creating and orchestrating AI 
Agents. Ve ...)
+       TODO: check
+CVE-2025-67505 (Okta Java Management SDK facilitates interactions with the 
Okta manage ...)
+       TODO: check
+CVE-2025-67490 (The Auth0 Next.js SDK is a library for implementing user 
authenticatio ...)
+       TODO: check
+CVE-2025-67461 (External control of file name or path in Zoom Rooms for macOS 
before v ...)
+       TODO: check
+CVE-2025-67460 (Protection Mechanism Failure of Software Downgrade in Zoom 
Rooms for W ...)
+       TODO: check
+CVE-2025-66628 (ImageMagick is a software suite to create, edit, compose, or 
convert b ...)
+       TODO: check
+CVE-2025-66474 (XWiki Rendering is a generic rendering system that converts 
textual in ...)
+       TODO: check
+CVE-2025-66473 (XWiki is an open-source wiki software platform. Versions 
16.10.10 and  ...)
+       TODO: check
+CVE-2025-66472 (XWiki Platform is a generic wiki platform offering runtime 
services fo ...)
+       TODO: check
+CVE-2025-66033 (Okta Java Management SDK facilitates interactions with the 
Okta manage ...)
+       TODO: check
+CVE-2025-65950 (WBCE CMS is a content management system. In versions 1.6.4 and 
below,  ...)
+       TODO: check
+CVE-2025-65832 (The mobile application insecurely handles information stored 
within me ...)
+       TODO: check
+CVE-2025-65831 (The application uses an insecure hashing algorithm (MD5) to 
hash passw ...)
+       TODO: check
+CVE-2025-65830 (Due to a lack of certificate validation, all traffic from the 
mobile a ...)
+       TODO: check
+CVE-2025-65829 (The ESP32 system on a chip (SoC) that powers the Meatmeet 
basestation  ...)
+       TODO: check
+CVE-2025-65828 (An unauthenticated attacker within proximity of the Meatmeet 
device ca ...)
+       TODO: check
+CVE-2025-65827 (The mobile application is configured to allow clear text 
traffic to al ...)
+       TODO: check
+CVE-2025-65826 (The mobile application was found to contain stored credentials 
for the ...)
+       TODO: check
+CVE-2025-65825 (The firmware on the basestation of the Meatmeet is not 
encrypted. An a ...)
+       TODO: check
+CVE-2025-65824 (An unauthenticated attacker within proximity of the Meatmeet 
device ca ...)
+       TODO: check
+CVE-2025-65823 (The Meatmeet Pro was found to be shipped with hardcoded Wi-Fi 
credenti ...)
+       TODO: check
+CVE-2025-65822 (The ESP32 system on a chip (SoC) that powers the Meatmeet Pro 
was foun ...)
+       TODO: check
+CVE-2025-65821 (As UART download mode is still enabled on the ESP32 chip on 
which the  ...)
+       TODO: check
+CVE-2025-65820 (An issue was discovered in Meatmeet Android Mobile Application 
1.1.2.0 ...)
+       TODO: check
+CVE-2025-65512 (A Server-Side Request Forgery (SSRF) vulnerability was 
discovered in t ...)
+       TODO: check
+CVE-2025-65297 (Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 
4.3.6_002 ...)
+       TODO: check
+CVE-2025-65296 (NULL-pointer dereference vulnerabilities in Aqara Hub M2 
4.3.6_0027, H ...)
+       TODO: check
+CVE-2025-65295 (Multiple vulnerabilities in Aqara Hub firmware update process 
in the C ...)
+       TODO: check
+CVE-2025-65294 (Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 
4.3.6_002 ...)
+       TODO: check
+CVE-2025-65293 (Command injection vulnerabilities in Aqara Camera Hub G3 
4.1.9_0027 al ...)
+       TODO: check
+CVE-2025-65292 (Command injection vulnerability in Aqara Hub devices including 
Camera  ...)
+       TODO: check
+CVE-2025-65291 (Aqara Hub devices including Hub M2 4.3.6_0027, Hub M3 
4.3.6_0025, Came ...)
