[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Sep 9 09:12:12 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ed5b06ba by security tracker role at 2025-09-09T08:12:05+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,141 @@
+CVE-2025-9542 (The AutomatorWP \u2013 Automator plugin for no-code automations, webho ...)
+ TODO: check
+CVE-2025-9539 (The AutomatorWP \u2013 Automator plugin for no-code automations, webho ...)
+ TODO: check
+CVE-2025-9489 (The The WP-Members Membership Plugin plugin for WordPress is vulnerabl ...)
+ TODO: check
+CVE-2025-9111 (The AI ChatBot for WordPress WordPress plugin before 7.1.0 does not s ...)
+ TODO: check
+CVE-2025-9061 (The Wilmer Core plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+ TODO: check
+CVE-2025-9058 (The Mikado Core plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+ TODO: check
+CVE-2025-8889 (The Compress & Upload WordPress plugin before 1.0.5 does not properly ...)
+ TODO: check
+CVE-2025-58757 (MONAI (Medical Open Network for AI) is an AI toolkit for health care i ...)
+ TODO: check
+CVE-2025-58756 (MONAI (Medical Open Network for AI) is an AI toolkit for health care i ...)
+ TODO: check
+CVE-2025-58755 (MONAI (Medical Open Network for AI) is an AI toolkit for health care i ...)
+ TODO: check
+CVE-2025-58752 (Vite is a frontend tooling framework for JavaScript. Prior to versions ...)
+ TODO: check
+CVE-2025-58751 (Vite is a frontend tooling framework for JavaScript. Prior to versions ...)
+ TODO: check
+CVE-2025-58746 (The Volkov Labs Business Links panel for Grafana provides an interface ...)
+ TODO: check
+CVE-2025-58745 (WeGIA is a Web manager for charitable institutions. The fix for CVE-20 ...)
+ TODO: check
+CVE-2025-58454 (WeGIA is a Web manager for charitable institutions. A SQL Injection vu ...)
+ TODO: check
+CVE-2025-58453 (WeGIA is a Web manager for charitable institutions. A SQL Injection vu ...)
+ TODO: check
+CVE-2025-58452 (WeGIA is a Web manager for charitable institutions. A Reflected Cross- ...)
+ TODO: check
+CVE-2025-58451 (Cattown is a JavaScript markdown parser. Versions prior to 1.0.2 used ...)
+ TODO: check
+CVE-2025-58450 (pREST (PostgreSQL REST), is an API that delivers an application on top ...)
+ TODO: check
+CVE-2025-58449 (Maho is a free and open source ecommerce platform. In Maho prior to 25 ...)
+ TODO: check
+CVE-2025-58444 (The MCP inspector is a developer tool for testing and debugging MCP se ...)
+ TODO: check
+CVE-2025-58365 (The XWiki blog application allows users of the XWiki platform to creat ...)
+ TODO: check
+CVE-2025-57817 (Fides is an open-source privacy engineering platform. Prior to version ...)
+ TODO: check
+CVE-2025-57816 (Fides is an open-source privacy engineering platform. Prior to version ...)
+ TODO: check
+CVE-2025-57815 (Fides is an open-source privacy engineering platform. Prior to version ...)
+ TODO: check
+CVE-2025-57766 (Fides is an open-source privacy engineering platform. Prior to version ...)
+ TODO: check
+CVE-2025-52288 (Assertion failure in function ngap_build_downlink_nas_transport in fil ...)
+ TODO: check
+CVE-2025-43778 (A Stored cross-site scripting vulnerability in the Liferay Portal 7.4 ...)
+ TODO: check
+CVE-2025-43777 (Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 thr ...)
+ TODO: check
+CVE-2025-43774 (A reflected cross-site scripting (XSS) vulnerability in the Liferay Po ...)
+ TODO: check
+CVE-2025-43763 (A server-side request forgery (SSRF) vulnerability exist in the Lifera ...)
+ TODO: check
+CVE-2025-42958 (Due to a missing authentication check in the SAP NetWeaver application ...)
+ TODO: check
+CVE-2025-42944 (Due to a deserialization vulnerability in SAP NetWeaver, an unauthenti ...)
+ TODO: check
+CVE-2025-42938 (Due to a Cross-Site Scripting (XSS) vulnerability in the SAP NetWeaver ...)
+ TODO: check
+CVE-2025-42933 (When a user logs in via SAP Business One native client, the SLD backen ...)
+ TODO: check
+CVE-2025-42930 (SAP Business Planning and Consolidation allows an authenticated standa ...)
+ TODO: check
+CVE-2025-42929 (Due to missing input validation, an attacker with high privilege acces ...)
+ TODO: check
+CVE-2025-42927 (SAP NetWeaver AS Java application uses Adobe Document Service, install ...)
+ TODO: check
+CVE-2025-42926 (SAP NetWeaver Application Server Java does not perform an authenticati ...)
+ TODO: check
+CVE-2025-42925 (Due to the lack of randomness in assigning Object Identifiers in the S ...)
+ TODO: check
+CVE-2025-42923 (Due to insufficient CSRF protection in SAP Fiori App Manage Work Cente ...)
+ TODO: check
+CVE-2025-42922 (SAP NetWeaver AS Java allows an attacker authenticated as a non-admini ...)
+ TODO: check
+CVE-2025-42920 (Due to a Cross-Site Scripting (XSS) vulnerability in the SAP Supplier ...)
+ TODO: check
+CVE-2025-42918 (SAP NetWeaver Application Server for ABAP allows authenticated users w ...)
+ TODO: check
+CVE-2025-42917 (SAP HCM Approve Timesheets Fiori 2.0 application does not perform nece ...)
