Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ec619a12 by security tracker role at 2025-08-08T08:11:58+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,71 @@
+CVE-2025-8708 (A vulnerability was found in Antabot White-Jotter 0.22. It has 
been de ...)
+       TODO: check
+CVE-2025-8707 (A vulnerability was found in Huuge Box App 1.0.3 on Android. It 
has be ...)
+       TODO: check
+CVE-2025-8706 (A vulnerability has been found in Wanzhou WOES Intelligent 
Optimizatio ...)
+       TODO: check
+CVE-2025-8705 (A vulnerability, which was classified as critical, was found in 
Wanzho ...)
+       TODO: check
+CVE-2025-8704 (A vulnerability, which was classified as critical, has been 
found in W ...)
+       TODO: check
+CVE-2025-8703 (A vulnerability classified as critical was found in Wanzhou 
WOES Intel ...)
+       TODO: check
+CVE-2025-8702 (A vulnerability classified as critical has been found in 
Wanzhou WOES  ...)
+       TODO: check
+CVE-2025-8701 (A vulnerability was found in Wanzhou WOES Intelligent 
Optimization Ene ...)
+       TODO: check
+CVE-2025-8698 (A vulnerability was found in Open5GS up to 2.7.5. It has been 
classifi ...)
+       TODO: check
+CVE-2025-6572 (The OpenStreetMap for Gutenberg and WPBakery Page Builder 
(formerly Vi ...)
+       TODO: check
+CVE-2025-54959 (Powered BLUE Server versions 0.20130927 and prior contain a 
path trave ...)
+       TODO: check
+CVE-2025-54958 (Powered BLUE 870 versions 0.20130927 and prior contain an OS 
command i ...)
+       TODO: check
+CVE-2025-54952 (An integer overflow vulnerability in the loading of ExecuTorch 
models  ...)
+       TODO: check
+CVE-2025-54951 (A group of related buffer overflow vulnerabilities in the 
loading of E ...)
+       TODO: check
+CVE-2025-54950 (An out-of-bounds access vulnerability in the loading of 
ExecuTorch mod ...)
+       TODO: check
+CVE-2025-54949 (A heap buffer overflow vulnerability in the loading of 
ExecuTorch mode ...)
+       TODO: check
+CVE-2025-54940 (An HTML injection vulnerability exists in WordPress plugin 
"Advanced C ...)
+       TODO: check
+CVE-2025-54887 (jwe is a Ruby implementation of the RFC 7516 JSON Web 
Encryption (JWE) ...)
+       TODO: check
+CVE-2025-54886 (skops is a Python library which helps users share and ship 
their sciki ...)
+       TODO: check
+CVE-2025-54793 (Astro is a web framework for content-driven websites. In 
versions 5.2. ...)
+       TODO: check
+CVE-2025-54787 (SuiteCRM is an open-source, enterprise-ready Customer 
Relationship Man ...)
+       TODO: check
+CVE-2025-54368 (uv is a Python package and project manager written in Rust. In 
version ...)
+       TODO: check
+CVE-2025-53792 (Azure Portal Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2025-53787 (Microsoft 365 Copilot BizChat Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2025-53774 (Microsoft 365 Copilot BizChat Information Disclosure 
Vulnerability)
+       TODO: check
+CVE-2025-53767 (Azure OpenAI Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2025-48709 (An issue was discovered in BMC Control-M 9.0.21.300. When 
Control-M Se ...)
+       TODO: check
+CVE-2025-45765 (ruby-jwt v3.0.0.beta1 was discovered to contain weak 
encryption. NOTE: ...)
+       TODO: check
+CVE-2025-30405 (An integer overflow vulnerability in the loading of ExecuTorch 
models  ...)
+       TODO: check
+CVE-2025-30404 (An integer overflow vulnerability in the loading of ExecuTorch 
models  ...)
+       TODO: check
+CVE-2025-26513 (The installer for SAN Host Utilities for Windows versions 
prior to 8.0 ...)
+       TODO: check
+CVE-2024-58257 (EnzoH has an OS command injection vulnerability. Successful 
exploitati ...)
+       TODO: check
+CVE-2024-58256 (EnzoH has an OS command injection vulnerability. Successful 
exploitati ...)
+       TODO: check
+CVE-2024-58255 (EnzoH has an OS command injection vulnerability. Successful 
exploitati ...)
+       TODO: check
 CVE-2025-8697 (A vulnerability was found in agentUniverse up to 0.0.18 and 
classified ...)
        NOT-FOR-US: agentUniverse
 CVE-2025-8533 (A vulnerability was identified in the XPC services of 
Fantastical. The ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ec619a120143fb7874e2ebda446b05ccd5b1bd2b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ec619a120143fb7874e2ebda446b05ccd5b1bd2b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to