[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Nov 19 20:13:03 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0f6d960e by security tracker role at 2025-11-19T20:12:55+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,165 @@
+CVE-2025-65103 (OpenSTAManager is an open source management software for technical ass ...)
+	TODO: check
+CVE-2025-65100 (Isar is an integration system for automated root filesystem generation ...)
+	TODO: check
+CVE-2025-65099 (Claude Code is an agentic coding tool. Prior to version 1.0.39, when r ...)
+	TODO: check
+CVE-2025-65095 (Lookyloo is a web interface that allows users to capture a website pag ...)
+	TODO: check
+CVE-2025-65094 (WBCE CMS is a content management system. Prior to version 1.6.4, a low ...)
+	TODO: check
+CVE-2025-65089 (XWiki Remote Macros provides XWiki rendering macros that are useful wh ...)
+	TODO: check
+CVE-2025-65034 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65033 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65032 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65031 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65030 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65029 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65028 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65026 (esm.sh is a nobuild content delivery network(CDN) for modern web devel ...)
+	TODO: check
+CVE-2025-65025 (esm.sh is a nobuild content delivery network(CDN) for modern web devel ...)
+	TODO: check
+CVE-2025-65024 (i-Educar is free, fully online school management software. In versions ...)
+	TODO: check
+CVE-2025-65023 (i-Educar is free, fully online school management software. In versions ...)
+	TODO: check
+CVE-2025-65022 (i-Educar is free, fully online school management software. In versions ...)
+	TODO: check
+CVE-2025-65021 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65020 (Rallly is an open-source scheduling and collaboration tool. Prior to v ...)
+	TODO: check
+CVE-2025-65019 (Astro is a web framework. Prior to version 5.15.9, when using Astro's  ...)
+	TODO: check
+CVE-2025-64765 (Astro is a web framework. Prior to version 5.15.8, a mismatch exists b ...)
+	TODO: check
+CVE-2025-64764 (Astro is a web framework. Prior to version 5.15.8, a reflected XSS vul ...)
+	TODO: check
+CVE-2025-64759 (Homarr is an open-source dashboard. Prior to version 1.43.3, stored XS ...)
+	TODO: check
+CVE-2025-64757 (Astro is a web framework. Prior to version 5.14.3, a vulnerability has ...)
+	TODO: check
+CVE-2025-64708 (authentik is an open-source Identity Provider. Prior to versions 2025. ...)
+	TODO: check
+CVE-2025-64521 (authentik is an open-source Identity Provider. Prior to versions 2025. ...)
+	TODO: check
+CVE-2025-64408 (Apache Causeway faces Java deserialization vulnerabilities that allow  ...)
+	TODO: check
+CVE-2025-63879 (A reflected cross-site scripted (XSS) vulnerability in the /ecommerce/ ...)
+	TODO: check
+CVE-2025-63878 (Github Restaurant Website Restoran v1.0 was discovered to contain a SQ ...)
+	TODO: check
+CVE-2025-63243 (A reflected cross-site scripting (XSS) vulnerability exists in the pas ...)
+	TODO: check
+CVE-2025-63224 (The Itel DAB Encoder (IDEnc build 25aec8d) is vulnerable to Authentica ...)
+	TODO: check
+CVE-2025-63223 (The Axel Technology StreamerMAX MK II devices (firmware versions 0.8.5 ...)
+	TODO: check
+CVE-2025-63221 (The Axel Technology puma devices (firmware versions 0.8.5 to 1.0.3) ar ...)
+	TODO: check
+CVE-2025-63220 (The Sound4 FIRST web-based management interface is vulnerable to Remot ...)
+	TODO: check
+CVE-2025-63219 (The ITEL ISO FM SFN Adapter (firmware ISO2 2.0.0.0, WebServer 2.0) is  ...)
+	TODO: check
+CVE-2025-63218 (The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8 ...)
+	TODO: check
+CVE-2025-63214 (An issue was discovered in bridgetech VBC Server & Element Manager, fi ...)
+	TODO: check
+CVE-2025-63213 (The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vu ...)
+	TODO: check
+CVE-2025-63212 (GatesAir Flexiva-LX devices on firmware 1.0.13 and 2.0, including mode ...)
+	TODO: check
+CVE-2025-63211 (Stored cross-site scripting vulnerability in bridgetech VBC Server & E ...)
+	TODO: check
+CVE-2025-63210 (The Newtec Celox UHD (models: CELOXA504, CELOXA820) running firmware v ...)
+	TODO: check
+CVE-2025-63209 (The ELCA Star Transmitter Remote Control firmware 1.25 for STAR150, BP ...)
+	TODO: check
+CVE-2025-63208 (An issue was discovered in bridgetech VB288 Objective QoE Content Extr ...)
+	TODO: check
+CVE-2025-63207 (The R.V.R Elettronica TEX product (firmware TEXL-000400, Web GUI TLAN- ...)