+ TODO: check
+CVE-2025-42916 (Due to missing input validation, an attacker with high privilege acces ...)
+ TODO: check
+CVE-2025-42915 (Fiori app Manage Payment Blocks does not perform the necessary authori ...)
+ TODO: check
+CVE-2025-42914 (Due to missing authorization checks, SAP HCM My Timesheet Fiori 2.0 ap ...)
+ TODO: check
+CVE-2025-42913 (Due to missing authorization checks, SAP HCM My Timesheet Fiori 2.0 ap ...)
+ TODO: check
+CVE-2025-42912 (SAP HCM My Timesheet Fiori 2.0 application does not perform necessary ...)
+ TODO: check
+CVE-2025-42911 (SAP NetWeaver (Service Data Download) allows an authenticated user to ...)
+ TODO: check
+CVE-2025-1761 (IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker ...)
+ TODO: check
+CVE-2025-10123 (A vulnerability was determined in D-Link DIR-823X up to 250416. Affect ...)
+ TODO: check
+CVE-2025-10122 (A vulnerability was found in Maccms10 2025.1000.4050. Affected is the ...)
+ TODO: check
+CVE-2025-10121 (A flaw has been found in uverif up to 3.2. This affects the function a ...)
+ TODO: check
+CVE-2025-10120 (A vulnerability was detected in Tenda AC20 up to 16.03.08.12. The impa ...)
+ TODO: check
+CVE-2025-10118 (A security vulnerability has been detected in itsourcecode E-Logbook w ...)
+ TODO: check
+CVE-2025-10117 (A weakness has been identified in SourceCodester Simple To-Do List Sys ...)
+ TODO: check
+CVE-2025-10116 (A vulnerability was identified in SiempreCMS up to 1.3.6. This vulnera ...)
+ TODO: check
+CVE-2025-10115 (A vulnerability was determined in SiempreCMS up to 1.3.6. This affects ...)
+ TODO: check
+CVE-2025-10114 (A vulnerability was found in PHPGurukul Small CRM 4.0. Affected by thi ...)
+ TODO: check
+CVE-2025-10113 (A security vulnerability has been detected in itsourcecode Student Inf ...)
+ TODO: check
+CVE-2025-10112 (A weakness has been identified in itsourcecode Student Information Man ...)
+ TODO: check
+CVE-2025-10111 (A security flaw has been discovered in itsourcecode Student Informatio ...)
+ TODO: check
+CVE-2025-10110 (A vulnerability was identified in ChanCMS up to 3.3.1. Impacted is an ...)
+ TODO: check
+CVE-2025-10109 (A vulnerability was determined in Campcodes Online Loan Management Sys ...)
+ TODO: check
+CVE-2025-10108 (A vulnerability was found in Campcodes Online Loan Management System 1 ...)
+ TODO: check
+CVE-2025-10106 (A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. Th ...)
+ TODO: check
+CVE-2025-10105 (A flaw has been found in yanyutao0402 ChanCMS up to 3.3.1. Affected by ...)
+ TODO: check
CVE-2025-9114 (The Doccure theme for WordPress is vulnerable to Arbitrary User Passwo ...)
NOT-FOR-US: WordPress plugin
CVE-2025-9113 (The Doccure theme for WordPress is vulnerable to arbitrary file upload ...)
@@ -13947,7 +14085,7 @@ CVE-2025-8033 (The JavaScript engine did not handle closed generators correctly
CVE-2025-8039 (In some cases search terms persisted in the URL bar even after navigat ...)
- firefox 141.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-56/#CVE-2025-8039
-CVE-2025-8038 (Firefox ignored paths when checking the validity of navigations in a f ...)
+CVE-2025-8038 (Thunderbird ignored paths when checking the validity of navigations in ...)
- firefox 141.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-56/#CVE-2025-8038
CVE-2025-8032 (XSLT document loading did not correctly propagate the source document ...)
@@ -13980,10 +14118,10 @@ CVE-2025-8030 (Insufficient escaping in the \u201cCopy as cURL\u201d feature cou
CVE-2025-8037 (Setting a nameless cookie with an equals sign in the value shadowed ot ...)
- firefox 141.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-56/#CVE-2025-8037
-CVE-2025-8036 (Firefox cached CORS preflight responses across IP address changes. Thi ...)
+CVE-2025-8036 (Thunderbird cached CORS preflight responses across IP address changes. ...)
- firefox 141.0-1
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-56/#CVE-2025-8036
-CVE-2025-8029 (Firefox executed `javascript:` URLs when used in `object` and `embed` ...)
+CVE-2025-8029 (Thunderbird executed `javascript:` URLs when used in `object` and `emb ...)
{DSA-5966-1 DSA-5964-1 DLA-4253-1 DLA-4250-1}
- firefox 141.0-1
- firefox-esr 128.13.0esr-1
@@ -119852,6 +119990,7 @@ CVE-2024-7446 (A vulnerability, which was classified as critical, was found in i
CVE-2024-6331 (stitionai/devika main branch as of commit cdfb782b0e634b773b10963c8034 ...)
NOT-FOR-US: stitionai/devika
CVE-2024-7409 (A flaw was found in the QEMU NBD Server. This vulnerability allows a d ...)
+ {DLA-4296-1}
- qemu 1:9.0.2+ds-3
[bookworm] - qemu 1:7.2+dfsg-7+deb12u8
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2302487
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed5b06ba655505795bbc9097afef67a661d9c071
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed5b06ba655505795bbc9097afef67a661d9c071
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250909/697f9042/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list