[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Nov 19 20:13:03 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0f6d960e by security tracker role at 2025-11-19T20:12:55+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,165 @@
+CVE-2025-65103 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2025-65100 (Isar is an integration system for automated root filesystem generation ...)
+ TODO: check
+CVE-2025-65099 (Claude Code is an agentic coding tool. Prior to version 1.0.39, when r ...)
+ TODO: check
+CVE-2025-65095 (Lookyloo is a web interface that allows users to capture a website pag ...)
+ TODO: check
+CVE-2025-65094 (WBCE CMS is a content management system. Prior to version 1.6.4, a low ...)
+ TODO: check
+CVE-2025-65089 (XWiki Remote Macros provides XWiki rendering macros that are useful wh ...)
+ TODO: check
+CVE-2025-65034 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65033 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65032 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65031 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65030 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65029 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65028 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65026 (esm.sh is a nobuild content delivery network(CDN) for modern web devel ...)
+ TODO: check
+CVE-2025-65025 (esm.sh is a nobuild content delivery network(CDN) for modern web devel ...)
+ TODO: check
+CVE-2025-65024 (i-Educar is free, fully online school management software. In versions ...)
+ TODO: check
+CVE-2025-65023 (i-Educar is free, fully online school management software. In versions ...)
+ TODO: check
+CVE-2025-65022 (i-Educar is free, fully online school management software. In versions ...)
+ TODO: check
+CVE-2025-65021 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65020 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+ TODO: check
+CVE-2025-65019 (Astro is a web framework. Prior to version 5.15.9, when using Astro's ...)
+ TODO: check
+CVE-2025-64765 (Astro is a web framework. Prior to version 5.15.8, a mismatch exists b ...)
+ TODO: check
+CVE-2025-64764 (Astro is a web framework. Prior to version 5.15.8, a reflected XSS vul ...)
+ TODO: check
+CVE-2025-64759 (Homarr is an open-source dashboard. Prior to version 1.43.3, stored XS ...)
+ TODO: check
+CVE-2025-64757 (Astro is a web framework. Prior to version 5.14.3, a vulnerability has ...)
+ TODO: check
+CVE-2025-64708 (authentik is an open-source Identity Provider. Prior to versions 2025. ...)
+ TODO: check
+CVE-2025-64521 (authentik is an open-source Identity Provider. Prior to versions 2025. ...)
+ TODO: check
+CVE-2025-64408 (Apache Causeway faces Java deserialization vulnerabilities that allow ...)
+ TODO: check
+CVE-2025-63879 (A reflected cross-site scripted (XSS) vulnerability in the /ecommerce/ ...)
+ TODO: check
+CVE-2025-63878 (Github Restaurant Website Restoran v1.0 was discovered to contain a SQ ...)
+ TODO: check
+CVE-2025-63243 (A reflected cross-site scripting (XSS) vulnerability exists in the pas ...)
+ TODO: check
+CVE-2025-63224 (The Itel DAB Encoder (IDEnc build 25aec8d) is vulnerable to Authentica ...)
+ TODO: check
+CVE-2025-63223 (The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 ...)
+ TODO: check
+CVE-2025-63221 (The Axel Technology puma devices (firmware versions 0.8.5 to 1.0.3) ar ...)
+ TODO: check
+CVE-2025-63220 (The Sound4 FIRST web-based management interface is vulnerable to Remot ...)
+ TODO: check
+CVE-2025-63219 (The ITEL ISO FM SFN Adapter (firmware ISO2 2.0.0.0, WebServer 2.0) is ...)
+ TODO: check
+CVE-2025-63218 (The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8 ...)
+ TODO: check
+CVE-2025-63214 (An issue was discovered in bridgetech VBC Server & Element Manager, fi ...)
+ TODO: check
+CVE-2025-63213 (The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vu ...)
+ TODO: check
+CVE-2025-63212 (GatesAir Flexiva-LX devices on firmware 1.0.13 and 2.0, including mode ...)
+ TODO: check
+CVE-2025-63211 (Stored cross-site scripting vulnerability in bridgetech VBC Server & E ...)
+ TODO: check
+CVE-2025-63210 (The Newtec Celox UHD (models: CELOXA504, CELOXA820) running firmware v ...)
+ TODO: check
+CVE-2025-63209 (The ELCA Star Transmitter Remote Control firmware 1.25 for STAR150, BP ...)
+ TODO: check
+CVE-2025-63208 (An issue was discovered in bridgetech VB288 Objective QoE Content Extr ...)
+ TODO: check
+CVE-2025-63207 (The R.V.R Elettronica TEX product (firmware TEXL-000400, Web GUI TLAN- ...)
+ TODO: check
+CVE-2025-63206 (An authentication bypass issue was discovered in Dasan Switch DS2924 w ...)
