[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Mar 5 08:12:06 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9a2247cf by security tracker role at 2025-03-05T08:12:01+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,155 @@
+CVE-2025-27685 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27684 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27683 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27682 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27681 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27680 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 1.0 ...)
+ TODO: check
+CVE-2025-27679 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27678 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27677 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27676 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27675 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27674 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27673 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27672 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27671 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27670 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27669 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27668 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27667 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27666 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27665 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27664 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27663 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27662 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27661 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27660 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27659 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27658 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27657 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27656 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27655 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27654 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27653 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27652 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27651 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27650 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27649 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27648 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27647 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27646 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27645 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27644 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27643 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27642 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27641 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27640 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27639 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27638 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27637 (Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22. ...)
+ TODO: check
+CVE-2025-27510 (conda-forge-metadata provides programatic access to conda-forge's meta ...)
+ TODO: check
+CVE-2025-26319 (FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file u ...)
+ TODO: check
+CVE-2025-26318 (Insecure permissions in TSplus Remote Access v17.30 allow attackers to ...)
+ TODO: check
+CVE-2025-26136 (A SQL injection vulnerability exists in mysiteforme versions prior to ...)
+ TODO: check
+CVE-2025-25426 (yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing ...)
+ TODO: check
+CVE-2025-24924 (Certain functionality within GMOD Apollo does not require authenticati ...)
+ TODO: check
+CVE-2025-23410 (When uploading organism or sequence data via the web interface, GMOD ...)
+ TODO: check
+CVE-2025-21092 (GMOD Apollo does not have sufficient logical or access checks when upd ...)
+ TODO: check
+CVE-2025-20002 (After attempting to upload a file that does not meet prerequisites, GM ...)
+ TODO: check
+CVE-2025-1967 (A vulnerability, which was classified as problematic, has been found i ...)
+ TODO: check
+CVE-2025-1966 (A vulnerability classified as critical was found in PHPGurukul Pre-Sch ...)
+ TODO: check
+CVE-2025-1965 (A vulnerability classified as critical has been found in projectworlds ...)
+ TODO: check
+CVE-2025-1964 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+ TODO: check
+CVE-2025-1963 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+ TODO: check
+CVE-2025-1962 (A vulnerability was found in projectworlds Online Hotel Booking 1.0. I ...)
+ TODO: check
+CVE-2025-1961 (A vulnerability has been found in SourceCodester Best Church Managemen ...)
+ TODO: check
+CVE-2025-1959 (A vulnerability, which was classified as critical, was found in Codezi ...)
+ TODO: check
+CVE-2025-1958 (A vulnerability, which was classified as critical, has been found in a ...)
+ TODO: check
+CVE-2025-1957 (A vulnerability classified as problematic was found in code-projects B ...)
+ TODO: check
+CVE-2025-1956 (A vulnerability classified as critical has been found in code-projects ...)
+ TODO: check
+CVE-2025-1955 (A vulnerability was found in code-projects Online Class and Exam Sched ...)
+ TODO: check
+CVE-2025-1954 (A vulnerability was found in PHPGurukul Human Metapneumovirus Testing ...)
+ TODO: check
+CVE-2025-1316 (Edimax IC-7100 does not properly neutralize requests. An attacker can ...)
+ TODO: check
+CVE-2024-9135 (On affected platforms running Arista EOS with BGP Link State configure ...)
+ TODO: check
+CVE-2024-8000 (On affected platforms running Arista EOS with 802.1X configured, certa ...)
+ TODO: check
+CVE-2024-0141 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU vBIOS ...)
+ TODO: check
+CVE-2024-0114 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Manage ...)
+ TODO: check
CVE-2025-22870
- golang-1.24 1.24.1-1
- golang-1.23 1.23.7-1
@@ -5,31 +157,31 @@ CVE-2025-22870
- golang-1.15 <removed>
NOTE: https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
NOTE: https://github.com/golang/go/issues/71984
-CVE-2025-1923
+CVE-2025-1923 (Inappropriate implementation in Permission Prompts in Google Chrome pr ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1922
+CVE-2025-1922 (Inappropriate implementation in Selection in Google Chrome on Android ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1921
+CVE-2025-1921 (Inappropriate implementation in Media Stream in Google Chrome prior to ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1919
+CVE-2025-1919 (Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 al ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1918
+CVE-2025-1918 (Out of bounds read in PDFium in Google Chrome prior to 134.0.6998.35 a ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1917
+CVE-2025-1917 (Inappropriate implementation in Browser UI in Google Chrome on Android ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1916
+CVE-2025-1916 (Use after free in Profiles in Google Chrome prior to 134.0.6998.35 all ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1915
+CVE-2025-1915 (Improper Limitation of a Pathname to a Restricted Directory in DevTool ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-1914
+CVE-2025-1914 (Out of bounds read in V8 in Google Chrome prior to 134.0.6998.35 allow ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
CVE-2025-27507 (The open-source identity infrastructure software Zitadel allows admini ...)
@@ -98,6 +250,7 @@ CVE-2025-1260 (On affected platforms running Arista EOS with OpenConfig configur
CVE-2025-1259 (On affected platforms running Arista EOS with OpenConfig configured, a ...)
NOT-FOR-US: Arista Networks
CVE-2025-1080 (LibreOffice supports Office URI Schemes to enable browser integration ...)
+ {DSA-5873-1}
- libreoffice 4:24.8.5-1
NOTE: https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080
NOTE: https://gerrit.libreoffice.org/c/core/+/181016
@@ -283490,8 +283643,8 @@ CVE-2021-41721
RESERVED
CVE-2021-41720
REJECTED
-CVE-2021-41719
- RESERVED
+CVE-2021-41719 (Maharashtra State Electricity Distribution Company Limited Mahavitran ...)
+ TODO: check
CVE-2021-41718
RESERVED
CVE-2021-41717
@@ -361769,8 +361922,8 @@ CVE-2020-23440
RESERVED
CVE-2020-23439
RESERVED
-CVE-2020-23438
- RESERVED
+CVE-2020-23438 (Wondershare filmora 9.2.11 is affected by Trojan Dll hijacking leading ...)
+ TODO: check
CVE-2020-23437
RESERVED
CVE-2020-23436
@@ -408362,7 +408515,7 @@ CVE-2019-20173 (The Auth0 wp-auth0 plugin 3.11.x before 3.11.3 for WordPress all
NOT-FOR-US: Auth0 wp-auth0 plugin for WordPress
CVE-2019-20172 (Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not r ...)
NOT-FOR-US: SerenityOS
-CVE-2019-20171 (An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20 ...)
+CVE-2019-20171 (An issue was discovered in GPAC version 0.5.2 and 0.9.0-development-20 ...)
{DLA-2072-1}
- gpac 1.0.1+dfsg1-2 (low)
[buster] - gpac <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a2247cfa02f9135f7be341a3cd220dee7684c7b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a2247cfa02f9135f7be341a3cd220dee7684c7b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250305/2a49340a/attachment.htm>
More information about the debian-security-tracker-commits
mailing list