Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d88a3dd6 by Salvatore Bonaccorso at 2025-10-10T09:15:44+02:00
Process some new NFUs

- - - - -
e1f01284 by Salvatore Bonaccorso at 2025-10-10T09:15:45+02:00
Add new check-mk issues

- - - - -
26232ea0 by Salvatore Bonaccorso at 2025-10-10T09:15:45+02:00
Add new ffmpeg issues, but without information in public

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,7 +1,7 @@
 CVE-2025-9371 (The Betheme theme for WordPress is vulnerable to Stored 
Cross-Site Scr ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-62228 (Apache Flink CDC version 3.4.0 was vulnerable to a SQL 
injection via m ...)
-       TODO: check
+       NOT-FOR-US: Apache Flink CDC
 CVE-2025-61577 (D-Link DIR-816A2_FWv1.10CNB05 was discovered to contain a 
stack overfl ...)
        NOT-FOR-US: D-Link
 CVE-2025-61532 (Cross Site Scripting vulnerability in SVX Portal v.2.7A to 
execute arb ...)
@@ -93,7 +93,7 @@ CVE-2025-59958 (An Improper Check for Unusual or Exceptional 
Conditions vulnerab
 CVE-2025-59957 (An Origin Validation Error vulnerability in an insufficient 
protected  ...)
        NOT-FOR-US: Juniper
 CVE-2025-59146 (New API is a large language mode (LLM) gateway and artificial 
intellig ...)
-       TODO: check
+       NOT-FOR-US: New API
 CVE-2025-56683 (A cross-site scripting (XSS) vulnerability in the component 
/app/marke ...)
        NOT-FOR-US: Logseq
 CVE-2025-56426 (An issue WebKul Bagisto v.2.3.6 allows a remote attacker to 
execute ar ...)
@@ -109,17 +109,17 @@ CVE-2025-4615 (An improper input neutralization 
vulnerability in the management
 CVE-2025-4614 (An information disclosure vulnerability in Palo Alto Networks 
PAN-OS\x ...)
        NOT-FOR-US: Palo Alto Networks
 CVE-2025-45095 (Lavasoft Web Companion (also known as Ad-Aware WebCompanion) 
versions  ...)
-       TODO: check
+       NOT-FOR-US: Lavasoft Web Companion (also known as Ad-Aware WebCompanion)
 CVE-2025-39664 (Insufficient escaping in the report scheduler within Checkmk 
<2.4.0p13 ...)
-       TODO: check
+       - check-mk <removed>
 CVE-2025-36225 (IBM Aspera 5.0.0 through 5.0.13.1   could disclose sensitive 
user info ...)
        NOT-FOR-US: IBM
 CVE-2025-36171 (IBM Aspera Faspex 5.0.0 through 5.0.13.1could allow a 
privileged user  ...)
        NOT-FOR-US: IBM
 CVE-2025-32919 (Use of an insecure temporary directory in the Windows License 
plugin f ...)
-       TODO: check
+       NOT-FOR-US: Checkmk Windows Agent
 CVE-2025-32916 (Potential use of sensitive information in GET requests in 
Checkmk GmbH ...)
-       TODO: check
+       - check-mk <removed>
 CVE-2025-11573 (An infinite loop issue in Amazon.IonDotnet library versions 
<v1.3.2 ma ...)
        NOT-FOR-US: Amazon
 CVE-2025-11561 (A flaw was found in the integration of Active Directory and 
the System ...)
@@ -131,7 +131,7 @@ CVE-2025-11553 (A weakness has been identified in 
code-projects Courier Manageme
 CVE-2025-11552 (A vulnerability was identified in code-projects Online 
Complaint Site  ...)
        NOT-FOR-US: code-projects
 CVE-2025-11551 (A vulnerability was determined in code-projects Student Result 
Manager ...)
-       TODO: check
+       NOT-FOR-US: code-projects Student Result Manager
 CVE-2025-11550 (A vulnerability was found in Tenda W12 3.0.0.6(3948). The 
impacted ele ...)
        NOT-FOR-US: Tenda
 CVE-2025-11549 (A vulnerability has been found in Tenda W12 3.0.0.6(3948). The 
affecte ...)
@@ -1384,19 +1384,25 @@ CVE-2025-60957 (OS Command Injection vulnerability in 
EndRun Technologies Sonoma
 CVE-2025-60956 (Cross Site Request Forgery (CSRF) vulnerability in EndRun 
Technologies ...)
        NOT-FOR-US: EndRun Technologies Sonoma D12 Network Time Server (GPS)
 CVE-2025-59734 (It is possible to cause an use-after-free write in SANM 
decoding with  ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59733 (When decoding an OpenEXR file that uses DWAA or DWAB 
compression, ther ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59732 (When decoding an OpenEXR file that uses DWAA or DWAB 
compression, ther ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59731 (When decoding an OpenEXR file that uses DWAA or DWAB 
compression, the  ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59730 (When decoding a frame for a SANM file (ANIM v0 variant), the 
decoded d ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59729 (When parsing the header for a DHAV file, there's an integer 
underflow  ...)
-       TODO: check
+       - ffmpeg <undetermined>
+       TODO: check, too little information available, only product association 
from Google CNA
 CVE-2025-59728 (When calculating the content path in handling of MPEG-DASH 
manifests,  ...)
-       TODO: check
+       NOT-FOR-US: MPEG-DASH
 CVE-2025-59452 (The YoSmart YoLink API through 2025-10-02 uses an endpoint URL 
that is ...)
        NOT-FOR-US: YoSmart YoLink API
 CVE-2025-59451 (The YoSmart YoLink application through 2025-10-02 has session 
tokens w ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5b5c3f14e7eb6fafb23e2dbd930e56ea11c47243...26232ea0cfc0140ef459137d141c5536b731c9e8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5b5c3f14e7eb6fafb23e2dbd930e56ea11c47243...26232ea0cfc0140ef459137d141c5536b731c9e8
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to