Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
7a7fb20a by security tracker role at 2026-01-17T20:13:42+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,31 @@
+CVE-2026-1063 (A vulnerability has been found in bastillion-io Bastillion up
to 4.0.1 ...)
+ TODO: check
+CVE-2026-1062 (A flaw has been found in xiweicheng TMS up to 2.28.0. This
affects the ...)
+ TODO: check
+CVE-2026-1061 (A vulnerability was detected in xiweicheng TMS up to 2.28.0.
Affected ...)
+ TODO: check
+CVE-2026-1059 (A security vulnerability has been detected in FeMiner wms up to
9cad1f ...)
+ TODO: check
+CVE-2026-1050 (A flaw has been found in risesoft-y9 Digital-Infrastructure up
to 9.6. ...)
+ TODO: check
+CVE-2026-1049 (A security vulnerability has been detected in LigeroSmart up to
6.1.26 ...)
+ TODO: check
+CVE-2026-1048 (A weakness has been identified in LigeroSmart up to 6.1.26.
Impacted i ...)
+ TODO: check
+CVE-2026-0725 (The Integrate Dynamics 365 CRM plugin for WordPress is
vulnerable to S ...)
+ TODO: check
+CVE-2025-8615 (The CubeWP plugin for WordPress is vulnerable to Stored
Cross-Site Scr ...)
+ TODO: check
+CVE-2025-15532 (A security flaw has been discovered in Open5GS up to 2.7.5.
This issue ...)
+ TODO: check
+CVE-2025-15531 (A vulnerability was identified in Open5GS up to 2.7.5. This
vulnerabil ...)
+ TODO: check
+CVE-2025-15530 (A vulnerability was determined in Open5GS up to 2.7.6. This
affects th ...)
+ TODO: check
+CVE-2025-14078 (The PAYGENT for WooCommerce plugin for WordPress is vulnerable
to Miss ...)
+ TODO: check
+CVE-2025-10484 (The Registration & Login with Mobile Phone Number for
WooCommerce plug ...)
+ TODO: check
CVE-2026-23800 (Incorrect Privilege Assignment vulnerability in Modular DS
modular-con ...)
NOT-FOR-US: WordPress plugin or theme
CVE-2026-23745 (node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2)
fails t ...)
@@ -2448,7 +2476,7 @@ CVE-2026-0892 (Memory safety bugs present in Firefox 146
and Thunderbird 146. So
- firefox 147.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0892
CVE-2026-0891 (Memory safety bugs present in Firefox ESR 140.6, Thunderbird
ESR 140.6 ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2456,7 +2484,7 @@ CVE-2026-0891 (Memory safety bugs present in Firefox ESR
140.6, Thunderbird ESR
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0891
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0891
CVE-2026-0890 (Spoofing issue in the DOM: Copy & Paste and Drag & Drop
component. Thi ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2470,7 +2498,7 @@ CVE-2026-0888 (Information disclosure in the XML
component. This vulnerability a
- firefox 147.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0888
CVE-2026-0887 (Clickjacking issue, information disclosure in the PDF Viewer
component ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2478,7 +2506,7 @@ CVE-2026-0887 (Clickjacking issue, information disclosure
in the PDF Viewer comp
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0887
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0887
CVE-2026-0886 (Incorrect boundary conditions in the Graphics component. This
vulnerab ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2486,7 +2514,7 @@ CVE-2026-0886 (Incorrect boundary conditions in the
Graphics component. This vul
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0886
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0886
CVE-2026-0885 (Use-after-free in the JavaScript: GC component. This
vulnerability aff ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2494,7 +2522,7 @@ CVE-2026-0885 (Use-after-free in the JavaScript: GC
component. This vulnerabilit
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0885
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0885
CVE-2026-0884 (Use-after-free in the JavaScript Engine component. This
vulnerability ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2502,7 +2530,7 @@ CVE-2026-0884 (Use-after-free in the JavaScript Engine
component. This vulnerabi
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0884
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0884
CVE-2026-0883 (Information disclosure in the Networking component. This
vulnerability ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2510,7 +2538,7 @@ CVE-2026-0883 (Information disclosure in the Networking
component. This vulnerab
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0883
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0883
CVE-2026-0882 (Use-after-free in the IPC component. This vulnerability affects
Firefo ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2521,7 +2549,7 @@ CVE-2026-0881 (Sandbox escape in the Messaging System
component. This vulnerabil
- firefox 147.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0881
CVE-2026-0880 (Sandbox escape due to integer overflow in the Graphics
component. This ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2529,7 +2557,7 @@ CVE-2026-0880 (Sandbox escape due to integer overflow in
the Graphics component.
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0880
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0880
CVE-2026-0879 (Sandbox escape due to incorrect boundary conditions in the
Graphics co ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2537,7 +2565,7 @@ CVE-2026-0879 (Sandbox escape due to incorrect boundary
conditions in the Graphi
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0879
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0879
CVE-2026-0878 (Sandbox escape due to incorrect boundary conditions in the
Graphics: C ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -2545,7 +2573,7 @@ CVE-2026-0878 (Sandbox escape due to incorrect boundary
conditions in the Graphi
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0878
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-05/#CVE-2026-0878
CVE-2026-0877 (Mitigation bypass in the DOM: Security component. This
vulnerability a ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 147.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -3787,6 +3815,7 @@ CVE-2026-21682 (iccDEV provides a set of libraries and
tools that allow for the
CVE-2026-21681 (iccDEV provides a set of libraries and tools that allow for
the intera ...)
NOT-FOR-US: iccDEV
CVE-2026-21441 (urllib3 is an HTTP client library for Python. urllib3's
streaming API ...)
+ {DSA-6102-1}
- python-urllib3 2.5.0-2 (bug #1125062)
NOTE:
https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99
NOTE:
https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b
(2.6.3)
@@ -18148,7 +18177,7 @@ CVE-2025-14328 (Privilege escalation in the Netmonitor
component. This vulnerabi
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2025-94/#CVE-2025-14328
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2025-96/#CVE-2025-14328
CVE-2025-14327 (Spoofing issue in the Downloads Panel component. This
vulnerability af ...)
- {DSA-6101-1 DLA-4439-1}
+ {DSA-6103-1 DSA-6101-1 DLA-4439-1}
- firefox 146.0-1
- firefox-esr 140.7.0esr-1
- thunderbird 1:140.7.0esr-1
@@ -20117,7 +20146,7 @@ CVE-2025-66471 (urllib3 is a user-friendly HTTP client
library for Python. Start
NOTE: The fix requires an updated src:brotli >= 1.2.0 for the fix to be
effective,
NOTE: which adds the optional output_buffer_limit option to avoid these
attacks.
CVE-2025-66418 (urllib3 is a user-friendly HTTP client library for Python.
Starting in ...)
- {DLA-4421-1}
+ {DSA-6102-1 DLA-4421-1}
- python-urllib3 2.5.0-1.1 (bug #1122030)
NOTE: https://www.openwall.com/lists/oss-security/2025/12/05/4
NOTE:
https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7a7fb20ab88a9643fac8c36aaf60c6f197ffc325
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7a7fb20ab88a9643fac8c36aaf60c6f197ffc325
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits