[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jul 31 09:12:02 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
62074748 by security tracker role at 2025-07-31T08:11:55+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,107 @@
+CVE-2025-8373 (A vulnerability was found in code-projects Vehicle Management 1.0. It ...)
+ TODO: check
+CVE-2025-8372 (A vulnerability was found in code-projects Exam Form Submission 1.0 an ...)
+ TODO: check
+CVE-2025-8371 (A vulnerability has been found in code-projects Exam Form Submission 1 ...)
+ TODO: check
+CVE-2025-8370 (A vulnerability, which was classified as problematic, was found in Por ...)
+ TODO: check
+CVE-2025-8369 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2025-8368 (A vulnerability classified as problematic was found in Portabilis i-Ed ...)
+ TODO: check
+CVE-2025-8367 (A vulnerability classified as problematic has been found in Portabilis ...)
+ TODO: check
+CVE-2025-8366 (A vulnerability was found in Portabilis i-Educar 2.9. It has been rate ...)
+ TODO: check
+CVE-2025-8365 (A vulnerability was found in Portabilis i-Educar 2.10. It has been dec ...)
+ TODO: check
+CVE-2025-8348 (A vulnerability has been found in Kehua Charging Pile Cloud Platform 1 ...)
+ TODO: check
+CVE-2025-8347 (A vulnerability, which was classified as critical, was found in Kehua ...)
+ TODO: check
+CVE-2025-8346 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2025-8345 (A vulnerability classified as critical was found in Shanghai Lingdang ...)
+ TODO: check
+CVE-2025-8344 (A vulnerability classified as critical has been found in openviglet sh ...)
+ TODO: check
+CVE-2025-8343 (A vulnerability was found in openviglet shio up to 0.3.8. It has been ...)
+ TODO: check
+CVE-2025-8340 (A vulnerability was found in code-projects Intern Membership Managemen ...)
+ TODO: check
+CVE-2025-8339 (A vulnerability was found in code-projects Intern Membership Managemen ...)
+ TODO: check
+CVE-2025-8338 (A vulnerability was found in projectworlds Online Admission System 1.0 ...)
+ TODO: check
+CVE-2025-8337 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2025-8336 (A vulnerability classified as critical was found in Campcodes Online R ...)
+ TODO: check
+CVE-2025-8335 (A vulnerability classified as problematic has been found in code-proje ...)
+ TODO: check
+CVE-2025-8334 (A vulnerability was found in Campcodes Online Recruitment Management S ...)
+ TODO: check
+CVE-2025-8333 (A vulnerability was found in code-projects Online Farm System 1.0. It ...)
+ TODO: check
+CVE-2025-8332 (A vulnerability was found in code-projects Online Farm System 1.0. It ...)
+ TODO: check
+CVE-2025-7847 (The AI Engine plugin for WordPress is vulnerable to arbitrary file upl ...)
+ TODO: check
+CVE-2025-7356
+ REJECTED
+CVE-2025-7205 (The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for ...)
+ TODO: check
+CVE-2025-5720 (The Customer Reviews for WooCommerce plugin for WordPress is vulnerabl ...)
+ TODO: check
+CVE-2025-54829
+ REJECTED
+CVE-2025-54828
+ REJECTED
+CVE-2025-54827
+ REJECTED
+CVE-2025-54826
+ REJECTED
+CVE-2025-54825
+ REJECTED
+CVE-2025-54824
+ REJECTED
+CVE-2025-54823
+ REJECTED
+CVE-2025-54757 (Multiple versions of PowerCMS allow unrestricted upload of dangerous f ...)
+ TODO: check
+CVE-2025-54752 (Multiple versions of PowerCMS improperly neutralize formula elements i ...)
+ TODO: check
+CVE-2025-54586 (GitProxy is an application that stands between developers and a Git re ...)
+ TODO: check
+CVE-2025-54585 (GitProxy is an application that stands between developers and a Git re ...)
+ TODO: check
+CVE-2025-54085 (CVE-2025-54085 is a vulnerability in the management console of Absolut ...)
+ TODO: check
+CVE-2025-53558 (ZXHN-F660T and ZXHN-F660A provided by ZTE Japan K.K. use a common cred ...)
+ TODO: check
+CVE-2025-49084 (CVE-2025-49084 is a vulnerability in the management console of Absolut ...)
+ TODO: check
+CVE-2025-49083 (CVE-2025-49083 is a vulnerability in the management console of Absolut ...)
+ TODO: check
+CVE-2025-49082 (CVE-2025-49082 is a vulnerability in the management console of Absolut ...)
+ TODO: check
+CVE-2025-46359 (A path traversal issue exists in backup and restore feature of multipl ...)
+ TODO: check
+CVE-2025-41396 (A path traversal issue exists in file uploading feature of multiple ve ...)
+ TODO: check
+CVE-2025-41391 (Stored cross-site scripting vulnerability exists in multiple versions ...)
+ TODO: check
+CVE-2025-36563 (Reflected cross-site scripting vulnerability exists in multiple versio ...)
+ TODO: check
+CVE-2025-36040 (IBM Aspera Faspex 5.0.0 through 5.0.12.1 could allow an authenticated ...)
+ TODO: check
+CVE-2025-36039 (IBM Aspera Faspex 5.0.0 through 5.0.12.1 could allow an authenticated ...)
+ TODO: check
+CVE-2024-11478
+ REJECTED
+CVE-2023-41674
+ REJECTED
CVE-2025-8353 (UI synchronization issue in the Just-in-Time (JIT) access request appr ...)
NOT-FOR-US: Devolutions
CVE-2025-8331 (A vulnerability was found in code-projects Online Farm System 1.0 and ...)
@@ -18530,7 +18634,7 @@ CVE-2025-37993 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/dcaeeb8ae84c5506ebc574732838264f3887738c (6.15-rc6)
CVE-2025-4598 (A vulnerability was found in systemd-coredump. This flaw allows an att ...)
- {DSA-5931-1}
+ {DSA-5931-1 DLA-4259-1}
- systemd 257.6-1 (bug #1106785)
NOTE: https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
NOTE: For a comprehensive fix a kernel change is required (to hand a pidfd to the usermode
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62074748a6cbfd6a3eba8769194f17e82be9bce5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62074748a6cbfd6a3eba8769194f17e82be9bce5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250731/1de9490e/attachment.htm>
More information about the debian-security-tracker-commits
mailing list