+	TODO: check
+CVE-2025-63206 (An authentication bypass issue was discovered in Dasan Switch DS2924 w ...)
+	TODO: check
+CVE-2025-63205 (An issue was discovered in bridgetech probes VB220 IP Network Probe,VB ...)
+	TODO: check
+CVE-2025-58412 (A improper neutralization of script-related html tags in a web page (b ...)
+	TODO: check
+CVE-2025-51663 (A vulnerability found in IPRateLimit implementation of FileCodeBox up  ...)
+	TODO: check
+CVE-2025-51662 (A stored cross-site scripting (XSS) vulnerability is found in the text ...)
+	TODO: check
+CVE-2025-51661 (A path Traversal vulnerability found in FileCodeBox v2.2 and earlier a ...)
+	TODO: check
+CVE-2025-36371 (IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 are impacted by obtaining an informa ...)
+	TODO: check
+CVE-2025-34337 (eGovFramework/egovframe-common-components versions up to and including ...)
+	TODO: check
+CVE-2025-34336 (eGovFramework/egovframe-common-components versions up to and including ...)
+	TODO: check
+CVE-2025-34335 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34334 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34333 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34332 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34331 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34330 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34329 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-34328 (AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to ...)
+	TODO: check
+CVE-2025-13400 (A vulnerability was detected in Tenda CH22 1.0.0.1. Affected is the fu ...)
+	TODO: check
+CVE-2025-13397 (A security vulnerability has been detected in mrubyc up to 3.4. This i ...)
+	TODO: check
+CVE-2025-13396 (A weakness has been identified in code-projects Courier Management Sys ...)
+	TODO: check
+CVE-2025-13395 (A security flaw has been discovered in codehub666 94list up to 5831c82 ...)
+	TODO: check
+CVE-2025-13316 (Twonky Server 8.5.2 on Linux and Windows is vulnerable to a cryptograp ...)
+	TODO: check
+CVE-2025-13315 (Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access co ...)
+	TODO: check
+CVE-2025-12766 (An Insecure Direct Object Reference (IDOR) vulnerability in the Manage ...)
+	TODO: check
+CVE-2025-12743 (The Looker endpoint for generating new projects from database connecti ...)
+	TODO: check
+CVE-2025-12592 (Legacy Vivotek Device firmware uses default credetials for the root an ...)
+	TODO: check
+CVE-2025-12472 (An attacker with a Looker Developer role could manipulate a LookML pro ...)
+	TODO: check
+CVE-2025-11963 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-11446 (Insertion of Sensitive Information into Log File vulnerability in upKe ...)
+	TODO: check
+CVE-2025-10703 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2025-10702 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2025-10437 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-0421 (Improper Restriction of Rendered UI Layers or Frames vulnerability in  ...)
+	TODO: check
+CVE-2025-0351
+	REJECTED
+CVE-2024-8528 (Reflected XSS using a specific URL in Automated Logic WebCTRL and Carr ...)
+	TODO: check
+CVE-2024-8527 (Open Redirect in URL parameter in Automated Logic WebCTRL and Carrier  ...)
+	TODO: check
 CVE-2025-6251 (The Royal Elementor Addons and Templates plugin for WordPress is vulne ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-65941
@@ -548,9 +710,11 @@ CVE-2025-11265 (The VK All in One Expansion Unit plugin for WordPress is vulnera
 CVE-2025-10089 (Uncontrolled Search Path Element Vulnerability in Setting and Operatio ...)
 	NOT-FOR-US: Mitsubishi
 CVE-2025-13223 (Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed  ...)
+	{DSA-6060-1}
 	- chromium 142.0.7444.175-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-13224 (Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed  ...)
+	{DSA-6060-1}
 	- chromium 142.0.7444.175-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2025-65083 (GoSign Desktop through 2.4.1 disables TLS certificate validation when  ...)
@@ -15475,7 +15639,7 @@ CVE-2025-61654 [Exclude deleted entries when counting thanks]
 	[bullseye] - mediawiki <not-affected> (Vulnerable code not present)
 	NOTE: https://phabricator.wikimedia.org/T397497
 	NOTE: https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Thanks/+/1193250
-CVE-2025-11230 [BUG/CRITICAL: mjson: fix possible DoS when parsing numbers]
+CVE-2025-11230 (Inefficient algorithm complexity in mjson in HAProxy allows remote att ...)
 	{DSA-6017-1}
 	- haproxy 3.2.5-2
 	[bullseye] - haproxy <not-affected> (Vulnerable code introduced later)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f6d960e3423cc62b9f3a8b556dcc8c0917f3a75

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f6d960e3423cc62b9f3a8b556dcc8c0917f3a75
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251119/f1ec2913/attachment.htm>


More information about the debian-security-tracker-commits mailing list