[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jun 20 09:12:48 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e4e7b475 by security tracker role at 2025-06-20T08:12:40+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,97 @@
+CVE-2025-6384 (Improper Control of Dynamically-Managed Code Resources vulnerability i ...)
+	TODO: check
+CVE-2025-6319 (A vulnerability, which was classified as critical, has been found in P ...)
+	TODO: check
+CVE-2025-6318 (A vulnerability classified as critical was found in PHPGurukul Pre-Sch ...)
+	TODO: check
+CVE-2025-6317 (A vulnerability classified as critical has been found in code-projects ...)
+	TODO: check
+CVE-2025-6316 (A vulnerability was found in code-projects Online Shoe Store 1.0. It h ...)
+	TODO: check
+CVE-2025-6315 (A vulnerability was found in code-projects Online Shoe Store 1.0. It h ...)
+	TODO: check
+CVE-2025-6314 (A vulnerability was found in Campcodes Sales and Inventory System 1.0. ...)
+	TODO: check
+CVE-2025-6313 (A vulnerability was found in Campcodes Sales and Inventory System 1.0  ...)
+	TODO: check
+CVE-2025-6312 (A vulnerability has been found in Campcodes Sales and Inventory System ...)
+	TODO: check
+CVE-2025-6311 (A vulnerability, which was classified as critical, was found in Campco ...)
+	TODO: check
+CVE-2025-6310 (A vulnerability, which was classified as critical, has been found in P ...)
+	TODO: check
+CVE-2025-6309 (A vulnerability classified as critical was found in PHPGurukul Emergen ...)
+	TODO: check
+CVE-2025-6308 (A vulnerability classified as critical has been found in PHPGurukul Em ...)
+	TODO: check
+CVE-2025-6307 (A vulnerability was found in code-projects Online Shoe Store 1.0. It h ...)
+	TODO: check
+CVE-2025-6306 (A vulnerability was found in code-projects Online Shoe Store 1.0. It h ...)
+	TODO: check
+CVE-2025-6305 (A vulnerability was found in code-projects Online Shoe Store 1.0. It h ...)
+	TODO: check
+CVE-2025-6304 (A vulnerability was found in code-projects Online Shoe Store 1.0 and c ...)
+	TODO: check
+CVE-2025-6303 (A vulnerability has been found in code-projects Online Shoe Store 1.0  ...)
+	TODO: check
+CVE-2025-6302 (A vulnerability, which was classified as critical, was found in TOTOLI ...)
+	TODO: check
+CVE-2025-6301 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2025-6300 (A vulnerability classified as critical was found in PHPGurukul Employe ...)
+	TODO: check
+CVE-2025-6299 (A vulnerability classified as critical has been found in TOTOLINK N150 ...)
+	TODO: check
+CVE-2025-6296 (A vulnerability was found in code-projects Hostel Management System 1. ...)
+	TODO: check
+CVE-2025-6295 (A vulnerability was found in code-projects Hostel Management System 1. ...)
+	TODO: check
+CVE-2025-6294 (A vulnerability was found in code-projects Hostel Management System 1. ...)
+	TODO: check
+CVE-2025-6293 (A vulnerability was found in code-projects Hostel Management System 1. ...)
+	TODO: check
+CVE-2025-6292 (A vulnerability has been found in D-Link DIR-825 2.03 and classified a ...)
+	TODO: check
+CVE-2025-6291 (A vulnerability, which was classified as critical, was found in D-Link ...)
+	TODO: check
+CVE-2025-6288 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2025-6287 (A vulnerability classified as problematic was found in PHPGurukul COVI ...)
+	TODO: check
+CVE-2025-6286 (A vulnerability classified as problematic has been found in PHPGurukul ...)
+	TODO: check
+CVE-2025-6285 (A vulnerability was found in PHPGurukul COVID19 Testing Management Sys ...)
+	TODO: check
+CVE-2025-6284 (A vulnerability was found in PHPGurukul Car Rental Portal 3.0. It has  ...)
+	TODO: check
+CVE-2025-6283 (A vulnerability was found in xataio Xata Agent up to 0.3.0. It has bee ...)
+	TODO: check
+CVE-2025-6282 (A vulnerability was found in xlang-ai OpenAgents up to ff2e46440699af1 ...)
+	TODO: check
+CVE-2025-6281 (A vulnerability has been found in OpenBMB XAgent up to 1.0.0 and class ...)
+	TODO: check
+CVE-2025-6280 (A vulnerability, which was classified as critical, was found in Transf ...)
+	TODO: check
+CVE-2025-6279 (A vulnerability, which was classified as critical, has been found in U ...)
+	TODO: check
+CVE-2025-6278 (A vulnerability classified as critical was found in Upsonic up to 0.55 ...)
+	TODO: check
+CVE-2025-6277 (A vulnerability classified as critical has been found in Brilliance Go ...)
+	TODO: check
+CVE-2025-6264 (Velociraptor allows collection of VQL queries packaged into Artifacts  ...)
+	TODO: check
+CVE-2025-5125 (The Custom Post Carousels with Owl WordPress plugin before 1.4.12 uses ...)
+	TODO: check
+CVE-2025-50054 (Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and  ...)
+	TODO: check
+CVE-2025-49715 (Exposure of private personal information to an unauthorized actor in D ...)
+	TODO: check
+CVE-2025-48058 (PowSyBl (Power System Blocks) is a framework to build power system ori ...)
+	TODO: check
+CVE-2025-47771 (PowSyBl (Power System Blocks) is a framework to build power system ori ...)
+	TODO: check
+CVE-2025-47293 (PowSyBl (Power System Blocks) is a framework to build power system ori ...)
+	TODO: check
 CVE-2025-5416
 	- keycloak <itp> (bug #1088287)
 CVE-2025-4563
@@ -3711,7 +3805,7 @@ CVE-2025-33056 (Improper access control in Microsoft Local Security Authority Se
 	NOT-FOR-US: Microsoft
 CVE-2025-33055 (Out-of-bounds read in Windows Storage Management Provider allows an au ...)
 	NOT-FOR-US: Microsoft
-CVE-2025-33053 (External control of file name or path in WebDAV allows an unauthorized ...)
+CVE-2025-33053 (External control of file name or path in Internet Shortcut Files allow ...)
 	NOT-FOR-US: Microsoft
 CVE-2025-33052 (Use of uninitialized resource in Windows DWM Core Library allows an au ...)
 	NOT-FOR-US: Microsoft



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e4e7b4750087720d180437006248127642f8e55e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e4e7b4750087720d180437006248127642f8e55e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250620/d1108550/attachment.htm>


More information about the debian-security-tracker-commits mailing list