[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Sep 17 09:12:59 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9a638293 by security tracker role at 2025-09-17T08:12:53+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,95 @@
+CVE-2025-9972 (The N-Reporter, N-Cloud, and N-Probe developed by N-Partner has an OS  ...)
+	TODO: check
+CVE-2025-9971 (Certain models of Industrial Cellular Gateway developed by Planet Tech ...)
+	TODO: check
+CVE-2025-9891 (The User Sync \u2013 Remote User Sync plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2025-9851 (The Appointmind plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2025-9818 (A vulnerability (CWE-428) has been identified in the Uninterruptible P ...)
+	TODO: check
+CVE-2025-9708 (A vulnerability exists in the Kubernetes C# client where the certifica ...)
+	TODO: check
+CVE-2025-9629 (The USS Upyun plugin for WordPress is vulnerable to Cross-Site Request ...)
+	TODO: check
+CVE-2025-9565 (The Blocksy Companion plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2025-9450 (A Use of Uninitialized Variable vulnerability affecting the JT file re ...)
+	TODO: check
+CVE-2025-9449 (A Use After Free vulnerability affecting the PAR file reading procedur ...)
+	TODO: check
+CVE-2025-9447 (An Out-Of-Bounds Read vulnerability affecting the PAR file reading pro ...)
+	TODO: check
+CVE-2025-9242 (An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may all ...)
+	TODO: check
+CVE-2025-9216 (The StoreEngine \u2013 Powerful WordPress eCommerce Plugin for Payment ...)
+	TODO: check
+CVE-2025-9215 (The StoreEngine \u2013 Powerful WordPress eCommerce Plugin for Payment ...)
+	TODO: check
+CVE-2025-9203 (The Media Player Addons for Elementor plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2025-8394 (The Productive Style plugin for WordPress is vulnerable to Stored Cros ...)
+	TODO: check
+CVE-2025-8153 (Cross-site Scripting vulnerability in NEC Corporation UNIVERGE IX from ...)
+	TODO: check
+CVE-2025-59518 (In LemonLDAP::NG before 2.16.7 and 2.17 through 2.21 before 2.21.3, OS ...)
+	TODO: check
+CVE-2025-59307 (RAID Manager provided by Century Corporation registers a Windows servi ...)
+	TODO: check
+CVE-2025-58116 (Improper neutralization of special elements used in an OS command ('OS ...)
+	TODO: check
+CVE-2025-55075 (Hidden functionality issue exists in WN-7D36QR and WN-7D36QR/UE. If th ...)
+	TODO: check
+CVE-2025-54391 (A vulnerability in the EnableTwoFactorAuthRequest SOAP endpoint of Zim ...)
+	TODO: check
+CVE-2025-43805 (Liferay Portal 7.3.0 through 7.4.3.111, and Liferay DXP 2023.Q4.0, 202 ...)
+	TODO: check
+CVE-2025-43804 (Cross-site scripting (XSS) vulnerability in Search widget in Liferay P ...)
+	TODO: check
+CVE-2025-37131 (A vulnerability in EdgeConnect SD-WAN ECOS could allow an authenticate ...)
+	TODO: check
+CVE-2025-37130 (A vulnerability in the command-line interface of EdgeConnect SD-WAN co ...)
+	TODO: check
+CVE-2025-37129 (A vulnerable feature in the command line interface of EdgeConnect SD-W ...)
+	TODO: check
+CVE-2025-37128 (A vulnerability in the web API of HPE Aruba Networking EdgeConnect SD- ...)
+	TODO: check
+CVE-2025-37127 (A vulnerability in the cryptographic logic used by HPE Aruba Networkin ...)
+	TODO: check
+CVE-2025-37126 (A vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN  ...)
+	TODO: check
+CVE-2025-37125 (A broken access control vulnerability exists in HPE Aruba Networking E ...)
+	TODO: check
+CVE-2025-37124 (A vulnerability in the HPE Aruba Networking SD-WAN Gateways could allo ...)
+	TODO: check
+CVE-2025-37123 (A vulnerability in the command-line interface of HPE Aruba Networking  ...)
+	TODO: check
+CVE-2025-10589 (The N-Reporter, N-Cloud, and N-Probe developed by N-Partner has an OS  ...)
+	TODO: check
+CVE-2025-10584 (A vulnerability was identified in Portabilis i-Educar up to 2.10. Impa ...)
+	TODO: check
+CVE-2025-10566 (A vulnerability was identified in Campcodes Grocery Sales and Inventor ...)
+	TODO: check
+CVE-2025-10565 (A vulnerability was determined in Campcodes Grocery Sales and Inventor ...)
+	TODO: check
+CVE-2025-10564 (A vulnerability was found in Campcodes Grocery Sales and Inventory Sys ...)
+	TODO: check
+CVE-2025-10188 (The The Hack Repair Guy's Plugin Archiver plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2025-10166 (The Social Media Shortcodes plugin for WordPress is vulnerable to Stor ...)
+	TODO: check
+CVE-2025-10143 (The Catch Dark Mode plugin for WordPress is vulnerable to Local File I ...)
+	TODO: check
+CVE-2025-10125 (The Memberlite Shortcodes plugin for WordPress is vulnerable to Stored ...)
+	TODO: check
+CVE-2025-10058 (The WP Import \u2013 Ultimate CSV XML Importer for WordPress plugin fo ...)
+	TODO: check
+CVE-2025-10057 (The WP Import \u2013 Ultimate CSV XML Importer for WordPress plugin fo ...)
+	TODO: check
+CVE-2025-10050 (The Developer Loggers for Simple History plugin for WordPress is vulne ...)
+	TODO: check
+CVE-2025-10042 (The Quiz Maker plugin for WordPress is vulnerable to SQL Injection via ...)
+	TODO: check
 CVE-2025-8894 (A maliciously crafted PDF file, when parsed through certain Autodesk p ...)
 	NOT-FOR-US: Autodesk
 CVE-2025-8893 (A maliciously crafted PDF file, when parsed through certain Autodesk p ...)
@@ -18876,7 +18968,7 @@ CVE-2025-7870 (A vulnerability, which was classified as problematic, was found i
 	NOT-FOR-US: Portabilis i-Diario
 CVE-2025-7869 (A vulnerability, which was classified as problematic, has been found i ...)
 	NOT-FOR-US: Portabilis i-Educar
-CVE-2025-7868 (A vulnerability classified as problematic was found in Portabilis i-Ed ...)
+CVE-2025-7868 (A vulnerability was found in Portabilis i-Educar up to 2.10. This issu ...)
 	NOT-FOR-US: Portabilis i-Educar
 CVE-2025-7867 (A vulnerability has been found in Portabilis i-Educar 2.9.0/2.10.0. Th ...)
 	NOT-FOR-US: Portabilis i-Educar



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a638293581a0f30226e0a9a1b6773bc36152280

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a638293581a0f30226e0a9a1b6773bc36152280
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250917/123ce470/attachment.htm>


More information about the debian-security-tracker-commits mailing list