Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
9a638293 by security tracker role at 2025-09-17T08:12:53+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,95 @@
+CVE-2025-9972 (The N-Reporter, N-Cloud, and N-Probe developed by N-Partner has
an OS ...)
+ TODO: check
+CVE-2025-9971 (Certain models of Industrial Cellular Gateway developed by
Planet Tech ...)
+ TODO: check
+CVE-2025-9891 (The User Sync \u2013 Remote User Sync plugin for WordPress is
vulnerab ...)
+ TODO: check
+CVE-2025-9851 (The Appointmind plugin for WordPress is vulnerable to Stored
Cross-Sit ...)
+ TODO: check
+CVE-2025-9818 (A vulnerability (CWE-428) has been identified in the
Uninterruptible P ...)
+ TODO: check
+CVE-2025-9708 (A vulnerability exists in the Kubernetes C# client where the
certifica ...)
+ TODO: check
+CVE-2025-9629 (The USS Upyun plugin for WordPress is vulnerable to Cross-Site
Request ...)
+ TODO: check
+CVE-2025-9565 (The Blocksy Companion plugin for WordPress is vulnerable to
Stored Cro ...)
+ TODO: check
+CVE-2025-9450 (A Use of Uninitialized Variable vulnerability affecting the JT
file re ...)
+ TODO: check
+CVE-2025-9449 (A Use After Free vulnerability affecting the PAR file reading
procedur ...)
+ TODO: check
+CVE-2025-9447 (An Out-Of-Bounds Read vulnerability affecting the PAR file
reading pro ...)
+ TODO: check
+CVE-2025-9242 (An Out-of-bounds Write vulnerability in WatchGuard Fireware OS
may all ...)
+ TODO: check
+CVE-2025-9216 (The StoreEngine \u2013 Powerful WordPress eCommerce Plugin for
Payment ...)
+ TODO: check
+CVE-2025-9215 (The StoreEngine \u2013 Powerful WordPress eCommerce Plugin for
Payment ...)
+ TODO: check
+CVE-2025-9203 (The Media Player Addons for Elementor plugin for WordPress is
vulnerab ...)
+ TODO: check
+CVE-2025-8394 (The Productive Style plugin for WordPress is vulnerable to
Stored Cros ...)
+ TODO: check
+CVE-2025-8153 (Cross-site Scripting vulnerability in NEC Corporation UNIVERGE
IX from ...)
+ TODO: check
+CVE-2025-59518 (In LemonLDAP::NG before 2.16.7 and 2.17 through 2.21 before
2.21.3, OS ...)
+ TODO: check
+CVE-2025-59307 (RAID Manager provided by Century Corporation registers a
Windows servi ...)
+ TODO: check
+CVE-2025-58116 (Improper neutralization of special elements used in an OS
command ('OS ...)
+ TODO: check
+CVE-2025-55075 (Hidden functionality issue exists in WN-7D36QR and
WN-7D36QR/UE. If th ...)
+ TODO: check
+CVE-2025-54391 (A vulnerability in the EnableTwoFactorAuthRequest SOAP
endpoint of Zim ...)
+ TODO: check
+CVE-2025-43805 (Liferay Portal 7.3.0 through 7.4.3.111, and Liferay DXP
2023.Q4.0, 202 ...)
+ TODO: check
+CVE-2025-43804 (Cross-site scripting (XSS) vulnerability in Search widget in
Liferay P ...)
+ TODO: check
+CVE-2025-37131 (A vulnerability in EdgeConnect SD-WAN ECOS could allow an
authenticate ...)
+ TODO: check
+CVE-2025-37130 (A vulnerability in the command-line interface of EdgeConnect
SD-WAN co ...)
+ TODO: check
+CVE-2025-37129 (A vulnerable feature in the command line interface of
EdgeConnect SD-W ...)
+ TODO: check
+CVE-2025-37128 (A vulnerability in the web API of HPE Aruba Networking
EdgeConnect SD- ...)
+ TODO: check
+CVE-2025-37127 (A vulnerability in the cryptographic logic used by HPE Aruba
Networkin ...)
+ TODO: check
+CVE-2025-37126 (A vulnerability exists in the HPE Aruba Networking EdgeConnect
SD-WAN ...)
+ TODO: check
+CVE-2025-37125 (A broken access control vulnerability exists in HPE Aruba
Networking E ...)
+ TODO: check
+CVE-2025-37124 (A vulnerability in the HPE Aruba Networking SD-WAN Gateways
could allo ...)
+ TODO: check
+CVE-2025-37123 (A vulnerability in the command-line interface of HPE Aruba
Networking ...)
+ TODO: check
+CVE-2025-10589 (The N-Reporter, N-Cloud, and N-Probe developed by N-Partner
has an OS ...)
+ TODO: check
+CVE-2025-10584 (A vulnerability was identified in Portabilis i-Educar up to
2.10. Impa ...)
+ TODO: check
+CVE-2025-10566 (A vulnerability was identified in Campcodes Grocery Sales and
Inventor ...)
+ TODO: check
+CVE-2025-10565 (A vulnerability was determined in Campcodes Grocery Sales and
Inventor ...)
+ TODO: check
+CVE-2025-10564 (A vulnerability was found in Campcodes Grocery Sales and
Inventory Sys ...)
+ TODO: check
+CVE-2025-10188 (The The Hack Repair Guy's Plugin Archiver plugin for WordPress
is vuln ...)
+ TODO: check
+CVE-2025-10166 (The Social Media Shortcodes plugin for WordPress is vulnerable
to Stor ...)
+ TODO: check
+CVE-2025-10143 (The Catch Dark Mode plugin for WordPress is vulnerable to
Local File I ...)
+ TODO: check
+CVE-2025-10125 (The Memberlite Shortcodes plugin for WordPress is vulnerable
to Stored ...)
+ TODO: check
+CVE-2025-10058 (The WP Import \u2013 Ultimate CSV XML Importer for WordPress
plugin fo ...)
+ TODO: check
+CVE-2025-10057 (The WP Import \u2013 Ultimate CSV XML Importer for WordPress
plugin fo ...)
+ TODO: check
+CVE-2025-10050 (The Developer Loggers for Simple History plugin for WordPress
is vulne ...)
+ TODO: check
+CVE-2025-10042 (The Quiz Maker plugin for WordPress is vulnerable to SQL
Injection via ...)
+ TODO: check
CVE-2025-8894 (A maliciously crafted PDF file, when parsed through certain
Autodesk p ...)
NOT-FOR-US: Autodesk
CVE-2025-8893 (A maliciously crafted PDF file, when parsed through certain
Autodesk p ...)
@@ -18876,7 +18968,7 @@ CVE-2025-7870 (A vulnerability, which was classified as
problematic, was found i
NOT-FOR-US: Portabilis i-Diario
CVE-2025-7869 (A vulnerability, which was classified as problematic, has been
found i ...)
NOT-FOR-US: Portabilis i-Educar
-CVE-2025-7868 (A vulnerability classified as problematic was found in
Portabilis i-Ed ...)
+CVE-2025-7868 (A vulnerability was found in Portabilis i-Educar up to 2.10.
This issu ...)
NOT-FOR-US: Portabilis i-Educar
CVE-2025-7867 (A vulnerability has been found in Portabilis i-Educar
2.9.0/2.10.0. Th ...)
NOT-FOR-US: Portabilis i-Educar
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a638293581a0f30226e0a9a1b6773bc36152280
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a638293581a0f30226e0a9a1b6773bc36152280
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits