[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 15 09:13:00 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ae490f96 by security tracker role at 2025-10-15T08:12:52+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,177 @@
+CVE-2025-8561 (The Ova Advent plugin for WordPress is vulnerable to Stored Cross-Site ...)
+	TODO: check
+CVE-2025-6042 (The Lisfinity Core - Lisfinity Core plugin used for pebas\xae Lisfinit ...)
+	TODO: check
+CVE-2025-62448
+	REJECTED
+CVE-2025-62447
+	REJECTED
+CVE-2025-62446
+	REJECTED
+CVE-2025-62445
+	REJECTED
+CVE-2025-62444
+	REJECTED
+CVE-2025-62443
+	REJECTED
+CVE-2025-62442
+	REJECTED
+CVE-2025-62441
+	REJECTED
+CVE-2025-62440
+	REJECTED
+CVE-2025-62376 (pwn.college DOJO is an education platform for learning cybersecurity.  ...)
+	TODO: check
+CVE-2025-62374 (Parse Javascript SDK provides access to the powerful Parse Server back ...)
+	TODO: check
+CVE-2025-61941 (A path traversal issue exists in WXR9300BE6P series firmware versions  ...)
+	TODO: check
+CVE-2025-61804 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a Heap-b ...)
+	TODO: check
+CVE-2025-61797 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+	TODO: check
+CVE-2025-61796 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+	TODO: check
+CVE-2025-55080 (In Eclipse ThreadX before 6.4.3, when memory protection is enabled, sy ...)
+	TODO: check
+CVE-2025-55079 (In Eclipse ThreadX before version 6.4.3, the thread module has a setti ...)
+	TODO: check
+CVE-2025-55039 (This issue affects Apache Spark versions before  3.4.4,3.5.2 and 4.0.0 ...)
+	TODO: check
+CVE-2025-54279 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a Use Af ...)
+	TODO: check
+CVE-2025-54278 (Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-base ...)
+	TODO: check
+CVE-2025-54277 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54272 (Adobe Experience Manager versions 11.6 and earlier are affected by a s ...)
+	TODO: check
+CVE-2025-54270 (Animate versions 23.0.13, 24.0.10 and earlier are affected by a NULL P ...)
+	TODO: check
+CVE-2025-54269 (Animate versions 23.0.13, 24.0.10 and earlier are affected by an out-o ...)
+	TODO: check
+CVE-2025-54268 (Bridge versions 14.1.8, 15.1.1 and earlier are affected by a Heap-base ...)
+	TODO: check
+CVE-2025-54267 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54266 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54265 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54264 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54263 (Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2 ...)
+	TODO: check
+CVE-2025-54196 (Adobe Connect versions 12.9 and earlier are affected by a URL Redirect ...)
+	TODO: check
+CVE-2025-49553 (Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cr ...)
+	TODO: check
+CVE-2025-49552 (Adobe Connect versions 12.9 and earlier are affected by a DOM-based Cr ...)
+	TODO: check
+CVE-2025-40000 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2025-39999 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2025-39998 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2025-39997 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2025-39996 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2025-39995 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2025-39994 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2025-39993 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2025-39992 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2025-39991 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2025-39990 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2025-39988 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2025-39987 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2025-39986 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2025-39985 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2025-39984 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2025-39983 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2025-39982 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2025-39981 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2025-39980 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2025-39979 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2025-39978 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	TODO: check
+CVE-2025-39977 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2025-39976 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2025-39975 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2025-39974 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	TODO: check
+CVE-2025-39973 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39972 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39971 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39970 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39969 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39968 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-39967 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2025-39966 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2025-31702 (A vulnerability exists in certain Dahua embedded products. Third-party ...)
+	TODO: check
+CVE-2025-26861 (RemoteCall Remote Support Program (for Operator) versions prior to 5.3 ...)
+	TODO: check
+CVE-2025-26860 (RemoteCall Remote Support Program (for Operator) versions prior to 5.1 ...)
+	TODO: check
+CVE-2025-26859 (RemoteView PC Application Console versions prior to 6.0.2 contain an u ...)
+	TODO: check
+CVE-2025-11746 (The XStore theme for WordPress is vulnerable to Local File Inclusion i ...)
+	TODO: check
+CVE-2025-11501 (The Dynamically Display Posts plugin for WordPress is vulnerable to SQ ...)
+	TODO: check
+CVE-2025-11176 (The Quick Featured Images plugin for WordPress is vulnerable to Insecu ...)
+	TODO: check
+CVE-2025-11161 (The WPBakery Page Builder plugin for WordPress is vulnerable to Stored ...)
+	TODO: check
+CVE-2025-11160 (The WPBakery Page Builder plugin for WordPress is vulnerable to Stored ...)
+	TODO: check
+CVE-2025-10406 (The BlindMatrix e-Commerce WordPress plugin before 3.1 does not valida ...)
+	TODO: check
+CVE-2024-13991 (Huijietong Cloud Video Platform contains a path traversal vulnerabilit ...)
+	TODO: check
+CVE-2023-7311 (BYTEVALUE Intelligent Flow Control Router contains a command injection ...)
+	TODO: check
+CVE-2023-7305 (SmartBI V8, V9, and V10 contain an unrestricted file upload vulnerabil ...)
+	TODO: check
+CVE-2023-7304 (Ruijie RG-UAC Application Management Gateway contains a command inject ...)
+	TODO: check
+CVE-2018-25117 (VestaCP commit a3f0fa1 (2018-05-31) up to commit ee03eff (2018-06-13)  ...)
+	TODO: check
+CVE-2017-20205 (Valve's Source SDK (source-sdk-2013)'s ragdoll model parsing logic con ...)
+	TODO: check
+CVE-2017-20204 (DBLTek GoIP devices (models GoIP 1, 4, 8, 16, and 32) contain an undoc ...)
+	TODO: check
+CVE-2011-10033 (The WordPress pluginis-human <= v1.4.2 containsan eval injection vulne ...)
+	TODO: check
 CVE-2025-11756
 	- chromium <unfixed>
 	[bullseye] - chromium <end-of-life> (see #1061268)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae490f9607074884f70dd40cf7b6b6d057e70a6a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae490f9607074884f70dd40cf7b6b6d057e70a6a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251015/61648d85/attachment.htm>


More information about the debian-security-tracker-commits mailing list