[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Mar 5 08:12:06 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9a2247cf by security tracker role at 2025-03-05T08:12:01+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,155 @@
+CVE-2025-27685 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27684 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27683 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27682 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27681 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27680 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+	TODO: check
+CVE-2025-27679 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27678 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27677 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27676 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27675 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27674 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27673 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27672 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27671 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27670 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27669 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27668 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27667 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27666 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27665 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27664 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27663 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27662 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27661 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27660 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27659 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27658 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27657 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27656 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27655 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27654 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27653 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27652 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27651 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27650 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27649 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27648 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27647 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27646 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27645 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27644 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27643 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27642 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27641 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27640 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27639 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27638 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27637 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+	TODO: check
+CVE-2025-27510 (conda-forge-metadata provides programatic access to conda-forge's meta ...)
+	TODO: check
+CVE-2025-26319 (FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file u ...)
+	TODO: check
+CVE-2025-26318 (Insecure permissions in TSplus Remote Access v17.30 allow attackers to ...)
+	TODO: check
+CVE-2025-26136 (A SQL injection vulnerability exists in mysiteforme versions prior to  ...)
+	TODO: check
+CVE-2025-25426 (yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing ...)
+	TODO: check
+CVE-2025-24924 (Certain functionality within GMOD Apollo does not require authenticati ...)
+	TODO: check
+CVE-2025-23410 (When uploading organism or sequence data via the web interface,   GMOD ...)
+	TODO: check
+CVE-2025-21092 (GMOD Apollo does not have sufficient logical or access checks when upd ...)
+	TODO: check
+CVE-2025-20002 (After attempting to upload a file that does not meet prerequisites, GM ...)
+	TODO: check
+CVE-2025-1967 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2025-1966 (A vulnerability classified as critical was found in PHPGurukul Pre-Sch ...)
+	TODO: check
+CVE-2025-1965 (A vulnerability classified as critical has been found in projectworlds ...)
+	TODO: check
+CVE-2025-1964 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+	TODO: check
+CVE-2025-1963 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+	TODO: check
+CVE-2025-1962 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+	TODO: check
+CVE-2025-1961 (A vulnerability has been found in SourceCodester Best Church Managemen ...)
+	TODO: check
+CVE-2025-1959 (A vulnerability, which was classified as critical, was found in Codezi ...)
+	TODO: check
+CVE-2025-1958 (A vulnerability, which was classified as critical, has been found in a ...)
+	TODO: check
+CVE-2025-1957 (A vulnerability classified as problematic was found in code-projects B ...)
+	TODO: check
+CVE-2025-1956 (A vulnerability classified as critical has been found in code-projects ...)
+	TODO: check
+CVE-2025-1955 (A vulnerability was found in code-projects Online Class and Exam Sched ...)
+	TODO: check
+CVE-2025-1954 (A vulnerability was found in PHPGurukul Human Metapneumovirus Testing  ...)
+	TODO: check
+CVE-2025-1316 (Edimax IC-7100 does not properly neutralize requests. An attacker can  ...)
+	TODO: check
+CVE-2024-9135 (On affected platforms running Arista EOS with BGP Link State configure ...)
+	TODO: check
+CVE-2024-8000 (On affected platforms running Arista EOS with 802.1X configured, certa ...)
+	TODO: check
+CVE-2024-0141 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU vBIOS  ...)
+	TODO: check
+CVE-2024-0114 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Manage ...)
+	TODO: check
 CVE-2025-22870
 	- golang-1.24 1.24.1-1
 	- golang-1.23 1.23.7-1
@@ -5,31 +157,31 @@ CVE-2025-22870
 	- golang-1.15 <removed>
 	NOTE: https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
 	NOTE: https://github.com/golang/go/issues/71984
-CVE-2025-1923
+CVE-2025-1923 (Inappropriate implementation in Permission Prompts in Google Chrome pr ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1922
+CVE-2025-1922 (Inappropriate implementation in Selection in Google Chrome on Android  ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1921
+CVE-2025-1921 (Inappropriate implementation in Media Stream in Google Chrome prior to ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1919
+CVE-2025-1919 (Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 al ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1918
+CVE-2025-1918 (Out of bounds read in PDFium in Google Chrome prior to 134.0.6998.35 a ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1917
+CVE-2025-1917 (Inappropriate implementation in Browser UI in Google Chrome on Android ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1916
+CVE-2025-1916 (Use after free in Profiles in Google Chrome prior to 134.0.6998.35 all ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1915
+CVE-2025-1915 (Improper Limitation of a Pathname to a Restricted Directory in DevTool ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1914
+CVE-2025-1914 (Out of bounds read in V8 in Google Chrome prior to 134.0.6998.35 allow ...)
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-27507 (The open-source identity infrastructure software Zitadel allows admini ...)
@@ -98,6 +250,7 @@ CVE-2025-1260 (On affected platforms running Arista EOS with OpenConfig configur
 CVE-2025-1259 (On affected platforms running Arista EOS with OpenConfig configured, a ...)
 	NOT-FOR-US: Arista Networks
 CVE-2025-1080 (LibreOffice supports Office URI Schemes to enable browser integration  ...)
+	{DSA-5873-1}
 	- libreoffice 4:24.8.5-1
 	NOTE: https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080
 	NOTE: https://gerrit.libreoffice.org/c/core/+/181016
@@ -283490,8 +283643,8 @@ CVE-2021-41721
 	RESERVED
 CVE-2021-41720
 	REJECTED
-CVE-2021-41719
-	RESERVED
+CVE-2021-41719 (Maharashtra State Electricity Distribution Company Limited Mahavitran  ...)
+	TODO: check
 CVE-2021-41718
 	RESERVED
 CVE-2021-41717
@@ -361769,8 +361922,8 @@ CVE-2020-23440
 	RESERVED
 CVE-2020-23439
 	RESERVED
-CVE-2020-23438
-	RESERVED
+CVE-2020-23438 (Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading ...)
+	TODO: check
 CVE-2020-23437
 	RESERVED
 CVE-2020-23436
@@ -408362,7 +408515,7 @@ CVE-2019-20173 (The Auth0 wp-auth0 plugin 3.11.x before 3.11.3 for WordPress all
 	NOT-FOR-US: Auth0 wp-auth0 plugin for WordPress
 CVE-2019-20172 (Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not r ...)
 	NOT-FOR-US: SerenityOS
-CVE-2019-20171 (An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20 ...)
+CVE-2019-20171 (An issue was discovered in GPAC version 0.5.2 and 0.9.0-development-20 ...)
 	{DLA-2072-1}
 	- gpac 1.0.1+dfsg1-2 (low)
 	[buster] - gpac <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a2247cfa02f9135f7be341a3cd220dee7684c7b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a2247cfa02f9135f7be341a3cd220dee7684c7b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250305/2a49340a/attachment.htm>


More information about the debian-security-tracker-commits mailing list