[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed May 7 09:12:06 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
24391786 by security tracker role at 2025-05-07T08:11:59+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,7 +1,93 @@
+CVE-2025-4335 (The Woocommerce Multiple Addresses plugin for WordPress is vulnerable  ...)
+	TODO: check
+CVE-2025-4220 (The Xavin's List Subpages plugin for WordPress is vulnerable to S ...)
+	TODO: check
+CVE-2025-4171 (The WZ Followed Posts \u2013 Display what visitors are reading plugin  ...)
+	TODO: check
+CVE-2025-4055 (The Multiple Post Type Order plugin for WordPress is vulnerable to Sto ...)
+	TODO: check
+CVE-2025-4054 (The Relevanssi \u2013 A Better Search plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2025-47420 (266 vulnerability in Crestron Automate VX allows Privilege Escalation. ...)
+	TODO: check
+CVE-2025-47419 (Cleartext Transmission of Sensitive Information vulnerability in Crest ...)
+	TODO: check
+CVE-2025-47418 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2025-46573 (passport-wsfed-saml2 provides passport strategy for both WS-fed and SA ...)
+	TODO: check
+CVE-2025-46572 (passport-wsfed-saml2 provides passport strategy for both WS-fed and SA ...)
+	TODO: check
+CVE-2025-44899 (There is a stack overflow vulnerability in Tenda RX3 V1.0br_V16.03.13. ...)
+	TODO: check
+CVE-2025-44073 (SeaCMS v13.3 was discovered to contain a SQL injection vulnerability v ...)
+	TODO: check
+CVE-2025-3924 (The PeproDev Ultimate Profile Solutions plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2025-3921 (The PeproDev Ultimate Profile Solutions plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2025-3860 (The CarDealerPress plugin for WordPress is vulnerable to Stored Cross- ...)
+	TODO: check
+CVE-2025-3853 (The WPshop 2 \u2013 E-Commerce plugin for WordPress is vulnerable to I ...)
+	TODO: check
+CVE-2025-3852 (The WPshop 2 \u2013 E-Commerce plugin for WordPress is vulnerable to p ...)
+	TODO: check
+CVE-2025-3851 (The Download Manager and Payment Form WordPress Plugin \u2013 WP Smart ...)
+	TODO: check
+CVE-2025-3844 (The PeproDev Ultimate Profile Solutions plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2025-3766 (The Login Lockdown & Protection plugin for WordPress is vulnerable to  ...)
+	TODO: check
+CVE-2025-3218 (IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 is vulnerable to authentication and  ...)
+	TODO: check
+CVE-2025-32405 (An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allow ...)
+	TODO: check
+CVE-2025-32404 (An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allow ...)
+	TODO: check
+CVE-2025-32403 (An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allow ...)
+	TODO: check
+CVE-2025-32402 (An Out-of-bounds Write in RT-Labs P-Net version 1.0.1 or earlier allow ...)
+	TODO: check
+CVE-2025-32401 (An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlie ...)
+	TODO: check
+CVE-2025-32400 (An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlie ...)
+	TODO: check
+CVE-2025-32399 (An Unchecked Input for Loop Condition in RT-Labs P-Net version 1.0.1 o ...)
+	TODO: check
+CVE-2025-32398 (A NULL Pointer Dereference in RT-Labs P-Net version 1.0.1 or earlier a ...)
+	TODO: check
+CVE-2025-32397 (An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlie ...)
+	TODO: check
+CVE-2025-32396 (An Heap-based Buffer Overflow in RT-Labs P-Net version 1.0.1 or earlie ...)
+	TODO: check
+CVE-2025-2821 (The Search Exclude plugin for WordPress is vulnerable to unauthorized  ...)
+	TODO: check
+CVE-2025-1400 (Out-of-bounds Read vulnerability inunpack_response (conn.c) in libplct ...)
+	TODO: check
+CVE-2025-1399 (Out-of-bounds Read vulnerability inunpack_response (session.c) in libp ...)
+	TODO: check
+CVE-2025-0856 (The PGS Core plugin for WordPress is vulnerable to unauthorized access ...)
+	TODO: check
+CVE-2025-0855 (The PGS Core plugin for WordPress is vulnerable to PHP Object Injectio ...)
+	TODO: check
+CVE-2025-0853 (The PGS Core plugin for WordPress is vulnerable to SQL Injection via t ...)
+	TODO: check
+CVE-2025-0669 (Cross-Site Request Forgery (CSRF) vulnerability in BOINC Server allows ...)
+	TODO: check
+CVE-2025-0668 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-0667 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-0666 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-0649 (Incorrect JSON input stringificationin Google's Tensorflow serving ver ...)
+	TODO: check
+CVE-2024-12120 (The Royal Elementor Addons and Templates plugin for WordPress is vulne ...)
+	TODO: check
 CVE-2025-27533 [Unchecked buffer length can cause excessive memory allocation]
 	- activemq <unfixed>
 	NOTE: https://issues.apache.org/jira/browse/AMQ-6596
-CVE-2025-4372
+CVE-2025-4372 (Use after free in WebAudio in Google Chrome prior to 136.0.7103.92 all ...)
 	- chromium 136.0.7103.92-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-4388 (A reflected cross-site scripting (XSS) vulnerability in the Liferay Po ...)
@@ -140897,7 +140983,8 @@ CVE-2023-52028 (TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain
 	NOT-FOR-US: TOTOlink
 CVE-2023-52027 (TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a rem ...)
 	NOT-FOR-US: TOTOlink
-CVE-2023-51989 (D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, ...)
+CVE-2023-51989
+	REJECTED
 	NOT-FOR-US: D-Link
 CVE-2023-51987 (D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, ...)
 	NOT-FOR-US: D-Link



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2439178635045c4e25ca59e8014984582907e1bf

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2439178635045c4e25ca59e8014984582907e1bf
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250507/22ae18b7/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list