+       TODO: check
+CVE-2025-65290 (Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 
4.3.6_002 ...)
+       TODO: check
+CVE-2025-62181 (Pega Platform versions 7.1.0 through Infinity 25.1.0 are 
affected by a ...)
+       TODO: check
+CVE-2025-4097 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-24857 (Improper access control for volatile memory containing boot 
code in Un ...)
+       TODO: check
+CVE-2025-14512 (A flaw was found in glib. This vulnerability allows a heap 
buffer over ...)
+       TODO: check
+CVE-2025-14485 (A weakness has been identified in EFM ipTIME A3004T 14.19.0. 
This vuln ...)
+       TODO: check
+CVE-2025-14157 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-13978 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-13923
+       REJECTED
+CVE-2025-13764 (The WP CarDealer plugin for WordPress is vulnerable to 
Privilege Escal ...)
+       TODO: check
+CVE-2025-12734 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-12731
+       REJECTED
+CVE-2025-12716 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-12562 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-12029 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-11984 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
+       TODO: check
+CVE-2025-11467 (The RSS Aggregator by Feedzy \u2013 Feed to Post, 
Autoblogging, News & ...)
+       TODO: check
+CVE-2025-11247 (GitLab has remediated an issue in GitLab EE affecting all 
versions fro ...)
+       TODO: check
+CVE-2025-10163 (The List category posts plugin for WordPress is vulnerable to 
time-bas ...)
+       TODO: check
+CVE-2024-58285 (Chyrp 2.5.2 contains a stored cross-site scripting 
vulnerability that  ...)
+       TODO: check
+CVE-2024-58284 (PopojiCMS 2.0.1 contains an authenticated remote command 
execution vul ...)
+       TODO: check
+CVE-2024-58283 (WBCE CMS version 1.6.2 contains a remote code execution 
vulnerability  ...)
+       TODO: check
+CVE-2024-58282 (Serendipity 2.5.0 contains a remote code execution 
vulnerability that  ...)
+       TODO: check
+CVE-2024-58281 (Dotclear 2.29 contains a remote code execution vulnerability 
that allo ...)
+       TODO: check
+CVE-2024-58280 (CMSimple 5.15 contains a remote command execution 
vulnerability that a ...)
+       TODO: check
+CVE-2024-58279 (appRain CMF 4.0.5 contains an authenticated remote code 
execution vuln ...)
+       TODO: check
+CVE-2023-53776 (Screen SFT DAB 1.9.3 contains an authentication bypass 
vulnerability t ...)
+       TODO: check
+CVE-2023-53775 (Screen SFT DAB 1.9.3 contains an authentication bypass 
vulnerability t ...)
+       TODO: check
+CVE-2023-53741 (Screen SFT DAB 1.9.3 contains a weak session management 
vulnerability  ...)
+       TODO: check
+CVE-2023-53740 (Screen SFT DAB 1.9.3 contains an authentication bypass 
vulnerability t ...)
+       TODO: check
+CVE-2020-36902 (UBICOD Medivision Digital Signage 1.5.1 contains an 
authorization bypa ...)
+       TODO: check
+CVE-2020-36901 (UBICOD Medivision Digital Signage 1.5.1 contains a cross-site 
request  ...)
+       TODO: check
+CVE-2020-36900 (All-Dynamics Digital Signage System 2.0.2 contains a 
cross-site reques ...)
+       TODO: check
+CVE-2020-36899 (QiHang Media Web Digital Signage 3.0.9 contains an 
unauthenticated fil ...)
+       TODO: check
+CVE-2020-36898 (QiHang Media Web Digital Signage 3.0.9 contains an 
unauthenticated fil ...)
+       TODO: check
+CVE-2020-36897 (QiHang Media Web Digital Signage 3.0.9 contains an 
unauthenticated rem ...)
+       TODO: check
+CVE-2020-36896 (QiHang Media Web Digital Signage 3.0.9 contains a cleartext 
credential ...)
