[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jul 16 09:12:29 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
edb081b8 by security tracker role at 2025-07-16T08:12:21+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,10 +1,74 @@
-CVE-2025-53906
+CVE-2025-7673 (A buffer overflow vulnerability in the URL parser of the zhttpd web se ...)
+	TODO: check
+CVE-2025-7359 (The Counter live visitors for WooCommerce plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2025-6981 (An incorrect authorization vulnerability allowed unauthorized read acc ...)
+	TODO: check
+CVE-2025-6977 (The ProfileGrid \u2013 User Profiles, Groups and Communities plugin fo ...)
+	TODO: check
+CVE-2025-6747 (The Avada (Fusion) Builder plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2025-6043 (The Malcure Malware Scanner \u2014 #1 Toolset for WordPress Malware Re ...)
+	TODO: check
+CVE-2025-5845 (The Affiliate Reviews plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2025-5843 (The Brandfolder plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2025-53958
+	REJECTED
+CVE-2025-53957
+	REJECTED
+CVE-2025-53956
+	REJECTED
+CVE-2025-53955
+	REJECTED
+CVE-2025-53954
+	REJECTED
+CVE-2025-53953
+	REJECTED
+CVE-2025-53952
+	REJECTED
+CVE-2025-53842 (Use of hard-coded credentials issue exists in ZWX-2000CSW2-HN prior to ...)
+	TODO: check
+CVE-2025-52690 (Successful exploitation of the vulnerability could allow an attacker t ...)
+	TODO: check
+CVE-2025-52689 (Successful exploitation of the vulnerability could allow an unauthenti ...)
+	TODO: check
+CVE-2025-52688 (Successful exploitation of the vulnerability could allow an attacker t ...)
+	TODO: check
+CVE-2025-52687 (Successful exploitation of the vulnerability could allow an attacker w ...)
+	TODO: check
+CVE-2025-49841 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49840 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49839 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49838 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49837 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49836 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49835 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49834 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49833 (GPT-SoVITS-WebUI is a voice conversion and text-to-speech webUI. In ve ...)
+	TODO: check
+CVE-2025-49831 (An attacker of Secrets Manager, Self-Hosted installations that route t ...)
+	TODO: check
+CVE-2025-2800 (The WP Event Manager \u2013 Events Calendar, Registrations, Sell Ticke ...)
+	TODO: check
+CVE-2025-2799 (The WP Event Manager \u2013 Events Calendar, Registrations, Sell Ticke ...)
+	TODO: check
+CVE-2025-53906 (Vim is an open source, command line text editor. Prior to version 9.1. ...)
 	- vim <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2025/07/15/2
-CVE-2025-53905
+CVE-2025-53905 (Vim is an open source, command line text editor. Prior to version 9.1. ...)
 	- vim <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2025/07/15/1
-CVE-2025-30761
+CVE-2025-30761 (Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...)
 	- openjdk-8 <unfixed>
 	- openjdk-11 <unfixed>
 CVE-2025-7667 (The Restrict File Access plugin for WordPress is vulnerable to Cross-S ...)
@@ -252,7 +316,7 @@ CVE-2025-30758 (Vulnerability in the Siebel CRM End User product of Oracle Siebe
 	NOT-FOR-US: Oracle
 CVE-2025-30756 (Vulnerability in Oracle REST Data Services (component: General).   The ...)
 	NOT-FOR-US: Oracle
-CVE-2025-30754 (Vulnerability in Oracle Java SE (component: JSSE).  Supported versions ...)
+CVE-2025-30754 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...)
 	- openjdk-8 <unfixed>
 	- openjdk-11 <unfixed>
 	- openjdk-17 <unfixed>
@@ -1670,7 +1734,8 @@ CVE-2024-10391
 	REJECTED
 CVE-2023-50458 (In Dradis before 4.11.0, the Output Console shows a job queue that may ...)
 	NOT-FOR-US: Dradis
-CVE-2025-7370 (A flaw was found in libsoup. A NULL pointer dereference vulnerability  ...)
+CVE-2025-7370
+	REJECTED
 	- libsoup3 <unfixed> (unimportant)
 	NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/430
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2378888



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edb081b84d665f37ae9e312d88113895359422a2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edb081b84d665f37ae9e312d88113895359422a2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250716/ec85fd02/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list