[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Dec 22 20:13:08 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8333bc60 by security tracker role at 2025-12-22T20:12:54+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,91 @@
+CVE-2025-8460 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2025-68645 (A Local File Inclusion (LFI) vulnerability exists in the Webmail Class ...)
+ TODO: check
+CVE-2025-68337 (In the Linux kernel, the following vulnerability has been resolved: j ...)
+ TODO: check
+CVE-2025-68336 (In the Linux kernel, the following vulnerability has been resolved: l ...)
+ TODO: check
+CVE-2025-68335 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-68334 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ TODO: check
+CVE-2025-68333 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2025-68332 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-68331 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2025-68330 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-68329 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2025-68328 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2025-68327 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ TODO: check
+CVE-2025-68326 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ TODO: check
+CVE-2025-67826 (An issue was discovered in K7 Ultimate Security 17.0.2045. A Local Pri ...)
+ TODO: check
+CVE-2025-67443 (Schlix CMS before v2.2.9-5 is vulnerable to Cross Site Scripting (XSS) ...)
+ TODO: check
+CVE-2025-67418 (ClipBucket 5.5.2 is affected by an improper access control issue where ...)
+ TODO: check
+CVE-2025-67291 (A stored cross-site scripting (XSS) vulnerability in the Media module ...)
+ TODO: check
+CVE-2025-67290 (A stored cross-site scripting (XSS) vulnerability in the Page Settings ...)
+ TODO: check
+CVE-2025-67289 (An arbitrary file upload vulnerability in the Attachments module of Fr ...)
+ TODO: check
+CVE-2025-67288 (An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows a ...)
+ TODO: check
+CVE-2025-65837 (PublicCMS V5.202506.b is vulnerable to Cross Site Scripting (XSS) in t ...)
+ TODO: check
+CVE-2025-65790 (A reflected cross-site scripting (XSS) vulnerability exists in FuguHub ...)
+ TODO: check
+CVE-2025-65270 (Reflected cross-site scripting (XSS) vulnerability in ClinCapture EDC ...)
+ TODO: check
+CVE-2025-63664 (Incorrect access control in the /api/v1/conversations/*/messages API o ...)
+ TODO: check
+CVE-2025-63663 (Incorrect access control in the /api/v1/conversations/*/files API of G ...)
+ TODO: check
+CVE-2025-63662 (Insecure permissions in the /api/v1/agents API of GT Edge AI Platform ...)
+ TODO: check
+CVE-2025-62880 (Cross-Site Request Forgery (CSRF) vulnerability in Kunal Nagar Custom ...)
+ TODO: check
+CVE-2025-62107 (Cross-Site Request Forgery (CSRF) vulnerability in PluginOps Feather L ...)
+ TODO: check
+CVE-2025-62094 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+ TODO: check
+CVE-2025-61740 (Authentication issue that does not verify the source of a packet which ...)
+ TODO: check
+CVE-2025-61739 (Due to Nonce reuse, attackers can perform reply attack or decrypt capt ...)
+ TODO: check
+CVE-2025-61738 (Under certain circumstances, attacker can capture the network key, rea ...)
+ TODO: check
+CVE-2025-54890 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2025-26787 (An error in the SignServer container startup logic was found in Keyfac ...)
+ TODO: check
+CVE-2025-26379 (Use of a weak pseudo-random number generator, which may allow an attac ...)
+ TODO: check
+CVE-2025-15033 (A vulnerability in WooCommerce 8.1 to 10.4.2 can allow logged-in custo ...)
+ TODO: check
+CVE-2025-14273 (Mattermost versions 11.1.x <= 11.1.0, 11.0.x <= 11.0.5, 10.12.x <= 10. ...)
+ TODO: check
+CVE-2025-14018 (Unquoted Search Path or Element vulnerability in NetBT Consulting Serv ...)
+ TODO: check
+CVE-2025-12514 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2025-10021 (A Use of Uninitialized Variable vulnerability exists in Open DesignAll ...)
+ TODO: check
+CVE-2024-35321 (MyNET up to v26.08 was discovered to contain a Reflected cross-site sc ...)
+ TODO: check
+CVE-2024-25814 (MyNET up to v26.05 was discovered to contain a reflected cross-site sc ...)
+ TODO: check
+CVE-2024-25812 (MyNET up to v26.05 was discovered to contain a reflected cross-site sc ...)
+ TODO: check
CVE-2025-8305 (An authenticated local user can obtain information that allows claimin ...)
NOT-FOR-US: Check Point
CVE-2025-8304 (An authenticated local user can obtain information that allows claimin ...)
@@ -228,7 +316,7 @@ CVE-2025-66524 (Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Proc
NOT-FOR-US: Apache software not packaged in Debian
CVE-2025-65035 (pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventor ...)
NOT-FOR-US: GLPI plugin (databaseinventory)
-CVE-2025-63665 (An issue in GT Edge AI Platform Versions before v2.0.10-dev allows att ...)
+CVE-2025-63665 (An issue in GT Edge AI Community Edition Versions before v2.0.12 allow ...)
NOT-FOR-US: GT Edge AI Platform
CVE-2025-58053 (Galette is a membership management web application for non profit orga ...)
- galette <removed>
@@ -477,7 +565,7 @@ CVE-2025-34450 (merbanan/rtl_433 versions up to and including 25.02 and prior to
[bookworm] - rtl-433 <no-dsa> (Minor issue)
NOTE: https://github.com/merbanan/rtl_433/issues/3375
NOTE: https://github.com/dd32/rtl_433/commit/25e47f8932f0401392ef1d3c8cc9ed5595bc894a
-CVE-2025-34449 (Genymobile/scrcpy versions up to and including 3.3.3 and prior to comm ...)
+CVE-2025-34449 (Genymobile/scrcpy versions up to and including 3.3.3, prior to commit ...)
- scrcpy <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/Genymobile/scrcpy/issues/6415
NOTE: Introduced with: https://github.com/Genymobile/scrcpy/commit/87da68ee0d74831a2b44230c573a3b315c8fd7d3 (v2.4)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8333bc60858752b4c8724719059f803125eb3db0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8333bc60858752b4c8724719059f803125eb3db0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251222/fc99563b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list