[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 4 21:12:49 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6224e40a by security tracker role at 2025-08-04T20:12:42+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,119 @@
+CVE-2025-8524 (A vulnerability was found in Boquan DotWallet App 2.15.2 on Android an ...)
+	TODO: check
+CVE-2025-8523 (A vulnerability has been found in RiderLike Fruit Crush-Brain App 1.0  ...)
+	TODO: check
+CVE-2025-8522 (A vulnerability, which was classified as critical, was found in givanz ...)
+	TODO: check
+CVE-2025-8521 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2025-8520 (A vulnerability classified as critical was found in givanz Vvveb up to ...)
+	TODO: check
+CVE-2025-8519 (A vulnerability classified as problematic has been found in givanz Vvv ...)
+	TODO: check
+CVE-2025-8518 (A vulnerability was found in givanz Vvveb 1.0.5. It has been rated as  ...)
+	TODO: check
+CVE-2025-8517 (A vulnerability was found in givanz Vvveb 1.0.6.1. It has been declare ...)
+	TODO: check
+CVE-2025-8516 (A vulnerability was found in Kingdee Cloud-Starry-Sky Enterprise Editi ...)
+	TODO: check
+CVE-2025-8515 (A vulnerability was found in Intelbras InControl 2.21.60.9 and classif ...)
+	TODO: check
+CVE-2025-8341 (Grafana is an open-source platform for monitoring and observability. T ...)
+	TODO: check
+CVE-2025-8109 (Software installed and run as a non-privileged user may conduct ptrace ...)
+	TODO: check
+CVE-2025-6205 (A missing authorization vulnerability affecting DELMIA Apriso from Rel ...)
+	TODO: check
+CVE-2025-6204 (An Improper Control of Generation of Code (Code Injection) vulnerabili ...)
+	TODO: check
+CVE-2025-5988 (A flaw was found in the Ansible aap-gateway. Cross-site request forger ...)
+	TODO: check
+CVE-2025-55014 (The YouDao plugin for StarDict, as used in stardict 3.0.7+git20220909+ ...)
+	TODO: check
+CVE-2025-53395 (Paramount Macrium Reflect through 2025-06-26 allows local attackers to ...)
+	TODO: check
+CVE-2025-53394 (Paramount Macrium Reflect through 2025-06-26 allows attackers to execu ...)
+	TODO: check
+CVE-2025-52239 (An arbitrary file upload vulnerability in ZKEACMS v4.1 allows attacker ...)
+	TODO: check
+CVE-2025-51536 (Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered ...)
+	TODO: check
+CVE-2025-51535 (Austrian Archaeological Institute (AI) OpenAtlas v8.11.0 as discovered ...)
+	TODO: check
+CVE-2025-51534 (A cross-site scripting (XSS) vulnerability in Austrian Archaeological  ...)
+	TODO: check
+CVE-2025-51390 (TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a com ...)
+	TODO: check
+CVE-2025-50422 (An issue was discovered in freedesktop poppler v25.04.0. The heap memo ...)
+	TODO: check
+CVE-2025-50420 (An issue in the pdfseparate utility of freedesktop poppler v25.04.0 al ...)
+	TODO: check
+CVE-2025-50340 (An Insecure Direct Object Reference (IDOR) vulnerability was discovere ...)
+	TODO: check
+CVE-2025-46206 (An issue in Artifex mupdf 1.25.6, 1.25.5 allows a remote attacker to c ...)
+	TODO: check
+CVE-2025-44963 (RUCKUS Network Director (RND) before 4.5 allows spoofing of an adminis ...)
+	TODO: check
+CVE-2025-44962 (RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows ../ director ...)
+	TODO: check
+CVE-2025-44961 (In RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build, OS command inje ...)
+	TODO: check
+CVE-2025-44960 (RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build allows OS command i ...)
+	TODO: check
+CVE-2025-44958 (RUCKUS Network Director (RND) before 4.5 stores passwords in a recover ...)
+	TODO: check
+CVE-2025-44957 (Ruckus SmartZone (SZ) before 6.1.2p3 Refresh Build allows authenticati ...)
+	TODO: check
+CVE-2025-44955 (RUCKUS Network Director (RND) before 4.5 allows jailed users to obtain ...)
+	TODO: check
+CVE-2025-44954 (RUCKUS SmartZone (SZ) before 6.1.2p3 Refresh Build has a hardcoded SSH ...)
+	TODO: check
+CVE-2025-44643 (Certain Draytek products are affected by Insecure Configuration. This  ...)
+	TODO: check