+ TODO: check
+CVE-2025-63205 (An issue was discovered in bridgetech probes VB220 IP Network Probe,VB ...)
+ TODO: check
+CVE-2025-58412 (A improper neutralization of script-related html tags in a web page (b ...)
+ TODO: check
+CVE-2025-51663 (A vulnerability found in IPRateLimit implementation of FileCodeBox up ...)
+ TODO: check
+CVE-2025-51662 (A stored cross-site scripting (XSS) vulnerability is found in the text ...)
+ TODO: check
+CVE-2025-51661 (A path Traversal vulnerability found in FileCodeBox v2.2 and earlier a ...)
+ TODO: check
+CVE-2025-36371 (IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 are impacted by obtaining an informa ...)
+ TODO: check
+CVE-2025-34337 (eGovFramework/egovframe-common-components versions up to and including ...)
+ TODO: check
+CVE-2025-34336 (eGovFramework/egovframe-common-components versions up to and including ...)
+ TODO: check
+CVE-2025-34335 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34334 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34333 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34332 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34331 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34330 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34329 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-34328 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+ TODO: check
+CVE-2025-13400 (A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the fu ...)
+ TODO: check
+CVE-2025-13397 (A security vulnerability has been detected in mrubyc up to 3.4. This i ...)
+ TODO: check
+CVE-2025-13396 (A weakness has been identified in code-projects Courier Management Sys ...)
+ TODO: check
+CVE-2025-13395 (A security flaw has been discovered in codehub666 94list up to 5831c82 ...)
+ TODO: check
+CVE-2025-13316 (Twonky Server 8.5.2 on Linux and Windows is vulnerable to a cryptograp ...)
+ TODO: check
+CVE-2025-13315 (Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access co ...)
+ TODO: check
+CVE-2025-12766 (An Insecure Direct Object Reference (IDOR) vulnerability in the Manage ...)
+ TODO: check
+CVE-2025-12743 (The Looker endpoint for generating new projects from database connecti ...)
+ TODO: check
+CVE-2025-12592 (Legacy Vivotek Device firmware uses default credetials for the root an ...)
+ TODO: check
+CVE-2025-12472 (An attacker with a Looker Developer role could manipulate a LookML pro ...)
+ TODO: check
+CVE-2025-11963 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2025-11446 (Insertion of Sensitive Information into Log File vulnerability in upKe ...)
+ TODO: check
+CVE-2025-10703 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+ TODO: check
+CVE-2025-10702 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+ TODO: check
+CVE-2025-10437 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+ TODO: check
+CVE-2025-0421 (Improper Restriction of Rendered UI Layers or Frames vulnerability in ...)
+ TODO: check
+CVE-2025-0351
+ REJECTED
+CVE-2024-8528 (Reflected XSS using a specific URL in Automated Logic WebCTRL and Carr ...)
+ TODO: check
+CVE-2024-8527 (Open Redirect in URL parameter in Automated Logic WebCTRL and Carrier ...)
+ TODO: check
CVE-2025-6251 (The Royal Elementor Addons and Templates plugin for WordPress is vulne ...)
NOT-FOR-US: WordPress plugin
CVE-2025-65941
@@ -548,9 +710,11 @@ CVE-2025-11265 (The VK All in One Expansion Unit plugin for WordPress is vulnera
CVE-2025-10089 (Uncontrolled Search Path Element Vulnerability in Setting and Operatio ...)
NOT-FOR-US: Mitsubishi
CVE-2025-13223 (Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed ...)
+ {DSA-6060-1}
- chromium 142.0.7444.175-1
[bullseye] - chromium <end-of-life> (see #1061268)
CVE-2025-13224 (Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed ...)
+ {DSA-6060-1}
- chromium 142.0.7444.175-1
[bullseye] - chromium <end-of-life> (see #1061268)
CVE-2025-65083 (GoSign Desktop through 2.4.1 disables TLS certificate validation when ...)
@@ -15475,7 +15639,7 @@ CVE-2025-61654 [Exclude deleted entries when counting thanks]
[bullseye] - mediawiki <not-affected> (Vulnerable code not present)
NOTE: https://phabricator.wikimedia.org/T397497
NOTE: https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Thanks/+/1193250
-CVE-2025-11230 [BUG/CRITICAL: mjson: fix possible DoS when parsing numbers]
+CVE-2025-11230 (Inefficient algorithm complexity in mjson in HAProxy allows remote att ...)
{DSA-6017-1}
- haproxy 3.2.5-2
[bullseye] - haproxy <not-affected> (Vulnerable code introduced later)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f6d960e3423cc62b9f3a8b556dcc8c0917f3a75
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f6d960e3423cc62b9f3a8b556dcc8c0917f3a75
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251119/f1ec2913/attachment.htm>
More information about the debian-security-tracker-commits
mailing list