[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Aug 12 09:12:16 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
dd508590 by security tracker role at 2025-08-12T08:12:09+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,102 @@
-CVE-2025-40920
+CVE-2025-8874 (The Master Addons \u2013 Elementor Addons with White Label, Free Widge ...)
+	TODO: check
+CVE-2025-8767 (The AnWP Football Leagues plugin for WordPress is vulnerable to CSV In ...)
+	TODO: check
+CVE-2025-8690 (The Simple Responsive Slider plugin for WordPress is vulnerable to Sto ...)
+	TODO: check
+CVE-2025-8688 (The Inline Stock Quotes plugin for WordPress is vulnerable to Stored C ...)
+	TODO: check
+CVE-2025-8685 (The Wp chart generator plugin for WordPress is vulnerable to Stored Cr ...)
+	TODO: check
+CVE-2025-8621 (The Mosaic Generator plugin for WordPress is vulnerable to Stored Cros ...)
+	TODO: check
+CVE-2025-8568 (The GMap Generator plugin for WordPress is vulnerable to Stored Cross- ...)
+	TODO: check
+CVE-2025-8482 (The Simple Local Avatars plugin for WordPress is vulnerable to unautho ...)
+	TODO: check
+CVE-2025-8462 (The RT Easy Builder \u2013 Advanced addons for Elementor plugin for Wo ...)
+	TODO: check
+CVE-2025-8418 (The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vu ...)
+	TODO: check
+CVE-2025-8314 (The Software Issue Manager plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2025-8081 (The Elementor plugin for WordPress is vulnerable to Arbitrary File Rea ...)
+	TODO: check
+CVE-2025-8059 (The B Blocks plugin for WordPress is vulnerable to Privilege Escalatio ...)
+	TODO: check
+CVE-2025-7622 (During an internal security assessment, a Server-Side Request Forgery  ...)
+	TODO: check
+CVE-2025-6253 (The UiCore Elements \u2013 Free Elementor widgets and templates plugin ...)
+	TODO: check
+CVE-2025-5391 (The WooCommerce Purchase Orders plugin for WordPress is vulnerable to  ...)
+	TODO: check
+CVE-2025-55161 (Stirling-PDF is a locally hosted web application that performs various ...)
+	TODO: check
+CVE-2025-55159 (slab is a pre-allocated storage for a uniform data type. In version 0. ...)
+	TODO: check
+CVE-2025-55158 (Vim is an open source, command line text editor. In versions from 9.1. ...)
+	TODO: check
+CVE-2025-55157 (Vim is an open source, command line text editor. In versions from 9.1. ...)
+	TODO: check
+CVE-2025-55156 (pyLoad is the free and open-source Download Manager written in pure Py ...)
+	TODO: check
+CVE-2025-55151 (Stirling-PDF is a locally hosted web application that performs various ...)
+	TODO: check
+CVE-2025-55150 (Stirling-PDF is a locally hosted web application that performs various ...)
+	TODO: check
+CVE-2025-55012 (Zed is a multiplayer code editor. Prior to version 0.197.3, in the Zed ...)
+	TODO: check
+CVE-2025-54992 (OpenKilda is an open-source OpenFlow controller. Prior to version 1.16 ...)
+	TODO: check
+CVE-2025-54878 (CryptoLib provides a software-only solution using the CCSDS Space Data ...)
+	TODO: check
+CVE-2025-4390 (The WP Private Content Plus plugin for WordPress is vulnerable to Sens ...)
+	TODO: check
+CVE-2025-47444 (Insertion of Sensitive Information Into Sent Data vulnerability in Liq ...)
+	TODO: check
+CVE-2025-42976 (SAP NetWeaver Application Server ABAP (BIC Document) allows an authent ...)
+	TODO: check
+CVE-2025-42975 (SAP NetWeaver Application Server ABAP (BIC Document) allows an unauthe ...)
+	TODO: check
+CVE-2025-42957 (SAP S/4HANA allows an attacker with user privileges to exploit a vulne ...)
+	TODO: check
+CVE-2025-42955 (Due to a missing authorization check in SAP Cloud Connector, an attack ...)
+	TODO: check
+CVE-2025-42951 (Due to broken authorization, SAP Business One (SLD) allows an authenti ...)
+	TODO: check
+CVE-2025-42950 (SAP Landscape Transformation (SLT) allows an attacker with user privil ...)
+	TODO: check
+CVE-2025-42949 (Due to a missing authorization check in the ABAP Platform, an authenti ...)
+	TODO: check
+CVE-2025-42948 (Due to a Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver ABA ...)
+	TODO: check
+CVE-2025-42946 (Due to directory traversal vulnerability in SAP S/4HANA (Bank Communic ...)
+	TODO: check
+CVE-2025-42945 (SAP NetWeaver Application Server ABAP has HTML injection vulnerability ...)
+	TODO: check
+CVE-2025-42943 (SAP GUI for Windows may allow the leak of NTML hashes when specific AB ...)
+	TODO: check
+CVE-2025-42942 (SAP NetWeaver Application Server for ABAP has cross-site scripting vul ...)
+	TODO: check
+CVE-2025-42941 (SAP Fiori (Launchpad) is vulnerable to Reverse Tabnabbing vulnerabilit ...)
+	TODO: check
+CVE-2025-42936 (The SAP NetWeaver Application Server for ABAP does not enable an admin ...)
+	TODO: check
+CVE-2025-42935 (The SAP NetWeaver Application Server ABAP and ABAP Platform Internet C ...)
+	TODO: check
+CVE-2025-42934 (SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attac ...)
+	TODO: check
+CVE-2025-41686 (A low-privileged local attacker can exploit improper permissions on ns ...)
+	TODO: check
+CVE-2025-3892 (ACAP applications can be executed with elevated privileges, potentiall ...)
+	TODO: check
+CVE-2025-30027 (An ACAP configuration file lacked sufficient input validation, which c ...)
+	TODO: check
+CVE-2025-25235 (Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SE ...)
+	TODO: check
+CVE-2024-32640 (MASA CMS is an Enterprise Content Management platform based on open so ...)
+	TODO: check
+CVE-2025-40920 (Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier  ...)
 	- libcatalyst-authentication-credential-http-perl <unfixed> (bug #1110887)
 	[trixie] - libcatalyst-authentication-credential-http-perl <no-dsa> (Minor issue)
 	[bookworm] - libcatalyst-authentication-credential-http-perl <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dd508590bac688a0db5d8734ca9fc783ed5c3e87

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dd508590bac688a0db5d8734ca9fc783ed5c3e87
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250812/d5d50884/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list