+CVE-2025-41691 (An unauthenticated remote attacker may trigger a NULL pointer derefere ...)
+	TODO: check
+CVE-2025-41659 (A low-privileged attacker can remotely access the PKI folder of the CO ...)
+	TODO: check
+CVE-2025-41658 (CODESYS Runtime Toolkit-based products may expose sensitive files to l ...)
+	TODO: check
+CVE-2025-38741 (Dell Enterprise SONiC OS, version 4.5.0, contains a cryptographic key  ...)
+	TODO: check
+CVE-2025-38739 (Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insuffic ...)
+	TODO: check
+CVE-2025-36607 (Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injecti ...)
+	TODO: check
+CVE-2025-36606 (Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injecti ...)
+	TODO: check
+CVE-2025-36605 (Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutraliz ...)
+	TODO: check
+CVE-2025-36604 (Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutraliz ...)
+	TODO: check
+CVE-2025-36594 (Dell PowerProtect Data Domain with Data Domain Operating System (DD OS ...)
+	TODO: check
+CVE-2025-34147 (An unauthenticated OS command injection vulnerability exists in the Sh ...)
+	TODO: check
+CVE-2025-30099 (Dell PowerProtect Data Domain with Data Domain Operating System (DD OS ...)
+	TODO: check
+CVE-2025-30098 (Dell PowerProtect Data Domain with Data Domain Operating System (DD OS ...)
+	TODO: check
+CVE-2025-30097 (Dell PowerProtect Data Domain with Data Domain Operating System (DD OS ...)
+	TODO: check
+CVE-2025-30096 (Dell PowerProtect Data Domain with Data Domain Operating System (DD OS ...)
+	TODO: check
+CVE-2025-26476 (Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0, conta ...)
+	TODO: check
+CVE-2025-26065 (A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2.2.9  ...)
+	TODO: check
+CVE-2025-21120 (Dell Avamar, versions prior to 19.12 with patch 338905, excluding vers ...)
+	TODO: check
+CVE-2025-0932 (Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver,  ...)
+	TODO: check
+CVE-2024-45183 (An issue was discovered in Samsung Mobile Processor Exynos 2100, 1280, ...)
+	TODO: check
+CVE-2013-10054 (An unauthenticated arbitrary file upload vulnerability exists in Libre ...)
+	TODO: check
+CVE-2013-10052 (ZPanel includes a helper binary named zsudo, intended to allow restric ...)
+	TODO: check
 CVE-2025-54962 (/edit-user in webserver in OpenPLC Runtime 3 through 9cd8f1b allows au ...)
 	TODO: check
 CVE-2025-48499 (Out-of-bounds write vulnerability exists in FUJIFILM Business Innovati ...)
@@ -74499,7 +74615,7 @@ CVE-2024-53242 (A vulnerability has been identified in Teamcenter Visualization
 	NOT-FOR-US: Siemens
 CVE-2024-53041 (A vulnerability has been identified in Teamcenter Visualization V14.2  ...)
 	NOT-FOR-US: Siemens
-CVE-2024-52538 (Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of ...)
+CVE-2024-52538 (Dell Avamar, versions prior to 19.12 with patch 338905, excluding 19.1 ...)
 	NOT-FOR-US: Dell
 CVE-2024-52051 (A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All vers ...)
 	NOT-FOR-US: Siemens
@@ -74683,9 +74799,9 @@ CVE-2024-49059 (Microsoft Office Elevation of Privilege Vulnerability)
 	NOT-FOR-US: Microsoft
 CVE-2024-49057 (Microsoft Defender for Endpoint on Android Spoofing Vulnerability)
 	NOT-FOR-US: Microsoft
-CVE-2024-47977 (Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of ...)
+CVE-2024-47977 (Dell Avamar, versions prior to 19.12 with patch 338905, excluding 19.1 ...)
 	NOT-FOR-US: Dell
-CVE-2024-47484 (Dell Avamar, version(s) 19.x, contain(s) an Improper Neutralization of ...)
+CVE-2024-47484 (Dell Avamar, versions prior to 19.12 with patch 338905, excluding 19.1 ...)
 	NOT-FOR-US: Dell
 CVE-2024-47117 (IBM Carbon Design System (Carbon Charts 0.4.0 through 1.13.16) is vuln ...)
 	NOT-FOR-US: IBM



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6224e40a37300a41ee26e7e3a616b866d6178a94

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6224e40a37300a41ee26e7e3a616b866d6178a94
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250804/75d2c2a4/attachment.htm>


More information about the debian-security-tracker-commits mailing list