[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Aug 1 21:12:21 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
36b3c750 by security tracker role at 2025-08-01T20:12:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,116 @@
-CVE-2023-32256 [ksmbd: fix racy issue from smb2 close and logoff with multichannel]
+CVE-2025-8480 (Alpine iLX-507 Command Injection Remote Code Execution. This vulnerabi ...)
+	TODO: check
+CVE-2025-8477 (Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code E ...)
+	TODO: check
+CVE-2025-8476 (Alpine iLX-507 TIDAL Improper Certificate Validation Vulnerability. Th ...)
+	TODO: check
+CVE-2025-8475 (Alpine iLX-507 AVRCP Stack-based Buffer Overflow Remote Code Execution ...)
+	TODO: check
+CVE-2025-8474 (Alpine iLX-507 CarPlay Stack-based Buffer Overflow Code Execution Vuln ...)
+	TODO: check
+CVE-2025-8473 (Alpine iLX-507 UPDM_wstpCBCUpdStart Command Injection Vulnerability. T ...)
+	TODO: check
+CVE-2025-8472 (Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code E ...)
+	TODO: check
+CVE-2025-8443 (A vulnerability was found in code-projects Online Medicine Guide 1.0 a ...)
+	TODO: check
+CVE-2025-8442 (A vulnerability has been found in code-projects Online Medicine Guide  ...)
+	TODO: check
+CVE-2025-6398 (A null pointer dereference vulnerability exists in the IOMap64.sys dri ...)
+	TODO: check
+CVE-2025-6228 (The Sina Extension for Elementor (Header Builder, Footer Builter, Them ...)
+	TODO: check
+CVE-2025-6037 (Vault and Vault Enterprise (\u201cVault\u201d) TLS certificate auth me ...)
+	TODO: check
+CVE-2025-6015 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) login MFA rate l ...)
+	TODO: check
+CVE-2025-6014 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) TOTP Secrets Eng ...)
+	TODO: check
+CVE-2025-6011 (A timing side channel in Vault and Vault Enterprise\u2019s (\u201cVaul ...)
+	TODO: check
+CVE-2025-6004 (Vault and Vault Enterprise\u2019s (\u201cVault\u201d) user lockout fea ...)
+	TODO: check
+CVE-2025-6000 (A privileged Vault operator within the root namespace with write permi ...)
+	TODO: check
+CVE-2025-5999 (A privileged Vault operator with write permissions to the root namespa ...)
+	TODO: check
+CVE-2025-54595 (Pearcleaner is a free, source-available and fair-code licensed mac app ...)
+	TODO: check
+CVE-2025-54593 (FreshRSS is a free, self-hostable RSS aggregator. In versions 1.26.1 a ...)
+	TODO: check
+CVE-2025-54590 (webfinger.js is a TypeScript-based WebFinger client that runs in both  ...)
+	TODO: check
+CVE-2025-54574 (Squid is a caching proxy for the Web. In versions 6.3 and below, Squid ...)
+	TODO: check
+CVE-2025-54564 (uploadsm in ChargePoint Home Flex 5.5.4.13 does not validate a user-co ...)
+	TODO: check
+CVE-2025-53012 (MaterialX is an open standard for the exchange of rich material and lo ...)
+	TODO: check
+CVE-2025-53011 (MaterialX is an open standard for the exchange of rich material and lo ...)
+	TODO: check
+CVE-2025-53010 (MaterialX is an open standard for the exchange of rich material and lo ...)
+	TODO: check
+CVE-2025-53009 (MaterialX is an open standard for the exchange of rich material and lo ...)
+	TODO: check
+CVE-2025-52390 (Saurus CMS Community Edition since commit d886e5b0 (2010-04-23) is vul ...)
+	TODO: check
+CVE-2025-52361 (Insecure permissions in the script /etc/init.d/lighttpd in AK-Nord USB ...)
+	TODO: check
+CVE-2025-52327 (SQL Injection vulnerability in Restaurant Order System 1.0 allows a lo ...)
+	TODO: check
+CVE-2025-51504 (Microweber CMS 2.0 is vulnerable to Cross Site Scripting (XSS)in the / ...)
+	TODO: check
+CVE-2025-51502 (Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the lay ...)
