[Git][security-tracker-team/security-tracker][master] 2 commits: Track fixes for tryton-server via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Nov 24 12:19:41 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
02a33aba by Salvatore Bonaccorso at 2025-11-24T13:19:27+01:00
Track fixes for tryton-server via unstable
- - - - -
8d2cbd74 by Salvatore Bonaccorso at 2025-11-24T13:19:27+01:00
Track fix for tryton-sao via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -113,19 +113,19 @@ CVE-2024-21923 (Incorrect default permissions in AMD StoreMI\u2122 could allow a
CVE-2024-21922 (A DLL hijacking vulnerability in AMD StoreMI\u2122 could allow an atta ...)
TODO: check
CVE-2025-XXXX [Export data does not enforce access rights]
- - tryton-server <unfixed> (bug #1121243)
+ - tryton-server 7.0.40-1 (bug #1121243)
NOTE: https://discuss.tryton.org/t/security-release-for-issue-14366/8953
NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14366
CVE-2025-XXXX [IDOR / Access Control Issue - Unauthorized Access to User Signatures]
- - tryton-server <unfixed> (bug #1121241)
+ - tryton-server 7.0.40-1 (bug #1121241)
NOTE: https://discuss.tryton.org/t/security-release-for-issue-14364/8952
NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14364
CVE-2025-XXXX [Information disclosure: unhandled KeyError returns full Python stack trace for unknown fields in JSON-RPC (model.party.party.create)]
- - tryton-server <unfixed> (bug #1121242)
+ - tryton-server 7.0.40-1 (bug #1121242)
NOTE: https://discuss.tryton.org/t/security-release-for-issue-14354/8950
NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14354
CVE-2025-XXXX [Stored XSS Vulnerability Found in Party Field Leading to Arbitrary JavaScript Execution]
- - tryton-sao <unfixed> (bug #1121233)
+ - tryton-sao 7.0.40+ds1-1 (bug #1121233)
NOTE: https://discuss.tryton.org/t/security-release-for-issue-14363/8951
NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14363
CVE-2025-13526 (The OneClick Chat to Order plugin for WordPress is vulnerable to Insec ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b571f816b395f0e5fdac9db0a7f845d9a10d6cd2...8d2cbd74103308d549dcab14de336519e8f3690e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b571f816b395f0e5fdac9db0a7f845d9a10d6cd2...8d2cbd74103308d549dcab14de336519e8f3690e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251124/95be7557/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list