+       TODO: check
+CVE-2020-36895 (EIBIZ i-Media Server Digital Signage 3.8.0 contains an 
unauthenticated ...)
+       TODO: check
+CVE-2020-36894 (Eibiz i-Media Server Digital Signage 3.8.0 contains an 
authentication  ...)
+       TODO: check
+CVE-2020-36893 (Eibiz i-Media Server Digital Signage 3.8.0 contains a 
directory traver ...)
+       TODO: check
+CVE-2020-36892 (Eibiz i-Media Server Digital Signage 3.8.0 contains an 
unauthenticated ...)
+       TODO: check
+CVE-2020-36888 (SpinetiX Fusion Digital Signage 3.4.8 contains a username 
enumeration  ...)
+       TODO: check
+CVE-2020-36887 (SpinetiX Fusion Digital Signage 3.4.8 contains an 
unauthenticated info ...)
+       TODO: check
+CVE-2020-36886 (SpinetiX Fusion Digital Signage 3.4.8 contains a cross-site 
request fo ...)
+       TODO: check
+CVE-2020-36885 (Sony IPELA Network Camera 1.82.01 contains a stack buffer 
overflow vul ...)
+       TODO: check
+CVE-2020-36884 (BrightSign Digital Signage Diagnostic Web Server 8.2.26 and 
less conta ...)
+       TODO: check
+CVE-2020-36883 (SpinetiX Fusion Digital Signage 3.4.8 and lower contains an 
authentica ...)
+       TODO: check
 CVE-2025-13327
        - uv <itp> (bug #1069776)
 CVE-2025-9315 (An unauthenticated device registration vulnerability, caused by 
Improp ...)
@@ -1342,6 +1552,7 @@ CVE-2024-38798 (EDK2 contains a vulnerability in BIOS 
where an attacker may caus
        NOTE: 
https://github.com/tianocore/edk2/security/advisories/GHSA-q2c6-37h5-7cwf
        NOTE: Fixed by: 
https://github.com/tianocore/edk2/commit/0cad130cb4885961da201bb9b08424b3fd3d2249
 (edk2-stable202511)
 CVE-2025-14333 (Memory safety bugs present in Firefox ESR 140.5, Thunderbird 
ESR 140.5 ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14333
@@ -1350,21 +1561,25 @@ CVE-2025-14332 (Memory safety bugs present in Firefox 
145 and Thunderbird 145. S
        - firefox 146.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14332
 CVE-2025-14331 (Same-origin policy bypass in the Request Handling component. 
This vuln ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14331
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14331
 CVE-2025-14330 (JIT miscompilation in the JavaScript Engine: JIT component. 
This vulne ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14330
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14330
 CVE-2025-14329 (Privilege escalation in the Netmonitor component. This 
vulnerability a ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14329
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14329
 CVE-2025-14328 (Privilege escalation in the Netmonitor component. This 
vulnerability a ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14328
@@ -1376,26 +1591,31 @@ CVE-2025-14326 (Use-after-free in the Audio/Video: GMP 
component. This vulnerabi
        - firefox 146.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14326
 CVE-2025-14325 (JIT miscompilation in the JavaScript Engine: JIT component. 
This vulne ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14325
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14325
 CVE-2025-14324 (JIT miscompilation in the JavaScript Engine: JIT component. 
This vulne ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14324
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14324
 CVE-2025-14323 (Privilege escalation in the DOM: Notifications component. This 
vulnera ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14323
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14323
 CVE-2025-14322 (Sandbox escape due to incorrect boundary conditions in the 
Graphics: C ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14322
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14322
 CVE-2025-14321 (Use-after-free in the WebRTC: Signaling component. This 
vulnerability  ...)
+       {DSA-6078-1}
        - firefox 146.0-1
        - firefox-esr 140.6.0esr-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2025-92/#CVE-2025-14321



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13037ca86e995fb571778d98279d82cc9457f41c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13037ca86e995fb571778d98279d82cc9457f41c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to