[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Jun 13 09:12:30 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9ea0fab7 by security tracker role at 2025-06-13T08:12:23+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,89 @@
+CVE-2025-6012 (The Auto Attachments plugin for WordPress is vulnerable to Stored Cros ...)
+ TODO: check
+CVE-2025-5950 (The IndieBlocks plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+ TODO: check
+CVE-2025-5939 (The Telegram for WP plugin for WordPress is vulnerable to Stored Cross ...)
+ TODO: check
+CVE-2025-5938 (The Digital Marketing and Agency Templates Addons for Elementor plugin ...)
+ TODO: check
+CVE-2025-5930 (The WP2HTML plugin for WordPress is vulnerable to Cross-Site Request F ...)
+ TODO: check
+CVE-2025-5928 (The WP Sliding Login/Dashboard Panel plugin for WordPress is vulnerabl ...)
+ TODO: check
+CVE-2025-5926 (The Link Shield plugin for WordPress is vulnerable to Cross-Site Reque ...)
+ TODO: check
+CVE-2025-5923 (The Game Review Block plugin for WordPress is vulnerable to Stored Cro ...)
+ TODO: check
+CVE-2025-5841 (The ACF Onyx Poll plugin for WordPress is vulnerable to Stored Cross-S ...)
+ TODO: check
+CVE-2025-5815 (The Traffic Monitor plugin for WordPress is vulnerable to unauthorized ...)
+ TODO: check
+CVE-2025-5491 (Acer ControlCenter contains Remote Code Execution vulnerability. The p ...)
+ TODO: check
+CVE-2025-5288 (The REST API | Custom API Generator For Cross Platform And Import Expo ...)
+ TODO: check
+CVE-2025-5282 (The WP Travel Engine \u2013 Tour Booking Plugin \u2013 Tour Operator S ...)
+ TODO: check
+CVE-2025-5233 (The Color Palette plugin for WordPress is vulnerable to Stored Cross-S ...)
+ TODO: check
+CVE-2025-5123 (The Contact Us Page \u2013 Contact People plugin for WordPress is vuln ...)
+ TODO: check
+CVE-2025-4586 (The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Si ...)
+ TODO: check
+CVE-2025-4585 (The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Si ...)
+ TODO: check
+CVE-2025-4584 (The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Si ...)
+ TODO: check
+CVE-2025-4233 (An insufficient implementation of cache vulnerability in Palo Alto Net ...)
+ TODO: check
+CVE-2025-4232 (An improper neutralization of wildcards vulnerability in the log colle ...)
+ TODO: check
+CVE-2025-4231 (A command injection vulnerability in Palo Alto Networks PAN-OS\xae ena ...)
+ TODO: check
+CVE-2025-4230 (A command injection vulnerability in Palo Alto Networks PAN-OS\xae sof ...)
+ TODO: check
+CVE-2025-4229 (An information disclosure vulnerability in the SD-WAN feature of Palo ...)
+ TODO: check
+CVE-2025-4228 (An incorrect privilege assignment vulnerability in Palo Alto Networks ...)
+ TODO: check
+CVE-2025-4227 (An improper access control vulnerability in the Endpoint Traffic Poli ...)
+ TODO: check
+CVE-2025-49589 (PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. A stack- ...)
+ TODO: check
+CVE-2025-47959 (Improper neutralization of special elements used in a command ('comman ...)
+ TODO: check
+CVE-2025-44091 (yangyouwang crud v1.0.0 is vulnerable to Cross Site Scripting (XSS) vi ...)
+ TODO: check
+CVE-2025-41234 (Description In Spring Framework, versions 6.0.x as of 6.0.5, versions ...)
+ TODO: check
+CVE-2025-41233 (Description: VMware AVI Load Balancer contains an authenticated blind ...)
+ TODO: check
+CVE-2025-39240 (Some Hikvision Wireless Access Point are vulnerable to authenticated r ...)
+ TODO: check
+CVE-2025-27689 (Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper ...)
+ TODO: check
+CVE-2025-22242 (Worker process denial of service through file read operation. .A vulne ...)
+ TODO: check
+CVE-2025-22241 (File contents overwrite the VirtKey class is called when \u201con-dema ...)
+ TODO: check
+CVE-2025-22240 (Arbitrary directory creation or file deletion. In the find_file method ...)
+ TODO: check
+CVE-2025-22239 (Arbitrary event injection on Salt Master. The master's "_minion_event" ...)
+ TODO: check
+CVE-2025-22238 (Directory traversal attack in minion file cache creation. The master's ...)
+ TODO: check
+CVE-2025-22237 (An attacker with access to a minion key can exploit the 'on demand' pi ...)
+ TODO: check
+CVE-2025-22236 (Minion event bus authorization bypass. An attacker with access to a mi ...)
+ TODO: check
+CVE-2024-38825 (The salt.auth.pki module does not properly authenticate callers. The " ...)
+ TODO: check
+CVE-2024-38824 (Directory traversal vulnerability in recv_file method allows arbitrary ...)
+ TODO: check
+CVE-2024-38823 (Salt's request server is vulnerable to replay attacks when not using a ...)
+ TODO: check
+CVE-2024-38822 (Multiple methods in the salt master skip minion token validation. Ther ...)
+ TODO: check
CVE-2025-49794
- libxml2 <unfixed>
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2372373
@@ -134,7 +220,7 @@ CVE-2024-44905 (go-pg pg v10.13.0 was discovered to contain a SQL injection vuln
TODO: check details
CVE-2023-45256 (Multiple SQL injection vulnerabilities in the EuroInformation Monetico ...)
NOT-FOR-US: PrestaShop module
-CVE-2025-30399
+CVE-2025-30399 (Untrusted search path in .NET and Visual Studio allows an unauthorized ...)
NOT-FOR-US: Microsoft .NET
CVE-2025-6009 (A vulnerability was found in kiCode111 like-girl 5.2.0 and classified ...)
NOT-FOR-US: kiCode111 like-girl
@@ -371276,7 +371362,7 @@ CVE-2021-20590 (Improper authentication vulnerability in GOT2000 series GT27 mod
NOT-FOR-US: Mitsubishi
CVE-2021-20589 (Buffer access with incorrect length value vulnerability in GOT2000 ser ...)
NOT-FOR-US: Mitsubishi
-CVE-2021-20588 (Improper handling of length parameter inconsistency vulnerability in M ...)
+CVE-2021-20588 (Improper Handling of Length Parameter Inconsistency vulnerability in M ...)
NOT-FOR-US: Mitsubishi
CVE-2021-20587 (Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Eng ...)
NOT-FOR-US: Mitsubishi
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ea0fab79117776dbbad087a3c42d989fd9aa40e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ea0fab79117776dbbad087a3c42d989fd9aa40e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250613/91459316/attachment.htm>
More information about the debian-security-tracker-commits
mailing list