+	TODO: check
+CVE-2025-51501 (Reflected Cross-Site Scripting (XSS) in the id parameter of the live_e ...)
+	TODO: check
+CVE-2025-50870 (Institute-of-Current-Students 1.0 is vulnerable to Incorrect Access Co ...)
+	TODO: check
+CVE-2025-50869 (A stored Cross-Site Scripting (XSS) vulnerability exists in the qureyd ...)
+	TODO: check
+CVE-2025-50868 (A SQL Injection vulnerability exists in the takeassessment2.php file o ...)
+	TODO: check
+CVE-2025-50472 (The modelscope/ms-swift library thru 2.6.1 is vulnerable to arbitrary  ...)
+	TODO: check
+CVE-2025-50460 (A remote code execution (RCE) vulnerability exists in the ms-swift pro ...)
+	TODO: check
+CVE-2025-4684 (The BlockSpare: Gutenberg Blocks & Patterns for Blogs, Magazines, Busi ...)
+	TODO: check
+CVE-2025-49832 (Asterisk is an open source private branch exchange and telephony toolk ...)
+	TODO: check
+CVE-2025-48074 (OpenEXR provides the specification and reference implementation of the ...)
+	TODO: check
+CVE-2025-46018 (CSC Pay Mobile App 2.19.4 (fixed in version 2.20.0) contains a vulnera ...)
+	TODO: check
+CVE-2025-45778 (A stored cross-site scripting (XSS) vulnerability in The Language Slot ...)
+	TODO: check
+CVE-2025-45767 (jose v6.0.10 was discovered to contain weak encryption.)
+	TODO: check
+CVE-2025-45150 (Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows at ...)
+	TODO: check
+CVE-2025-44139 (Emlog Pro V2.5.7 is vulnerable to Unrestricted Upload of File with Dan ...)
+	TODO: check
+CVE-2025-41376 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41375 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41374 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41373 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41372 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41371 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-41370 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
+	TODO: check
+CVE-2025-33118 (IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 12 is vulnerable to stor ...)
+	TODO: check
+CVE-2025-2824 (IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1 ...)
+	TODO: check
+CVE-2023-44976 (Hangzhou Shunwang Rentdrv2 before 2024-12-24 allows local users to ter ...)
+	TODO: check
+CVE-2023-32256 (A flaw was found in the Linux kernel's ksmbd component. A race conditi ...)
 	- linux 6.3.7-1
 	[bookworm] - linux 6.1.37-1
 	NOTE: https://git.kernel.org/linus/abcc506a9a71976a8b4c9bf3ee6efd13229c1e19 (6.4-rc1)
@@ -19966,7 +20078,7 @@ CVE-2025-41379 (The Intellian C700 web panel allows you to add firewall rules. E
 	NOT-FOR-US: Intellian C700 web panel
 CVE-2025-41378 (The SSID field is not parsed correctly and can be used to inject comma ...)
 	NOT-FOR-US: Intellian
-CVE-2025-41377 (Cryptographic vulnerability in Iridium Certus 700. This vulnerability  ...)
+CVE-2025-41377 (A SQL injection vulnerability has been found in Gandia Integra Total o ...)
 	NOT-FOR-US: Intellian
 CVE-2025-3895 (Token used for resetting passwords in MegaBIP softwareare generated us ...)
 	NOT-FOR-US: MegaBIP
@@ -466532,8 +466644,8 @@ CVE-2019-19146
 	RESERVED
 CVE-2019-19145 (Quantum SuperLoader 3 V94.0 005E.0h devices allow attackers to access  ...)
 	TODO: check
-CVE-2019-19144
-	RESERVED
+CVE-2019-19144 (XML External Entity Injection vulnerability in Quantum DXi6702 2.3.0.3 ...)
+	TODO: check
 CVE-2019-19143 (TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to  ...)
 	NOT-FOR-US: TP-Link
 CVE-2019-19142 (Intelbras WRN240 devices do not require authentication to replace the  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/36b3c7500c110ddbccf25f0265e5dcb75fb7c431

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/36b3c7500c110ddbccf25f0265e5dcb75fb7c431
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250801/44b1c0ee/attachment.htm>


More information about the debian-security-tracker-commits mailing list