[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Oct 15 09:13:00 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ae490f96 by security tracker role at 2025-10-15T08:12:52+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,177 @@
+CVE-2025-8561 (The Ova Advent plugin for WordPress is vulnerable to Stored Cross-Site ...)
+ TODO: check
+CVE-2025-6042 (The Lisfinity Core - Lisfinity Core plugin used for pebas\xae Lisfinit ...)
+ TODO: check
+CVE-2025-62448
+ REJECTED
+CVE-2025-62447
+ REJECTED
+CVE-2025-62446
+ REJECTED
+CVE-2025-62445
+ REJECTED
+CVE-2025-62444
+ REJECTED
+CVE-2025-62443
+ REJECTED
+CVE-2025-62442
+ REJECTED
+CVE-2025-62441
+ REJECTED
+CVE-2025-62440
+ REJECTED
+CVE-2025-62376 (pwn.college DOJO is an education platform for learning cybersecurity. ...)
+ TODO: check
+CVE-2025-62374 (Parse Javascript SDK provides access to the powerful Parse Server back ...)
+ TODO: check
+CVE-2025-61941 (A path traversal issue exists in WXR9300BE6P series firmware versions ...)
+ TODO: check
+CVE-2025-61804 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a Heap-b ...)
+ TODO: check
+CVE-2025-61797 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+ TODO: check
+CVE-2025-61796 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+ TODO: check
+CVE-2025-55080 (In Eclipse ThreadX before 6.4.3, when memory protection is enabled, sy ...)
+ TODO: check
+CVE-2025-55079 (In Eclipse ThreadX before version 6.4.3, the thread module has a setti ...)
+ TODO: check
+CVE-2025-55039 (This issue affects Apache Spark versions before 3.4.4,3.5.2 and 4.0.0 ...)
+ TODO: check
+CVE-2025-54279 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a Use Af ...)
+ TODO: check
+CVE-2025-54278 (Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-base ...)
+ TODO: check
+CVE-2025-54277 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54272 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+ TODO: check
+CVE-2025-54270 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a NULL P ...)
+ TODO: check
+CVE-2025-54269 (Animate versions 23.0.13, 24.0.10 and earlier are affected by an out-o ...)
+ TODO: check
+CVE-2025-54268 (Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-base ...)
+ TODO: check
+CVE-2025-54267 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54266 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54265 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54264 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54263 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+ TODO: check
+CVE-2025-54196 (Adobe Connect versions 12.9 and earlier are affected by a URL Redirect ...)
+ TODO: check
+CVE-2025-49553 (Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cr ...)
+ TODO: check
+CVE-2025-49552 (Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cr ...)
+ TODO: check
+CVE-2025-40000 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2025-39999 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2025-39998 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2025-39997 (In the Linux kernel, the following vulnerability has been resolved: A ...)
+ TODO: check
+CVE-2025-39996 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2025-39995 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2025-39994 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2025-39993 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2025-39992 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ TODO: check
+CVE-2025-39991 (In the Linux kernel, the following vulnerability has been resolved: w ...)
+ TODO: check
+CVE-2025-39990 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ TODO: check
+CVE-2025-39988 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-39987 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-39986 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-39985 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ TODO: check
+CVE-2025-39984 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2025-39983 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2025-39982 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2025-39981 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ TODO: check
+CVE-2025-39980 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2025-39979 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ TODO: check
+CVE-2025-39978 (In the Linux kernel, the following vulnerability has been resolved: o ...)
+ TODO: check
+CVE-2025-39977 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2025-39976 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2025-39975 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ TODO: check
+CVE-2025-39974 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ TODO: check
+CVE-2025-39973 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39972 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39971 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39970 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39969 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39968 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-39967 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ TODO: check
+CVE-2025-39966 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ TODO: check
+CVE-2025-31702 (A vulnerability exists in certain Dahua embedded products. Third-party ...)
+ TODO: check
+CVE-2025-26861 (RemoteCall Remote Support Program (for Operator) versions prior to 5.3 ...)
+ TODO: check
+CVE-2025-26860 (RemoteCall Remote Support Program (for Operator) versions prior to 5.1 ...)
+ TODO: check
+CVE-2025-26859 (RemoteView PC Application Console versions prior to 6.0.2 contain an u ...)
+ TODO: check
+CVE-2025-11746 (The XStore theme for WordPress is vulnerable to Local File Inclusion i ...)
+ TODO: check
+CVE-2025-11501 (The Dynamically Display Posts plugin for WordPress is vulnerable to SQ ...)
+ TODO: check
+CVE-2025-11176 (The Quick Featured Images plugin for WordPress is vulnerable to Insecu ...)
+ TODO: check
+CVE-2025-11161 (The WPBakery Page Builder plugin for WordPress is vulnerable to Stored ...)
+ TODO: check
+CVE-2025-11160 (The WPBakery Page Builder plugin for WordPress is vulnerable to Stored ...)
+ TODO: check
+CVE-2025-10406 (The BlindMatrix e-Commerce WordPress plugin before 3.1 does not valida ...)
+ TODO: check
+CVE-2024-13991 (Huijietong Cloud Video Platform contains a path traversal vulnerabilit ...)
+ TODO: check
+CVE-2023-7311 (BYTEVALUE Intelligent Flow Control Router contains a command injection ...)
+ TODO: check
+CVE-2023-7305 (SmartBI V8, V9, and V10 contain an unrestricted file upload vulnerabil ...)
+ TODO: check
+CVE-2023-7304 (Ruijie RG-UAC Application Management Gateway contains a command inject ...)
+ TODO: check
+CVE-2018-25117 (VestaCP commit a3f0fa1 (2018-05-31) up to commit ee03eff (2018-06-13) ...)
+ TODO: check
+CVE-2017-20205 (Valve's Source SDK (source-sdk-2013)'s ragdoll model parsing logic con ...)
+ TODO: check
+CVE-2017-20204 (DBLTek GoIP devices (models GoIP 1, 4, 8, 16, and 32) contain an undoc ...)
+ TODO: check
+CVE-2011-10033 (The WordPress pluginis-human <= v1.4.2 containsan eval injection vulne ...)
+ TODO: check
CVE-2025-11756
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae490f9607074884f70dd40cf7b6b6d057e70a6a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae490f9607074884f70dd40cf7b6b6d057e70a6a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251015/61648d85/attachment.htm>
More information about the debian-security-tracker-commits
mailing list